SlideShare une entreprise Scribd logo
1  sur  80
UNIT III
IT Act-2000 & Cyber Security
By Dr. Dhobale J V
Associate Professor
School of Engineering & Technology
RNB Global University, Bikaner
RNB Global University, Bikaner. 1
Objectives
 IT Act-2000.
 Digital Signature.
 Electronic Records.
 Digital Signature Certificates.
 Appellate Tribunal & Offences
 Cyber crimes.
2RNB Global University, Bikaner.
IT Act-2000
 Objective: “to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic
communication, commonly referred to as "electronic
commerce", which involve the use of alternatives to
paper-based methods of communication and storage
of information, to facilitate electronic filing of
documents with the Government agencies and further
to amend the Indian Penal Code, the Indian Evidence
Act, 1872, the Bankers' Books Evidence Act, 1891 and
the Reserve Bank of India Act, 1934 and for matters
connected therewith or incidental thereto.” .
3RNB Global University, Bikaner.
IT Act-2000
 What does IT Act 2000 legislation deals
with?. – Deals with
1. Legal Recognition of Electronic Documents.
2. Legal Recognition of Digital Signatures.
3. Offenses and Contraventions.
4. Justice Dispensation Systems for cyber
crimes.
4RNB Global University, Bikaner.
IT Act-2000
 Why did the need for IT Amendment Act
2008 (ITAA) arise?.
 The IT Act 2000, being the first legislation on
technology, computers, e-commerce and e-
communication, the was the subject of
extensive debates, elaborate reviews with one
arm of the industry criticizing some sections of
the Act to be draconian and other stating it is
too diluted and lenient.
 Information Technology Amendment Act
2008 was placed in the Parliament and
passed at the end of 2008.
5RNB Global University, Bikaner.
IT Act-2000
 Why did the need for IT Amendment Act
2008 (ITAA) arise?.
 The IT Amendment Act 2008 got the President
assent on 5 Feb 2009 and was made effective
from 27 October 2009.
6RNB Global University, Bikaner.
IT Act-2000
 Notable features of the ITAA 2008 are:
1. Focussing on data privacy.
2. Focussing on Information Security.
3. Defining cyber café.
4. Making digital signature technology neutral
5. Defining reasonable security practices to be
followed by corporate
7RNB Global University, Bikaner.
IT Act-2000
 Notable features of the ITAA 2008 are:
6. Redefining the role of intermediaries.
7. Recognising the role of Indian Computer
Emergency Response Team.
8. Inclusion of some additional cyber crimes like
child pornography and cyber terrorism.
9. Authorizing an Inspector to investigate cyber
offences (as against the DSP earlier).
8RNB Global University, Bikaner.
IT Act-2000
 Structure of IT Act:
 The Act totally has 13 chapters and 90
sections (4 Schedules).
 Sections 91 to 94 deal with the amendments
to the four Acts namely Indian Penal Code
1860, The Indian Evidence Act 1872, The
Bankers’ Books Evidence Act 1891 and the
Reserve Bank of India Act 1934.
9RNB Global University, Bikaner.
IT Act-2000
 Structure of IT Act:
 The Act has chapters that deal with
authentication of electronic records, electronic
signatures etc.
 Elaborate procedures for certifying authorities
and electronic signatures have been spelt out.
 The civil offence of data theft and the process
of adjudication and appellate procedures have
been described.
10RNB Global University, Bikaner.
IT Act-2000
 Structure of IT Act:
 Then the Act goes on to define and describe
some of the well-known cyber crimes and lays
down the punishments therefore.
 Then the concept of due diligence, role of
intermediaries and some miscellaneous
provisions have been described.
11RNB Global University, Bikaner.
IT Act-2000
 What is the applicability of IT Act? .
 The Act extends to the whole of India and
except as otherwise provided, it also applies to
any offence or contravention there under
committed outside India by any person.
12RNB Global University, Bikaner.
IT Act-2000
 What is the applicability of IT Act? .
 Specific exclusion(s) to the Act where it is not
applicable are:
 Negotiable instrument (other than a cheque) as
defined in section 13 of the Negotiable Instruments
Act, 1881;
 A power-of-attorney as defined in section 1A of the
Powers-of-Attorney Act, 1882;
 A trust as defined in section 3 of the Indian Trusts
Act, 1882
 A will as defined in clause (h) of section 2 of the
Indian Succession Act, 1925 including any other
testamentary disposition. 13RNB Global University, Bikaner.
IT Act-2000
 WHAT IS A CYBER CRIME? .
 Cyber Crime is not defined officially in IT Act
or in any other legislation. In fact, it cannot be
too. Offence or crime has been dealt with
elaborately listing various acts and the
punishments for each, under the Indian Penal
Code, 1860 and related legislations. Hence,
the concept of cyber crime, is just a
"combination of crime and computer".
14RNB Global University, Bikaner.
IT Act-2000
 WHAT IS A CYBER CRIME? .
 Cybercrime in a narrow sense (computer
crime): Any illegal behaviour directed by
means of electronic operations that targets
the security of computer systems and the
data processed by them.
15RNB Global University, Bikaner.
IT Act-2000
 WHAT IS A CYBER CRIME? .
 Cybercrime in a broader sense (computer-
related crime): Any illegal behaviour
committed by means of, or in relation to, a
computer system or network, including
such crimes as illegal possession and
offering or distributing information by
means of a computer system or network.
 Any contract for the sale or conveyance of
immovable property or any interest in such
property;
 Any such class of documents or transactions as
may be notified by the Central Government. 16RNB Global University, Bikaner.
IT Act-2000
 SELECTED IT Act Section? .
 Section 43 - Penalty and Compensation for
damage to computer, computer system, etc.
(Mphasis BPO Fraud: 2005 )
 Section 65 - Tampering with Computer Source
Documents. (Programme change)
 Section 66 - Computer Related Offences.
(unauthorised access)
17RNB Global University, Bikaner.
IT Act-2000
 SELECTED IT Act Section? .
 Section 66A - Punishment for sending
offensive messages through communication
service. (Fake profile; Hoax E-mail)
 Section 66C - Punishment for identity theft.
 Section 66D - Punishment for cheating by
impersonation by using computer resource.
 Section 66E - Punishment for violation of
privacy (MMS)
18RNB Global University, Bikaner.
IT Act-2000
 SELECTED IT Act Section? .
 Section-66F - Cyber Terrorism.
 Section 67 - Punishment for publishing or
transmitting obscene material in electronic
form. (defacing org./individual)
 Section 67B - Punishment for publishing or
transmitting of material depicting children in
sexually explicit act, etc. in electronic form.
19RNB Global University, Bikaner.
IT Act-2000
 SELECTED IT Act Section? .
 Section 69 - Powers to issue directions for
interception or monitoring or decryption of any
information through any computer resource.
20RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
a. Harassment via fake public profile on
social networking site - A fake profile of a
person is created on a social networking site
with the correct address, residential
information or contact details but he/she is
labelled as ‘prostitute’ or a person of ‘loose
character’. This leads to harassment of the
victim. (Sec-66A, 67)
21RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
b. Online Hate Community - Online hate
community is created inciting a religious
group to act or pass objectionable remarks
against a country, national figures etc. (Sec-
66A)
22RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
c. Email Account Hacking - If victim’s email
account is hacked and obscene emails are
sent to people in victim’s address book. (Sec-
43, 66, 66A, 66C, 67, 67A, 67B).
d. Credit Card Fraud - Unsuspecting victims
would use infected computers to make online
transactions (Sec- 43, 66, 66C, 66D ).
23RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
e. Web Defacement - The homepage of a
website is replaced with a pornographic or
defamatory page. Government sites generally
face the wrath of hackers on symbolic days
(sec-43 and 66 ).
24RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
f. Introducing Viruses, Worms, Backdoors,
Rootkits, Trojans, Bugs- All of the above
are some sort of malicious programs which
are used to destroy or gain access to some
electronic information (Sec-43, 66, 66A).
25RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
g. Cyber Terrorism - Many terrorists are use
virtual(GDrive, FTP sites) and physical
storage media(USB’s, hard drives) for hiding
information and records of their illicit business
(Sec-69).
h. Online sale of illegal Articles - Where sale
of narcotics, drugs weapons and wildlife is
facilitated by the Internet (Generally
conventional laws applicable)
26RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
i. Cyber Pornography - Among the largest
businesses on Internet. Pornography may not
be illegal in many countries, but child
pornography is (Sec-67, 67A and 67B ).
j. Phishing and Email Scams - Phishing
involves fraudulently acquiring sensitive
information through masquerading a site as a
trusted entity. (E.g. Passwords, credit card
information) (Sec-66, 66A and 66D ).
27RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
k. Theft of Confidential Information: Many
business organizations store their confidential
information in computer systems. This
information is targeted by rivals, criminals
and disgruntled employees. (Sec-43,66,66B).
l. Source Code Theft: A Source code
generally is the most coveted and important
"crown jewel" asset of a company. (Sec-
43,66,66B).
28RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
m. Tax Evasion and Money Laundering:
Money launderers and people doing illegal
business activities hide their information in
virtual as well as physical activities.(Income
Tax Act).
29RNB Global University, Bikaner.
IT Act-2000
 COMMON CYBER-CRIME SCENARIOS AND
APPLICABILITY OF LEGAL ASPECTS? .
n. Online Share Trading Fraud: It has become
mandatory for investors to have their demat
accounts linked with their online banking
accounts which are generally accessed
unauthorized, thereby leading to share
trading frauds (43,66,66C,66D).
30RNB Global University, Bikaner.
IT Act-2000
 PENALTIES, COMPENSATION AND
ADJUDICATION SECTIONS?.
 Section 43: Penalty & Compensation for
damage to computer, computer system: He
shall be liable to pay damages by way of
compensation to the person so affected.
 Section 43A: Compensation for failure to
protect data: Party shall be liable to pay damages
by way of compensation, not exceeding five crore
rupees, to the person so affected.
31RNB Global University, Bikaner.
IT Act-2000
 PENALTIES, COMPENSATION AND
ADJUDICATION SECTIONS?.
 Section 44: Penalty for failure to furnish information or
return, etc. If any person who is required under this
Act o any rules or regulations made there under to –
a. Fails to furnish document/report to the certifying authority
shall be liable to a penalty not exceeding one lakh and fifty
thousand rupees for each such failure.
b. fails to file returns or furnish books or other documents
within specified time, shall be liable to a penalty not exceeding
five thousand rupees for every day during which such failure
continues.
c. Maintain books of account or records, fails to maintain the
same, he shall be liable to a penalty not exceeding ten
thousand rupees for every day during which the failure
continues. 32RNB Global University, Bikaner.
IT Act-2000
 PENALTIES, COMPENSATION AND
ADJUDICATION SECTIONS?.
 Section 45 – Residuary Penalty Whoever contravenes
any rules or regulations made under this Act, for the
contravention of which no penalty has been separately
provided, shall be liable to pay a compensation not
exceeding twenty-five thousand rupees to the person
affected by such contravention or a penalty not
exceeding twenty-five thousand rupees.
33RNB Global University, Bikaner.
IT Act-2000
 PENALTIES, COMPENSATION AND
ADJUDICATION SECTIONS?.
 Section 45 – Residuary Penalty Whoever contravenes
any rules or regulations made under this Act, for the
contravention of which no penalty has been separately
provided, shall be liable to pay a compensation not
exceeding twenty-five thousand rupees to the person
affected by such contravention or a penalty not
exceeding twenty-five thousand rupees.
34RNB Global University, Bikaner.
IT Act-2000
 PENALTIES, COMPENSATION AND
ADJUDICATION SECTIONS?.
 Section 47 Factors to be taken into account by
the adjudicating officer - adjudicating officer
shall have due regard to the following factors
(a) The amount of gain of unfair advantage,
wherever quantifiable, made as a result of the
default;
(b) The amount of loss caused to the person as a
result of the default,
(c) The repetitive nature of the default
35RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
4. Legal recognition of electronic records:
 Where any law provides that information or
any other matter shall be in writing or in the
typewritten or printed form, then,
notwithstanding anything contained in such
law, such requirement shall be deemed to
have been satisfied if such information or
matter is-
(a) rendered or made available in an electronic
form; and
(b) accessible so as to be usable for a
subsequent reference. 36RNB Global University, Bikaner.
5. Legal recognition of digital signatures
 Where any law provides that information or
any other matter shall be authenticated by
affixing the signature or any document shall be
signed or bear the signature of any person
(hen, notwithstanding anything contained in
such law, such requirement shall be deemed
to have been satisfied, if such information or
matter is authenticated by means of digital
signature affixed in such manner as may be
prescribed by the Central Government.
Explanation.- For the purposes of this section,37RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
5. Legal recognition of digital signatures
 Explanation.- For the purposes of this section,
"signed", with its grammatical variations and
cognate expressions, shall, with reference to a
person, mean affixing of his hand written
signature or any mark on any document and
the expression "signature" shall be construed
accordingly.
.
38RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
6. Use of electronic records and digital
signatures in Government and its
agencies.
(1) Where any law provides for-
(a) the filing of any form. application or any
other document with any office, authority, body
or agency owned or controlled by the
appropriate Government in a particular
manner;
(b) the issue or grant of any licence, permit,
sanction or approval by whatever name called
in a particular manner; 39RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
6. Use of electronic records and digital
signatures in Government and its
agencies.
(1) Where any law provides for-
(c) the receipt or payment of money in a
particular manner.
 Then, notwithstanding anything contained in
any other law for the time being in force, such
requirement shall be deemed to have been
satisfied if such filing, issue, grant, receipt or
payment, as the case may be, is effected by
means of such electronic form as may be40RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
6. Use of electronic records and digital
signatures in Government and its
agencies.
(2) The appropriate Government may, for the
purposes of sub-section (1), by rules,
prescribe-
(a) the manner and format in which such
electronic records shall be filed, created or
issued;
(b) the manner or method of payment of any
fee or charges for filing, creation or issue any
electronic record under clause41RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
7. Retention of electronic records:
(1) Where any law provides that documents, records
or information shall be retained for any specific period,
then, that requirement shall be deemed to have been
satisfied if such documents, records or information are
retained in the electronic form, if-
(a) the information contained therein remains
accessible so as to be usable for a subsequent
reference;
(b) the electronic record is retained in the format in
which it was originally generated, sent or received or
in a format which can be demonstrated to represent
accurately the information originally generated, sent or
received; 42RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
7. Retention of electronic records:
(c) the details which will facilitate the identification of
the origin, destination, date and time of despatch or
receipt of such electronic record are available in the
electronic record:
 Provided that this clause does not apply to any
information which is automatically generated solely for
the purpose of enabling an electronic record to be
despatched or received.
(2) Nothing in this section shall apply to any law that
expressly provides for the retention of documents,
records or information in the form of electronic records
43RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-III
 Attribution, Acknowledgment And Despatch of
Electronic Records:
11. Attribution of electronic records:
 An electronic record shall be attributed to the
originator—
(a) if it was sent by the originator himself;
(b) by a person who had the authority to act on behalf
of the originator in respect of that electronic record; or
(c) by an information system programmed by or on
behalf of the originator to operate automatically.
44RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-IV
 Attribution, Acknowledgment And Despatch of
Electronic Records:
12. Acknowledgment of receipt:
(1) Where the originator has not agreed with the
addressee that the acknowledgment of receipt of
electronic record be given in a particular form or by a
particular method, an acknowledgment may be given
by-
(a) any communication by the addressee, automated
or otherwise; or
(b) any conduct of the addressee, sufficient to
indicate to the originator that the electronic record has
been received.
45RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-IV
 Attribution, Acknowledgment And Despatch of
Electronic Records:
12. Acknowledgment of receipt:
(2) Where the originator has stipulated that the
electronic record shall be binding only on receipt of
an acknowledgment of such electronic record by him,
then unless acknowledgment has been so received,
the electronic record shall be deemed to have been
never sent by the originator.
46RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-IV
 Attribution, Acknowledgment And Despatch of
Electronic Records:
12. Acknowledgment of receipt:
(3) Where the originator has not stipulated that the electronic
record shall be binding only on receipt of such acknowledgment,
and the acknowledgment has not been received by the originator
within the time specified or agreed or, if no time has been
specified or agreed to within a reasonable time, then the
originator may give notice to the addressee stating that no
acknowledgment has been received by him and specifying a
reasonable time by which the acknowledgment must be received
by him and if no acknowledgment is received within the
aforesaid time limit he may after giving notice to the addressee,
treat the electronic record as though it has never been sent.
47RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-IV
14. Secure electronic record: Where any security
procedure has been applied to an electronic record at
a specific point of time. then such record shall be
deemed to be a secure electronic record from such
point of time to the time of verification.
48RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-V
15. Secure digital signature : If, by application of a
security procedure agreed to by the parties
concerned, it can be verified that a digital signature,
at the time it was affixed, was—
(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the
exclusive control of the subscriber and is linked to the
electronic record to which it relates in such a manner
that if the electronic record was altered the digital
signature would be invalidated, then such digital
signature shall be deemed to be a secure digital
signature.
49RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-V
16. Secure procedure: The Central Government shall for
the purposes of this Act prescribe the security
procedure having regard to commercial
circumstances prevailing at the time when the
procedure was used, including—
(a) the nature of the transaction;
(b) the level of sophistication of the parties with
reference to their technological capacity;
or communications.
50RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-V
16. Secure procedure:
(d) the availability of alternatives offered to but
rejected by any party;
(e) the cost of alternative procedures; and
(f) the procedures in general use for similar types of
transactions or communications.
51RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-V
17. Appointment of Controller and other officers:
(1) The Central Government may, by notification in
the Official Gazette, appoint a Controller of Certifying
Authorities for the purposes of this Act and may also
by the same or subsequent notification appoint such
number of Deputy Controllers and Assistant
Controllers as it deems fit.
(2) The Controller shall discharge his functions under
this Act subject to the general control and directions
of the Central Government.
(3) The Deputy Controllers and Assistant Controllers
shall perform the functions assigned to them by the
Controller under the general superintendence and
control of the Controller. 52RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
17. Appointment of Controller and other officers:
(4) The qualifications, experience and terms and
conditions of service of Controller, Deputy Controllers
and Assistant Controllers shall be such as may be
prescribed by the Central Government.
(5) The Head Office and Branch Office of the office of
the Controller shall be at such places as the Central
Government may specify, and these may be
established at such places as the Central
Government may think fit.
(6) There shall be a seal of the Office of the
Controller.
53RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
18. Functions of Controller: The Controller may
perform all or any of the following functions,
namely:—
(a) exercising supervision over the activities of the
Certifying Authorities;
(b) certifying public keys of the Certifying Authorities;
(c) laying down the standards to be maintained by the
Certifying Authorities;
(d) specifying the qualifications and experience which
employees of the Certifying Authorities should
possess;
(e) specifying the conditions subject to which the
Certifying Authorities shall conduct their business;
54RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
18. Functions of Controller: The Controller may
perform all or any of the following functions,
namely:—
(f) specifying the contents of written, printed or visual
materials and advertisements that may be distributed
or used in respect of a Digital Signature Certificate
and the public key;
(g) specifying the form and content of a Digital
Signature Certificate and the key,
(h) specifying the form and manner in which accounts
shall be maintained by the Certifying Authorities;
55RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
18. Functions of Controller: The Controller may
perform all or any of the following functions,
namely:—
(i) specifying the terms and conditions subject to
which auditors may be appointed and the
remuneration to be paid to them;
(j) facilitating the establishment of any electronic
system by a Certifying Authority either solely or jointly
with other Certifying Authorities and regulation of
such systems;
(k) specifying the manner in which the Certifying
Authorities shall conduct their dealings with the
subscribers;
56RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
18. Functions of Controller: The Controller may
perform all or any of the following functions,
namely:—
(l) resolving any conflict of interests between the
Certifying Authorities and the subscribers;
(m) laying down the duties of the Certifying
Authorities;
(n) maintaining a data base containing the disclosure
record of every Certifying Authority containing such
particulars as may be specified by regulations, which
shall be accessible to public.
57RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
20. Controller to act as repository:
(1) The Controller shall be the repository of all
Digital Signature Certificates issued under
this Act.
(2) The Controller shall—
(a) make use of hardware, software and procedures
that are secure from intrusion and misuse;
(b) observe such other standards as may be
prescribed by the Central Government,
to ensure that the secrecy and security of the digital
signatures are assured.
58RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
20. Controller to act as repository:
(3) The Controller shall maintain a computerised data
base of all public keys in such a manner that such
data base and the public keys are available to any
member of the public.
59RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
21. Licence to issue Digital Signature Certificates:
(1) Subject to the provisions of sub-section (2), any
person may make an application, to the Controller, for
a licence to issue Digital Signature Certificates.
(2) No licence shall be issued under sub-section (1),
unless the applicant fulfills such requirements
with respect to qualification, expertise, manpower,
financial resources and other infrastructure facilities,
which are necessary to issue Digital Signature
Certificates as may be prescribed by the Central
Government.
60RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
21. Licence to issue Digital Signature Certificates:
(3) A licence granted under this section shall—
(a) be valid for such period as may be prescribed by
the Central Government;
(b) not be transferable or heritable;
(c) be subject to such terms and conditions as may be
specified by the regulations.
61RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
24. Procedure for grant or rejection of licence : The
Controller may, on receipt of an application under
sub-section (1) of section 21, after considering the
documents accompanying the application and such
other factors, as he deems fit, grant the licence or
reject the application:
 Provided that no application shall be rejected under
this section unless the applicant has been given a
reasonable opportunity of presenting his case.
62RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
30. Disclosure:
(1) Every Certifying Authority shall disclose in the
manner specified by regulations—
(a) its Digital Signature Certificate which contains the
public key corresponding to the private key used by
that Certifying Authority to digitally sign another Digital
Signature Certificate;
(b) any certification practice statement relevant
thereto;
(c) notice of the revocation or suspension of its
Certifying Authority certificate, if any; and
63RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
30. Disclosure:
(d) any other fact that materially and adversely affects
either the reliability of a Digital Signature Certificate,
which that Authority has issued, or the Authority's
ability to perform its services.
(2) Where in the opinion of the Certifying Authority any
event has occurred or any situation has arisen which
may materially and adversely affect the integrity of its
computer system or the conditions subject to which a
Digital Signature Certificate was granted, then, the
Certifying Authority shall—
64RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
30. Disclosure:
(a) use reasonable efforts to notify any person who is
likely to be affected by that occurrence; or
(b) act in accordance with the procedure specified in
its certification practice statement to deal with such
event or situation.
65RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VI
40. Generating key pair: Where any Digital Signature
Certificate, the public key of which corresponds to the
private key of that subscriber which is to be listed in
the Digital Signature Certificate has been accepted by
a subscriber, then, the subscriber shall generate the
key pair by applying the security procedure.
66RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VIII - DUTIES OF SUBSCRIBERS
41. Acceptance of Digital Signature Certificate: (1) A
subscriber shall be deemed to have accepted a
Digital Signature Certificate if he publishes or
authorises the publication of a Digital Signature
Certificate—
(a) to one or more persons;
(b) in a repository, or otherwise demonstrates his
approval of the Digital Signature Certificate in any
manner.
67RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VIII - DUTIES OF SUBSCRIBERS
41. Acceptance of Digital Signature Certificate:
(2) By accepting a Digital Signature Certificate the
subscriber certifies to all who reasonably rely on the
information contained in the Digital Signature
Certificate that—
(a) the subscriber holds the private key corresponding
to the public key listed in the Digital Signature
Certificate and is entitled to hold the same;
(b) all representations made by the subscriber to the
Certifying Authority and all material relevant to the
information contained in the Digital Signature
Certificate are true;
(c) all information in the Digital Signature Certificate
that is within the knowledge of the subscriber is true. 68RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VIII - DUTIES OF SUBSCRIBERS
42. Control of private key: (1) Every subscriber shall
exercise reasonable care to retain control of the
private key corresponding to the public key listed in
his Digital Signature Certificate and take all steps to
prevent its disclosure to a person not authorised to
affix the digital signature of the subscriber.
(2) If the private key corresponding to the public key
listed in the Digital Signature Certificate has been
compromised, then, the subscriber shall communicate
the same without any delay to the Certifying Authority
in such manner as may be specified by .the
regulations.
69RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-VIII - DUTIES OF SUBSCRIBERS
48. Establishment of Cyber Appellate Tribunal: (1)
The Central Government shall, by notification,
establish one or more appellate tribunals to be known
as the Cyber Regulations Appellate Tribunal.
(2) The Central Government shall also specify, in the
notification referred to in subsection
(1), the matters and places in relation to which the
Cyber Appellate Tribunal may exercise jurisdiction.
70RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
49. Composition of Cyber Appellate Tribunal: A Cyber
Appellate Tribunal shall consist of one person only
(hereinafter referred to as the Residing Officer of the
Cyber Appellate Tribunal) to be appointed, by
notification, by the Central Government.
50. Qualifications for appointment as Presiding
Officer of the Cyber Appellate Tribunal: A person
shall not be qualified for appointment as the Presiding
Officer of a Cyber Appellate Tribunal unless he—
(a) is, or has been. or is qualified to be, a Judge of a
High Court; or
(b) is or has been a member of the Indian Legal
Service and is holding or has held a post in Grade I of
that Service for at least three years. 71RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
51. Term of office: The Presiding Officer of a Cyber
Appellate Tribunal shall hold office for a term of five
years from the date on which he enters upon his
office or until he attains the age of sixty-five years,
whichever is earlier.
72RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
52. Salary, allowances and other terms and
Conditions of service of Presiding Officer: The
salary and allowances payable to, and the other
terms and conditions of service including pension,
gratuity and other retirement benefits of. the Presiding
Officer of a Cyber Appellate Tribunal shall be such as
may be prescribed:
 Provided that neither the salary and allowances nor
the other terms and conditions of service of the
Presiding Officer shall be varied to his disadvantage
after appointment.
73RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
54. Resignation and removal: (1) The Presiding Officer
of a Cyber Appellate Tribunal may, by notice in
writing under his hand addressed to the Central
Government, resign his office.
 Provided that the said Presiding Officer shall, unless
he is permitted by the Central Government to
relinquish his office sooner, continue to hold office until
the expiry of three months from the date of receipt of
such notice or until a person duly appointed as his
successor enters upon his office or until the expiry of
his term of office, whichever is the earliest.
74RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
54. Resignation and removal: (2) The Presiding Officer
of a Cyber Appellate Tribunal shall not be removed
from his office except by an order by the Central
Government on the ground of proved misbehaviour or
incapacity after an inquiry made by a Judge of the
Supreme Court in which the Presiding Officer
concerned has been informed of the charges against
him and given a reasonable opportunity of being
heard in respect of these charges.
(3) The Central Government may, by rules, regulate
the procedure for the investigation of misbehaviour or
incapacity of the aforesaid Presiding Officer.
75RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
57. Appeal to Cyber Appellate Tribunal:
(1) Same as provided in sub-section (2), any person
aggrieved by an order made by Controller or an
adjudicating officer under this Act may prefer an
appeal to a Cyber Appellate Tribunal having
jurisdiction in the matter.
(2) No appeal shall lie to the Cyber Appellate Tribunal
from an order made by an adjudicating officer with the
consent of the parties.
76RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
57. Appeal to Cyber Appellate Tribunal:
(3) Every appeal under sub-section (1) shall be filed
within a period of forty-five days from the date on
which a copy of the order made by the Controller or
the adjudicating officer is received by the person
aggrieved and it shall be in such form and be
accompanied by such fee as may be prescribed:
 Provided that the Cyber Appellate Tribunal may
entertain an appeal after the expiry of the said period
of forty-five days if it is satisfied that there was
sufficient cause tor not filing it within that period.
77RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
57. Appeal to Cyber Appellate Tribunal:
(4) On receipt of an appeal under sub-section (1), the
Cyber Appellate Tribunal may, after giving the parties
to the appeal, an opportunity of being heard, pass
such orders thereon as it thinks fit, confirming,
modifying or setting aside the order appealed against.
(5) The Cyber Appellate Tribunal shall send a copy of
every order made by it to" the parties to the appeal
and to the concerned Controller or adjudicating officer.
(6) The appeal filed before the Cyber Appellate
Tribunal under sub-section (1) shall be dealt with by it
as expeditiously as possible and endeavour shall be
made by it to dispose of the appeal finally within six
months from the date of receipt of the appeal. 78RNB Global University, Bikaner.
IT Act-2000 – Electronic Governance
Chap-X - THE CYBER REGULATIONS APPELLATE
Review
 IT Act-2000.
 Digital Signature.
 Electronic Records.
 Digital Signature Certificates.
 Appellate Tribunal & Offences
 Cyber crimes.
79RNB Global University, Bikaner.
Thank You!
RNB Global University, Bikaner. 80

Contenu connexe

Tendances

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 

Tendances (20)

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 

Similaire à It act 2000

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 

Similaire à It act 2000 (20)

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 

Plus de Jaipal Dhobale

Research Paper Network-Driven Monitoring
Research Paper Network-Driven MonitoringResearch Paper Network-Driven Monitoring
Research Paper Network-Driven MonitoringJaipal Dhobale
 
Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Jaipal Dhobale
 
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...Jaipal Dhobale
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Jaipal Dhobale
 
Unit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disasterUnit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disasterJaipal Dhobale
 
Unit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining rolesUnit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining rolesJaipal Dhobale
 
Unit no 05 disaster response
Unit no 05 disaster responseUnit no 05 disaster response
Unit no 05 disaster responseJaipal Dhobale
 
Disaster management and planning
Disaster management and planningDisaster management and planning
Disaster management and planningJaipal Dhobale
 
Unit no 14_the written research report
Unit no 14_the written research reportUnit no 14_the written research report
Unit no 14_the written research reportJaipal Dhobale
 
Unit no 09_developing sampling plan
Unit no 09_developing sampling planUnit no 09_developing sampling plan
Unit no 09_developing sampling planJaipal Dhobale
 
Unit no 08_designing questionnaire
Unit no 08_designing questionnaireUnit no 08_designing questionnaire
Unit no 08_designing questionnaireJaipal Dhobale
 
Unit no 07_measurement of scaling
Unit no 07_measurement of scalingUnit no 07_measurement of scaling
Unit no 07_measurement of scalingJaipal Dhobale
 
Unit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communicationUnit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communicationJaipal Dhobale
 
Unit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observationUnit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observationJaipal Dhobale
 
Unit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organizationUnit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organizationJaipal Dhobale
 
Unit no 03_types of research design
Unit no 03_types of research designUnit no 03_types of research design
Unit no 03_types of research designJaipal Dhobale
 
Unit no 02_research design formulation
Unit no 02_research design formulationUnit no 02_research design formulation
Unit no 02_research design formulationJaipal Dhobale
 
Unit no 01_introduction to research
Unit no 01_introduction to researchUnit no 01_introduction to research
Unit no 01_introduction to researchJaipal Dhobale
 
Unit no 05_dm_disaster recovery
Unit no 05_dm_disaster recoveryUnit no 05_dm_disaster recovery
Unit no 05_dm_disaster recoveryJaipal Dhobale
 

Plus de Jaipal Dhobale (20)

Research Paper Network-Driven Monitoring
Research Paper Network-Driven MonitoringResearch Paper Network-Driven Monitoring
Research Paper Network-Driven Monitoring
 
Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...
 
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...
 
Unit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disasterUnit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disaster
 
Unit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining rolesUnit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining roles
 
Unit no 05 disaster response
Unit no 05 disaster responseUnit no 05 disaster response
Unit no 05 disaster response
 
Disaster management and planning
Disaster management and planningDisaster management and planning
Disaster management and planning
 
Unit no 14_the written research report
Unit no 14_the written research reportUnit no 14_the written research report
Unit no 14_the written research report
 
Unit no 09_developing sampling plan
Unit no 09_developing sampling planUnit no 09_developing sampling plan
Unit no 09_developing sampling plan
 
Unit no 08_designing questionnaire
Unit no 08_designing questionnaireUnit no 08_designing questionnaire
Unit no 08_designing questionnaire
 
Unit no 07_measurement of scaling
Unit no 07_measurement of scalingUnit no 07_measurement of scaling
Unit no 07_measurement of scaling
 
Unit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communicationUnit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communication
 
Unit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observationUnit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observation
 
Unit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organizationUnit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organization
 
Unit no 03_types of research design
Unit no 03_types of research designUnit no 03_types of research design
Unit no 03_types of research design
 
Unit no 02_research design formulation
Unit no 02_research design formulationUnit no 02_research design formulation
Unit no 02_research design formulation
 
Unit no 01_introduction to research
Unit no 01_introduction to researchUnit no 01_introduction to research
Unit no 01_introduction to research
 
Unit no 05_dm_disaster recovery
Unit no 05_dm_disaster recoveryUnit no 05_dm_disaster recovery
Unit no 05_dm_disaster recovery
 

Dernier

BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forRoger Valdez
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 

Dernier (20)

BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 

It act 2000

  • 1. UNIT III IT Act-2000 & Cyber Security By Dr. Dhobale J V Associate Professor School of Engineering & Technology RNB Global University, Bikaner RNB Global University, Bikaner. 1
  • 2. Objectives  IT Act-2000.  Digital Signature.  Electronic Records.  Digital Signature Certificates.  Appellate Tribunal & Offences  Cyber crimes. 2RNB Global University, Bikaner.
  • 3. IT Act-2000  Objective: “to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.” . 3RNB Global University, Bikaner.
  • 4. IT Act-2000  What does IT Act 2000 legislation deals with?. – Deals with 1. Legal Recognition of Electronic Documents. 2. Legal Recognition of Digital Signatures. 3. Offenses and Contraventions. 4. Justice Dispensation Systems for cyber crimes. 4RNB Global University, Bikaner.
  • 5. IT Act-2000  Why did the need for IT Amendment Act 2008 (ITAA) arise?.  The IT Act 2000, being the first legislation on technology, computers, e-commerce and e- communication, the was the subject of extensive debates, elaborate reviews with one arm of the industry criticizing some sections of the Act to be draconian and other stating it is too diluted and lenient.  Information Technology Amendment Act 2008 was placed in the Parliament and passed at the end of 2008. 5RNB Global University, Bikaner.
  • 6. IT Act-2000  Why did the need for IT Amendment Act 2008 (ITAA) arise?.  The IT Amendment Act 2008 got the President assent on 5 Feb 2009 and was made effective from 27 October 2009. 6RNB Global University, Bikaner.
  • 7. IT Act-2000  Notable features of the ITAA 2008 are: 1. Focussing on data privacy. 2. Focussing on Information Security. 3. Defining cyber café. 4. Making digital signature technology neutral 5. Defining reasonable security practices to be followed by corporate 7RNB Global University, Bikaner.
  • 8. IT Act-2000  Notable features of the ITAA 2008 are: 6. Redefining the role of intermediaries. 7. Recognising the role of Indian Computer Emergency Response Team. 8. Inclusion of some additional cyber crimes like child pornography and cyber terrorism. 9. Authorizing an Inspector to investigate cyber offences (as against the DSP earlier). 8RNB Global University, Bikaner.
  • 9. IT Act-2000  Structure of IT Act:  The Act totally has 13 chapters and 90 sections (4 Schedules).  Sections 91 to 94 deal with the amendments to the four Acts namely Indian Penal Code 1860, The Indian Evidence Act 1872, The Bankers’ Books Evidence Act 1891 and the Reserve Bank of India Act 1934. 9RNB Global University, Bikaner.
  • 10. IT Act-2000  Structure of IT Act:  The Act has chapters that deal with authentication of electronic records, electronic signatures etc.  Elaborate procedures for certifying authorities and electronic signatures have been spelt out.  The civil offence of data theft and the process of adjudication and appellate procedures have been described. 10RNB Global University, Bikaner.
  • 11. IT Act-2000  Structure of IT Act:  Then the Act goes on to define and describe some of the well-known cyber crimes and lays down the punishments therefore.  Then the concept of due diligence, role of intermediaries and some miscellaneous provisions have been described. 11RNB Global University, Bikaner.
  • 12. IT Act-2000  What is the applicability of IT Act? .  The Act extends to the whole of India and except as otherwise provided, it also applies to any offence or contravention there under committed outside India by any person. 12RNB Global University, Bikaner.
  • 13. IT Act-2000  What is the applicability of IT Act? .  Specific exclusion(s) to the Act where it is not applicable are:  Negotiable instrument (other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881;  A power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882;  A trust as defined in section 3 of the Indian Trusts Act, 1882  A will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition. 13RNB Global University, Bikaner.
  • 14. IT Act-2000  WHAT IS A CYBER CRIME? .  Cyber Crime is not defined officially in IT Act or in any other legislation. In fact, it cannot be too. Offence or crime has been dealt with elaborately listing various acts and the punishments for each, under the Indian Penal Code, 1860 and related legislations. Hence, the concept of cyber crime, is just a "combination of crime and computer". 14RNB Global University, Bikaner.
  • 15. IT Act-2000  WHAT IS A CYBER CRIME? .  Cybercrime in a narrow sense (computer crime): Any illegal behaviour directed by means of electronic operations that targets the security of computer systems and the data processed by them. 15RNB Global University, Bikaner.
  • 16. IT Act-2000  WHAT IS A CYBER CRIME? .  Cybercrime in a broader sense (computer- related crime): Any illegal behaviour committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network.  Any contract for the sale or conveyance of immovable property or any interest in such property;  Any such class of documents or transactions as may be notified by the Central Government. 16RNB Global University, Bikaner.
  • 17. IT Act-2000  SELECTED IT Act Section? .  Section 43 - Penalty and Compensation for damage to computer, computer system, etc. (Mphasis BPO Fraud: 2005 )  Section 65 - Tampering with Computer Source Documents. (Programme change)  Section 66 - Computer Related Offences. (unauthorised access) 17RNB Global University, Bikaner.
  • 18. IT Act-2000  SELECTED IT Act Section? .  Section 66A - Punishment for sending offensive messages through communication service. (Fake profile; Hoax E-mail)  Section 66C - Punishment for identity theft.  Section 66D - Punishment for cheating by impersonation by using computer resource.  Section 66E - Punishment for violation of privacy (MMS) 18RNB Global University, Bikaner.
  • 19. IT Act-2000  SELECTED IT Act Section? .  Section-66F - Cyber Terrorism.  Section 67 - Punishment for publishing or transmitting obscene material in electronic form. (defacing org./individual)  Section 67B - Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form. 19RNB Global University, Bikaner.
  • 20. IT Act-2000  SELECTED IT Act Section? .  Section 69 - Powers to issue directions for interception or monitoring or decryption of any information through any computer resource. 20RNB Global University, Bikaner.
  • 21. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . a. Harassment via fake public profile on social networking site - A fake profile of a person is created on a social networking site with the correct address, residential information or contact details but he/she is labelled as ‘prostitute’ or a person of ‘loose character’. This leads to harassment of the victim. (Sec-66A, 67) 21RNB Global University, Bikaner.
  • 22. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . b. Online Hate Community - Online hate community is created inciting a religious group to act or pass objectionable remarks against a country, national figures etc. (Sec- 66A) 22RNB Global University, Bikaner.
  • 23. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . c. Email Account Hacking - If victim’s email account is hacked and obscene emails are sent to people in victim’s address book. (Sec- 43, 66, 66A, 66C, 67, 67A, 67B). d. Credit Card Fraud - Unsuspecting victims would use infected computers to make online transactions (Sec- 43, 66, 66C, 66D ). 23RNB Global University, Bikaner.
  • 24. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . e. Web Defacement - The homepage of a website is replaced with a pornographic or defamatory page. Government sites generally face the wrath of hackers on symbolic days (sec-43 and 66 ). 24RNB Global University, Bikaner.
  • 25. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . f. Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs- All of the above are some sort of malicious programs which are used to destroy or gain access to some electronic information (Sec-43, 66, 66A). 25RNB Global University, Bikaner.
  • 26. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . g. Cyber Terrorism - Many terrorists are use virtual(GDrive, FTP sites) and physical storage media(USB’s, hard drives) for hiding information and records of their illicit business (Sec-69). h. Online sale of illegal Articles - Where sale of narcotics, drugs weapons and wildlife is facilitated by the Internet (Generally conventional laws applicable) 26RNB Global University, Bikaner.
  • 27. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . i. Cyber Pornography - Among the largest businesses on Internet. Pornography may not be illegal in many countries, but child pornography is (Sec-67, 67A and 67B ). j. Phishing and Email Scams - Phishing involves fraudulently acquiring sensitive information through masquerading a site as a trusted entity. (E.g. Passwords, credit card information) (Sec-66, 66A and 66D ). 27RNB Global University, Bikaner.
  • 28. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . k. Theft of Confidential Information: Many business organizations store their confidential information in computer systems. This information is targeted by rivals, criminals and disgruntled employees. (Sec-43,66,66B). l. Source Code Theft: A Source code generally is the most coveted and important "crown jewel" asset of a company. (Sec- 43,66,66B). 28RNB Global University, Bikaner.
  • 29. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . m. Tax Evasion and Money Laundering: Money launderers and people doing illegal business activities hide their information in virtual as well as physical activities.(Income Tax Act). 29RNB Global University, Bikaner.
  • 30. IT Act-2000  COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL ASPECTS? . n. Online Share Trading Fraud: It has become mandatory for investors to have their demat accounts linked with their online banking accounts which are generally accessed unauthorized, thereby leading to share trading frauds (43,66,66C,66D). 30RNB Global University, Bikaner.
  • 31. IT Act-2000  PENALTIES, COMPENSATION AND ADJUDICATION SECTIONS?.  Section 43: Penalty & Compensation for damage to computer, computer system: He shall be liable to pay damages by way of compensation to the person so affected.  Section 43A: Compensation for failure to protect data: Party shall be liable to pay damages by way of compensation, not exceeding five crore rupees, to the person so affected. 31RNB Global University, Bikaner.
  • 32. IT Act-2000  PENALTIES, COMPENSATION AND ADJUDICATION SECTIONS?.  Section 44: Penalty for failure to furnish information or return, etc. If any person who is required under this Act o any rules or regulations made there under to – a. Fails to furnish document/report to the certifying authority shall be liable to a penalty not exceeding one lakh and fifty thousand rupees for each such failure. b. fails to file returns or furnish books or other documents within specified time, shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure continues. c. Maintain books of account or records, fails to maintain the same, he shall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure continues. 32RNB Global University, Bikaner.
  • 33. IT Act-2000  PENALTIES, COMPENSATION AND ADJUDICATION SECTIONS?.  Section 45 – Residuary Penalty Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided, shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees. 33RNB Global University, Bikaner.
  • 34. IT Act-2000  PENALTIES, COMPENSATION AND ADJUDICATION SECTIONS?.  Section 45 – Residuary Penalty Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided, shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees. 34RNB Global University, Bikaner.
  • 35. IT Act-2000  PENALTIES, COMPENSATION AND ADJUDICATION SECTIONS?.  Section 47 Factors to be taken into account by the adjudicating officer - adjudicating officer shall have due regard to the following factors (a) The amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; (b) The amount of loss caused to the person as a result of the default, (c) The repetitive nature of the default 35RNB Global University, Bikaner.
  • 36. IT Act-2000 – Electronic Governance Chap-III 4. Legal recognition of electronic records:  Where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is- (a) rendered or made available in an electronic form; and (b) accessible so as to be usable for a subsequent reference. 36RNB Global University, Bikaner.
  • 37. 5. Legal recognition of digital signatures  Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document shall be signed or bear the signature of any person (hen, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of digital signature affixed in such manner as may be prescribed by the Central Government. Explanation.- For the purposes of this section,37RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 38. 5. Legal recognition of digital signatures  Explanation.- For the purposes of this section, "signed", with its grammatical variations and cognate expressions, shall, with reference to a person, mean affixing of his hand written signature or any mark on any document and the expression "signature" shall be construed accordingly. . 38RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 39. 6. Use of electronic records and digital signatures in Government and its agencies. (1) Where any law provides for- (a) the filing of any form. application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in a particular manner; (b) the issue or grant of any licence, permit, sanction or approval by whatever name called in a particular manner; 39RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 40. 6. Use of electronic records and digital signatures in Government and its agencies. (1) Where any law provides for- (c) the receipt or payment of money in a particular manner.  Then, notwithstanding anything contained in any other law for the time being in force, such requirement shall be deemed to have been satisfied if such filing, issue, grant, receipt or payment, as the case may be, is effected by means of such electronic form as may be40RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 41. 6. Use of electronic records and digital signatures in Government and its agencies. (2) The appropriate Government may, for the purposes of sub-section (1), by rules, prescribe- (a) the manner and format in which such electronic records shall be filed, created or issued; (b) the manner or method of payment of any fee or charges for filing, creation or issue any electronic record under clause41RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 42. 7. Retention of electronic records: (1) Where any law provides that documents, records or information shall be retained for any specific period, then, that requirement shall be deemed to have been satisfied if such documents, records or information are retained in the electronic form, if- (a) the information contained therein remains accessible so as to be usable for a subsequent reference; (b) the electronic record is retained in the format in which it was originally generated, sent or received or in a format which can be demonstrated to represent accurately the information originally generated, sent or received; 42RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 43. 7. Retention of electronic records: (c) the details which will facilitate the identification of the origin, destination, date and time of despatch or receipt of such electronic record are available in the electronic record:  Provided that this clause does not apply to any information which is automatically generated solely for the purpose of enabling an electronic record to be despatched or received. (2) Nothing in this section shall apply to any law that expressly provides for the retention of documents, records or information in the form of electronic records 43RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-III
  • 44.  Attribution, Acknowledgment And Despatch of Electronic Records: 11. Attribution of electronic records:  An electronic record shall be attributed to the originator— (a) if it was sent by the originator himself; (b) by a person who had the authority to act on behalf of the originator in respect of that electronic record; or (c) by an information system programmed by or on behalf of the originator to operate automatically. 44RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-IV
  • 45.  Attribution, Acknowledgment And Despatch of Electronic Records: 12. Acknowledgment of receipt: (1) Where the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, an acknowledgment may be given by- (a) any communication by the addressee, automated or otherwise; or (b) any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received. 45RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-IV
  • 46.  Attribution, Acknowledgment And Despatch of Electronic Records: 12. Acknowledgment of receipt: (2) Where the originator has stipulated that the electronic record shall be binding only on receipt of an acknowledgment of such electronic record by him, then unless acknowledgment has been so received, the electronic record shall be deemed to have been never sent by the originator. 46RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-IV
  • 47.  Attribution, Acknowledgment And Despatch of Electronic Records: 12. Acknowledgment of receipt: (3) Where the originator has not stipulated that the electronic record shall be binding only on receipt of such acknowledgment, and the acknowledgment has not been received by the originator within the time specified or agreed or, if no time has been specified or agreed to within a reasonable time, then the originator may give notice to the addressee stating that no acknowledgment has been received by him and specifying a reasonable time by which the acknowledgment must be received by him and if no acknowledgment is received within the aforesaid time limit he may after giving notice to the addressee, treat the electronic record as though it has never been sent. 47RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-IV
  • 48. 14. Secure electronic record: Where any security procedure has been applied to an electronic record at a specific point of time. then such record shall be deemed to be a secure electronic record from such point of time to the time of verification. 48RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-V
  • 49. 15. Secure digital signature : If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was— (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature. 49RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-V
  • 50. 16. Secure procedure: The Central Government shall for the purposes of this Act prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, including— (a) the nature of the transaction; (b) the level of sophistication of the parties with reference to their technological capacity; or communications. 50RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-V
  • 51. 16. Secure procedure: (d) the availability of alternatives offered to but rejected by any party; (e) the cost of alternative procedures; and (f) the procedures in general use for similar types of transactions or communications. 51RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-V
  • 52. 17. Appointment of Controller and other officers: (1) The Central Government may, by notification in the Official Gazette, appoint a Controller of Certifying Authorities for the purposes of this Act and may also by the same or subsequent notification appoint such number of Deputy Controllers and Assistant Controllers as it deems fit. (2) The Controller shall discharge his functions under this Act subject to the general control and directions of the Central Government. (3) The Deputy Controllers and Assistant Controllers shall perform the functions assigned to them by the Controller under the general superintendence and control of the Controller. 52RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 53. 17. Appointment of Controller and other officers: (4) The qualifications, experience and terms and conditions of service of Controller, Deputy Controllers and Assistant Controllers shall be such as may be prescribed by the Central Government. (5) The Head Office and Branch Office of the office of the Controller shall be at such places as the Central Government may specify, and these may be established at such places as the Central Government may think fit. (6) There shall be a seal of the Office of the Controller. 53RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 54. 18. Functions of Controller: The Controller may perform all or any of the following functions, namely:— (a) exercising supervision over the activities of the Certifying Authorities; (b) certifying public keys of the Certifying Authorities; (c) laying down the standards to be maintained by the Certifying Authorities; (d) specifying the qualifications and experience which employees of the Certifying Authorities should possess; (e) specifying the conditions subject to which the Certifying Authorities shall conduct their business; 54RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 55. 18. Functions of Controller: The Controller may perform all or any of the following functions, namely:— (f) specifying the contents of written, printed or visual materials and advertisements that may be distributed or used in respect of a Digital Signature Certificate and the public key; (g) specifying the form and content of a Digital Signature Certificate and the key, (h) specifying the form and manner in which accounts shall be maintained by the Certifying Authorities; 55RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 56. 18. Functions of Controller: The Controller may perform all or any of the following functions, namely:— (i) specifying the terms and conditions subject to which auditors may be appointed and the remuneration to be paid to them; (j) facilitating the establishment of any electronic system by a Certifying Authority either solely or jointly with other Certifying Authorities and regulation of such systems; (k) specifying the manner in which the Certifying Authorities shall conduct their dealings with the subscribers; 56RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 57. 18. Functions of Controller: The Controller may perform all or any of the following functions, namely:— (l) resolving any conflict of interests between the Certifying Authorities and the subscribers; (m) laying down the duties of the Certifying Authorities; (n) maintaining a data base containing the disclosure record of every Certifying Authority containing such particulars as may be specified by regulations, which shall be accessible to public. 57RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 58. 20. Controller to act as repository: (1) The Controller shall be the repository of all Digital Signature Certificates issued under this Act. (2) The Controller shall— (a) make use of hardware, software and procedures that are secure from intrusion and misuse; (b) observe such other standards as may be prescribed by the Central Government, to ensure that the secrecy and security of the digital signatures are assured. 58RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 59. 20. Controller to act as repository: (3) The Controller shall maintain a computerised data base of all public keys in such a manner that such data base and the public keys are available to any member of the public. 59RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 60. 21. Licence to issue Digital Signature Certificates: (1) Subject to the provisions of sub-section (2), any person may make an application, to the Controller, for a licence to issue Digital Signature Certificates. (2) No licence shall be issued under sub-section (1), unless the applicant fulfills such requirements with respect to qualification, expertise, manpower, financial resources and other infrastructure facilities, which are necessary to issue Digital Signature Certificates as may be prescribed by the Central Government. 60RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 61. 21. Licence to issue Digital Signature Certificates: (3) A licence granted under this section shall— (a) be valid for such period as may be prescribed by the Central Government; (b) not be transferable or heritable; (c) be subject to such terms and conditions as may be specified by the regulations. 61RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 62. 24. Procedure for grant or rejection of licence : The Controller may, on receipt of an application under sub-section (1) of section 21, after considering the documents accompanying the application and such other factors, as he deems fit, grant the licence or reject the application:  Provided that no application shall be rejected under this section unless the applicant has been given a reasonable opportunity of presenting his case. 62RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 63. 30. Disclosure: (1) Every Certifying Authority shall disclose in the manner specified by regulations— (a) its Digital Signature Certificate which contains the public key corresponding to the private key used by that Certifying Authority to digitally sign another Digital Signature Certificate; (b) any certification practice statement relevant thereto; (c) notice of the revocation or suspension of its Certifying Authority certificate, if any; and 63RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 64. 30. Disclosure: (d) any other fact that materially and adversely affects either the reliability of a Digital Signature Certificate, which that Authority has issued, or the Authority's ability to perform its services. (2) Where in the opinion of the Certifying Authority any event has occurred or any situation has arisen which may materially and adversely affect the integrity of its computer system or the conditions subject to which a Digital Signature Certificate was granted, then, the Certifying Authority shall— 64RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 65. 30. Disclosure: (a) use reasonable efforts to notify any person who is likely to be affected by that occurrence; or (b) act in accordance with the procedure specified in its certification practice statement to deal with such event or situation. 65RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VI
  • 66. 40. Generating key pair: Where any Digital Signature Certificate, the public key of which corresponds to the private key of that subscriber which is to be listed in the Digital Signature Certificate has been accepted by a subscriber, then, the subscriber shall generate the key pair by applying the security procedure. 66RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VIII - DUTIES OF SUBSCRIBERS
  • 67. 41. Acceptance of Digital Signature Certificate: (1) A subscriber shall be deemed to have accepted a Digital Signature Certificate if he publishes or authorises the publication of a Digital Signature Certificate— (a) to one or more persons; (b) in a repository, or otherwise demonstrates his approval of the Digital Signature Certificate in any manner. 67RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VIII - DUTIES OF SUBSCRIBERS
  • 68. 41. Acceptance of Digital Signature Certificate: (2) By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate that— (a) the subscriber holds the private key corresponding to the public key listed in the Digital Signature Certificate and is entitled to hold the same; (b) all representations made by the subscriber to the Certifying Authority and all material relevant to the information contained in the Digital Signature Certificate are true; (c) all information in the Digital Signature Certificate that is within the knowledge of the subscriber is true. 68RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VIII - DUTIES OF SUBSCRIBERS
  • 69. 42. Control of private key: (1) Every subscriber shall exercise reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Certificate and take all steps to prevent its disclosure to a person not authorised to affix the digital signature of the subscriber. (2) If the private key corresponding to the public key listed in the Digital Signature Certificate has been compromised, then, the subscriber shall communicate the same without any delay to the Certifying Authority in such manner as may be specified by .the regulations. 69RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-VIII - DUTIES OF SUBSCRIBERS
  • 70. 48. Establishment of Cyber Appellate Tribunal: (1) The Central Government shall, by notification, establish one or more appellate tribunals to be known as the Cyber Regulations Appellate Tribunal. (2) The Central Government shall also specify, in the notification referred to in subsection (1), the matters and places in relation to which the Cyber Appellate Tribunal may exercise jurisdiction. 70RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 71. 49. Composition of Cyber Appellate Tribunal: A Cyber Appellate Tribunal shall consist of one person only (hereinafter referred to as the Residing Officer of the Cyber Appellate Tribunal) to be appointed, by notification, by the Central Government. 50. Qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal: A person shall not be qualified for appointment as the Presiding Officer of a Cyber Appellate Tribunal unless he— (a) is, or has been. or is qualified to be, a Judge of a High Court; or (b) is or has been a member of the Indian Legal Service and is holding or has held a post in Grade I of that Service for at least three years. 71RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 72. 51. Term of office: The Presiding Officer of a Cyber Appellate Tribunal shall hold office for a term of five years from the date on which he enters upon his office or until he attains the age of sixty-five years, whichever is earlier. 72RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 73. 52. Salary, allowances and other terms and Conditions of service of Presiding Officer: The salary and allowances payable to, and the other terms and conditions of service including pension, gratuity and other retirement benefits of. the Presiding Officer of a Cyber Appellate Tribunal shall be such as may be prescribed:  Provided that neither the salary and allowances nor the other terms and conditions of service of the Presiding Officer shall be varied to his disadvantage after appointment. 73RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 74. 54. Resignation and removal: (1) The Presiding Officer of a Cyber Appellate Tribunal may, by notice in writing under his hand addressed to the Central Government, resign his office.  Provided that the said Presiding Officer shall, unless he is permitted by the Central Government to relinquish his office sooner, continue to hold office until the expiry of three months from the date of receipt of such notice or until a person duly appointed as his successor enters upon his office or until the expiry of his term of office, whichever is the earliest. 74RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 75. 54. Resignation and removal: (2) The Presiding Officer of a Cyber Appellate Tribunal shall not be removed from his office except by an order by the Central Government on the ground of proved misbehaviour or incapacity after an inquiry made by a Judge of the Supreme Court in which the Presiding Officer concerned has been informed of the charges against him and given a reasonable opportunity of being heard in respect of these charges. (3) The Central Government may, by rules, regulate the procedure for the investigation of misbehaviour or incapacity of the aforesaid Presiding Officer. 75RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 76. 57. Appeal to Cyber Appellate Tribunal: (1) Same as provided in sub-section (2), any person aggrieved by an order made by Controller or an adjudicating officer under this Act may prefer an appeal to a Cyber Appellate Tribunal having jurisdiction in the matter. (2) No appeal shall lie to the Cyber Appellate Tribunal from an order made by an adjudicating officer with the consent of the parties. 76RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 77. 57. Appeal to Cyber Appellate Tribunal: (3) Every appeal under sub-section (1) shall be filed within a period of forty-five days from the date on which a copy of the order made by the Controller or the adjudicating officer is received by the person aggrieved and it shall be in such form and be accompanied by such fee as may be prescribed:  Provided that the Cyber Appellate Tribunal may entertain an appeal after the expiry of the said period of forty-five days if it is satisfied that there was sufficient cause tor not filing it within that period. 77RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 78. 57. Appeal to Cyber Appellate Tribunal: (4) On receipt of an appeal under sub-section (1), the Cyber Appellate Tribunal may, after giving the parties to the appeal, an opportunity of being heard, pass such orders thereon as it thinks fit, confirming, modifying or setting aside the order appealed against. (5) The Cyber Appellate Tribunal shall send a copy of every order made by it to" the parties to the appeal and to the concerned Controller or adjudicating officer. (6) The appeal filed before the Cyber Appellate Tribunal under sub-section (1) shall be dealt with by it as expeditiously as possible and endeavour shall be made by it to dispose of the appeal finally within six months from the date of receipt of the appeal. 78RNB Global University, Bikaner. IT Act-2000 – Electronic Governance Chap-X - THE CYBER REGULATIONS APPELLATE
  • 79. Review  IT Act-2000.  Digital Signature.  Electronic Records.  Digital Signature Certificates.  Appellate Tribunal & Offences  Cyber crimes. 79RNB Global University, Bikaner.
  • 80. Thank You! RNB Global University, Bikaner. 80