SlideShare une entreprise Scribd logo
1  sur  20
IT Act 2000
Presented by :
Shashank Bajpai
Content :
- Introduction of IT Act
- Amendments
- Section 65
- Section 66
- Section 67
- Section 68
- Section 69
- Section 70
- Section 71
- Section 72
- Section 73
- Section 77
- Copyright Act
- Freedom Of Speech
- Identity Theft
- Right To Internet Access
Introduction of IT Act:
 ITA-2000 was enacted on 9th June 2000 and commenced on 17th Oct 2000. It contains 90-
Sections, which are further divided into 13 chapters and 4 schedules.
 This Act has also affected few sections of Indian Penal Code like:
- The Indian Evidence Act (1872)
- The Bankers Book Evidence Act (1891)
- Reserve Bank of India Act (1934)
Amendments:
 In 2008 few major amendments were made which introduced Section 66A for "Offensive
Messages". It also added provisions for Pornography, Child Porn, Cyber Terrorism and Voyeurism.
Section 65
Tempering with computer source code.
Description:
If a person knowing or intentionally destroys/hinders any of the computer source code, computer
programme or for computer network which should be maintained by law.
Penalty:
Imprisonment up to three years or with fine up to ₹200000.
Section 66
Hacking with computers.
Description:
If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or alters any information residing in a computer
resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
Penalty:
Imprisonment up to three years, or/and with fine up to ₹500,000
Section 67
Publishing obscene information
Description:
• Publishing information which is obscene in electronic form.
• If a person publishes or transmits or causes to be published in the electronic form, any material
which is lascivious or appeals to the prurient interest of its effect is such as to tend to deprive and
corrupt persons who are likely, having regard to all relevant circumstances to read hear or see the
matter contained in it.
Penalty:
• Imprisonment Up to 5 years and with fine Up to 10,00,000.
Section 68
Power of Controller to give directions.
Description:
The Controller may, by order, direct a Certifying
Authority or any employee of such Authority to take such measures or cease carrying on
such activities as specified in the order if those are necessary to ensure compliance with the
provisions of this Act, rules or any regulations made thereunder.
Penalty:
Any person who intentionally or knowingly fails to comply with any order under sub-section shall
be guilty of an offence and shall be liable on conviction to imprisonment for a term not
exceeding
two years or a fine not exceeding one lakh rupees or with both.
Section 69
Failure of decrypt data.
Description:
The conversion of encrypted data into its original form is called Decryption. It is generally a reverse
process of encryption. It decodes the encrypted information so that an authorized user can only
decrypt the data because decryption requires a secret key or password.The subscriber or any person
in charge of the computer resource shall, when called upon by any agency which has been directed,
must extend all facilities and technical assistance to decrypt the information. The subscriber or any
person who fails to assist the agency referred is deemed to have committed a crime.
Penalty:
Imprisonment up to seven years and possible fine.
Section 70
Securing access or attempting to secure access to a protected system
Description:
The appropriate Government may, by notification in the Official Gazette, declare that any computer,
computer system or computer network to be a protected system.
The appropriate Government may
by order in writing, authorise the persons who are authorised to access protected systems. If a person who
secures access or attempts to secure access to a protected system, then he is committing an offence.
Penalty:
Imprisonment upto 10 years and fine also.
Section 71
Misreprentation.
Description:
A misrepresentation is an untrue statement of a material fact made by one party which affects the
other party's decision in corresponding to a contract. In such a contract dispute, the party who
made the misrepresentation becomes the defendant and the aggrieved party is the plaintiff.If
anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or
the Certifying Authority for obtaining any license or Digital Signature Certificate.
Penalty:
Imprisonment up to 2 years, or/and with fine up to ₹100,000
Section 72
Breach of confidentiality and privacy
Description:
If any person who, in pursuance of any of the powers conferred under this Act, rules or regulations
made thereunder, has secured access to any electronic record, book, register, correspondence,
information, document or other material without the consent of the person concerned discloses
such electronic record, book, register, correspondence, information, document or other material
to any other person shall be punished.
Penalty:
Imprisonment for a term which may extend to two years, or with fine which may extend to one lakh
rupees, or with both
Section 73
Penalty for publishing electronic Signature Certificate false in certain particulars
Description:
No person shall publish a Electronic Signature Certificate or otherwise make it available to any other
person with the knowledge that the Certifying Authority listed in the certificate has not issued it;
or the subscriber listed in the certificate has not accepted it; or the certificate has been revoked
or suspended, unless such publication is for the purpose of verifying a digital signature created
prior to such suspension or revocation.
Penalty:
Any person who contravenes the provisions of sub-section shall be punished with imprisonment for
a term which may extend to two years, or with fine which may extend to one lakh rupees, or with
both.
Section 77
- Compensation, penalties or confiscation not to interfere with other punishment.–No
compensation awarded, penalty imposed or confiscation made under this Act shall prevent the
award of compensation or imposition of any other penalty or punishment under any other law
for the time being in force.
Copyright Act
It’s a right to copy. This means that the original creators of products and anyone they give
authorization to are the only ones with the exclusive right to reproduce the work.Subject Matter
Of The Copyright :-
1. Literary,
2. Artistic,
3. Educational,
4. Musical Content.
In Simple Terms, It is a right to copy or reproduce the work for which the author has got
the copyright.
Freedom of speech
It supports an individual or a community to express their ideas and thoughts without fear of
retaliation or legal sanction. It comes under article 19(A). Freedom of speech can be considered as
hate speech , if it is against any community , gender , government, government officials, or on a
person at certain position. This law offers punishment for person who uses wrong or hate words for
anyone
Identity Theft
It is use of someone else's identity to gain some fame or financial advantage. It can harm and make
loss to other person.The person whose identity has been assumed may suffer adverse
consequences, especially if they are held responsible for the perpetrator's actions. Identity theft
occurs when someone uses another's personally identifying information, like their name, identifying
number, or credit card number, without their permission, to commit fraud or other crimes. The term
identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily
defined throughout both the U.K. and the United States as the theft of personally identifiable
information, generally including a person's name, date of birth, social security number, driver's
license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints,
passwords, or any other information that can be used to access a person's financial resources.
Right to internet access
The right to internet access is also called broadband. It means that every citizen have right to access
the internet and no one can restrict them. It is considered as the freedom of expression for
digitalization. It is really important aspect of today's life. So it is considered as fundamental right
also. This right comes under article 19 of constitution.
An argument can be made that internet access should be recognised as an independent
fundamental right, conceivable as an aspect of the right to life under Article 21.
Conclusion
As internet is the most important elements of todays life. It is very beneficial to us but at the same
time it can be very harmful if missused. So, to prevent us from being missguided by Cyberattack this
law was inforced and is very helpful to us.
THANKYOU !

Contenu connexe

Tendances (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
It act 2000
It act 2000It act 2000
It act 2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 

Similaire à Information Technology Act 2000

Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdfnithyam40
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxDivyaHinduja2
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesEquiCorp Associates
 

Similaire à Information Technology Act 2000 (20)

Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptx
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Cyber
CyberCyber
Cyber
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
it act
it act it act
it act
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 

Dernier

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Dernier (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Information Technology Act 2000

  • 1. IT Act 2000 Presented by : Shashank Bajpai
  • 2. Content : - Introduction of IT Act - Amendments - Section 65 - Section 66 - Section 67 - Section 68 - Section 69 - Section 70 - Section 71 - Section 72 - Section 73 - Section 77 - Copyright Act - Freedom Of Speech - Identity Theft - Right To Internet Access
  • 3. Introduction of IT Act:  ITA-2000 was enacted on 9th June 2000 and commenced on 17th Oct 2000. It contains 90- Sections, which are further divided into 13 chapters and 4 schedules.  This Act has also affected few sections of Indian Penal Code like: - The Indian Evidence Act (1872) - The Bankers Book Evidence Act (1891) - Reserve Bank of India Act (1934)
  • 4. Amendments:  In 2008 few major amendments were made which introduced Section 66A for "Offensive Messages". It also added provisions for Pornography, Child Porn, Cyber Terrorism and Voyeurism.
  • 5. Section 65 Tempering with computer source code. Description: If a person knowing or intentionally destroys/hinders any of the computer source code, computer programme or for computer network which should be maintained by law. Penalty: Imprisonment up to three years or with fine up to ₹200000.
  • 6. Section 66 Hacking with computers. Description: If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. Penalty: Imprisonment up to three years, or/and with fine up to ₹500,000
  • 7. Section 67 Publishing obscene information Description: • Publishing information which is obscene in electronic form. • If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest of its effect is such as to tend to deprive and corrupt persons who are likely, having regard to all relevant circumstances to read hear or see the matter contained in it. Penalty: • Imprisonment Up to 5 years and with fine Up to 10,00,000.
  • 8. Section 68 Power of Controller to give directions. Description: The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Penalty: Any person who intentionally or knowingly fails to comply with any order under sub-section shall be guilty of an offence and shall be liable on conviction to imprisonment for a term not exceeding two years or a fine not exceeding one lakh rupees or with both.
  • 9. Section 69 Failure of decrypt data. Description: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information. The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. Penalty: Imprisonment up to seven years and possible fine.
  • 10. Section 70 Securing access or attempting to secure access to a protected system Description: The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system. The appropriate Government may by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. Penalty: Imprisonment upto 10 years and fine also.
  • 11. Section 71 Misreprentation. Description: A misrepresentation is an untrue statement of a material fact made by one party which affects the other party's decision in corresponding to a contract. In such a contract dispute, the party who made the misrepresentation becomes the defendant and the aggrieved party is the plaintiff.If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate. Penalty: Imprisonment up to 2 years, or/and with fine up to ₹100,000
  • 12. Section 72 Breach of confidentiality and privacy Description: If any person who, in pursuance of any of the powers conferred under this Act, rules or regulations made thereunder, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished. Penalty: Imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both
  • 13. Section 73 Penalty for publishing electronic Signature Certificate false in certain particulars Description: No person shall publish a Electronic Signature Certificate or otherwise make it available to any other person with the knowledge that the Certifying Authority listed in the certificate has not issued it; or the subscriber listed in the certificate has not accepted it; or the certificate has been revoked or suspended, unless such publication is for the purpose of verifying a digital signature created prior to such suspension or revocation. Penalty: Any person who contravenes the provisions of sub-section shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 14. Section 77 - Compensation, penalties or confiscation not to interfere with other punishment.–No compensation awarded, penalty imposed or confiscation made under this Act shall prevent the award of compensation or imposition of any other penalty or punishment under any other law for the time being in force.
  • 15. Copyright Act It’s a right to copy. This means that the original creators of products and anyone they give authorization to are the only ones with the exclusive right to reproduce the work.Subject Matter Of The Copyright :- 1. Literary, 2. Artistic, 3. Educational, 4. Musical Content. In Simple Terms, It is a right to copy or reproduce the work for which the author has got the copyright.
  • 16. Freedom of speech It supports an individual or a community to express their ideas and thoughts without fear of retaliation or legal sanction. It comes under article 19(A). Freedom of speech can be considered as hate speech , if it is against any community , gender , government, government officials, or on a person at certain position. This law offers punishment for person who uses wrong or hate words for anyone
  • 17. Identity Theft It is use of someone else's identity to gain some fame or financial advantage. It can harm and make loss to other person.The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the United States as the theft of personally identifiable information, generally including a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.
  • 18. Right to internet access The right to internet access is also called broadband. It means that every citizen have right to access the internet and no one can restrict them. It is considered as the freedom of expression for digitalization. It is really important aspect of today's life. So it is considered as fundamental right also. This right comes under article 19 of constitution. An argument can be made that internet access should be recognised as an independent fundamental right, conceivable as an aspect of the right to life under Article 21.
  • 19. Conclusion As internet is the most important elements of todays life. It is very beneficial to us but at the same time it can be very harmful if missused. So, to prevent us from being missguided by Cyberattack this law was inforced and is very helpful to us.