SlideShare une entreprise Scribd logo
1  sur  38
Information Technology Act 2000
Shikha Sachdev
Karan Bhatia
Kunal Khatwani
Akshat Agarwal
Vishesh Dalal
IT Act, 2000
Enacted on 17th
May
2000- India is 12th
nation in the world to
adopt cyber laws
IT Act is based on
Model law on e-
commerce adopted by
UNCITRAL
Objectives of the IT Act
To provide legal recognition for transactions:-
Carried out by means of electronic data
interchange, and other means of electronic
communication, commonly referred to as
"electronic commerce“
To facilitate electronic filing of documents with
Government agencies and E-Payments
To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act
1891,Reserve Bank of India Act ,1934
Extent of application
Extends to whole of India and also applies to any
offence or contravention there under committed
outside India by any person {section 1 (2)} read
with Section 75- Act applies to offence or
contravention committed outside India by any
person irrespective of his nationality, if such act
involves a computer, computer system or network
located in India
Definitions ( section 2)
 "electronic record" means date, record or date generated, image or
sound stored, received or sent in an electronic form or micro film or
computer generated micro fiche;
 “secure system” means computer hardware, software, and
procedure that- 
(a)    are reasonably secure from unauthorized access and misuse;
(b)   provide a reasonable level of reliability and correct operation;
(c)    are reasonably suited to performing the intended function; and
(d) adhere to generally accepted security procedures
 “security procedure” means the security procedure prescribed by
the Central Government under the IT Act, 2000.
 secure electronic record – where any security procedure has been
applied to an electronic record at a specific point of time, then such
record shall be deemed to be a secure electronic record from such
point of time to the time of verification
Act is not applicable to…
 (a) a negotiable instrument (Other than a cheque) as defined
in section 13 of the Negotiable Instruments Act, 1881;
 (b) a power-of-attorney as defined in section 1A of the
Powers-of-Attorney Act, 1882;
 (c) a trust as defined in section 3 of the Indian Trusts Act,
1882;
Act is not applicable to…
(d) a will as defined in clause (h) of section 2 of
the Indian Succession Act, 1925 including any
other testamentary disposition
(e) any contract for the sale or conveyance of
immovable property or any interest in such
property;
(f) any such class of documents or
transactions as may be notified by the Central
Government
DIGITAL SIGNATURE AND
ELECTRONIC SIGNATURE
DIGITAL SIGNATURE
Digital signature means authentication of any electronic
record by a subscriber by means of an electronic method
or procedure.
CREATION OF DIGITAL SIGNATURE
To sign an electronic record or any other item of
information the signer shall first apply the hash function
in the signers software.
The signers software transform the hash result into a
digital signature using signers private key.
The digital signature shall be attached to its electronic
record and stored or transmitted with the electronic
record.
Manner in which information be authenticated by
means of digital signature :
 A digital signature shall-
a.Be created and verified by cryptography
b.Use what is known as “PUBLIC KEY
CRYPTOGRAPHY”.
Verification of digital signature
Verification means to determine whether:-
a.The initial electronic record was affixed.
b.The initial electronic record is retained.
DIGITAL SIGNATURE CERTIFICATE
REPRESENATION UPON ISSUANCE OF
DIGITAL SIGNATURE CERTIFICATE
EXPIRY OF DIGITAL SIGNATURE
CERTIFICATE
FEES FOR ISSUE OF DIGITAL SIGNATURE
CERTIFICATE
CONTENT OF DIGITAL SIGNATURE
CERTIFICATE
GENERATION OF DIGITAL SIGNATURE
CERTIFICATE
COMPROMISE OF DIGITAL SIGNATURE
CERTIFICATE
SUSPENSION OF DIGITAL SIGNATURE
CERTIFICATE.
ARCHIVAL OF DIGITAL SIGNATURE
CERTIFICATE
ELECTRONIC SIGNATURE
Electronic signature means authentication of any
electronic record by a subscriber of the electronic
technique specified in the second schedule and
includes digital signature.
The electronic signature was adopted by the United
Nation Commission on International Trade Law in the
year 2001 which came into force from 27.10.2009
Rules In Respect Of Electronic Signature :
Electronic Signature Certificate
Certification Practice Statement
SUBSCRIBER
Subscriber means a person in whose name the
digital/electronic signature certificate is issued.
The method used to verify and authenticate the identity
of a subscriber is known as “Subscriber Identity
Verification Method”.
Duties Of Subscriber
1.Generating key pair
2.On acceptance of Digital Signature Certificate
3.Control of private key
Electronic Governance &
Electronic Records
Electronic Commerce
EC transactions over the
Internet include
 Formation of Contracts
 Delivery of Information and
Services
 Delivery of Content
Future of Electronic
Commerce depends on
“the trust that the transacting
parties place in the security
of the transmission and
content of their
communications”
Electronic World
 Electronic document produced by a
computer. Stored in digital form,
and cannot be perceived without
using a computer
 It can be deleted, modified and
rewritten without leaving a mark
 Integrity of an electronic
document is “genetically”
impossible to verify
 A copy is indistinguishable from
the original
 It can’t be sealed in the
traditional way, where the author
affixes his signature
 The functions of identification,
declaration, proof of electronic
documents carried out using a
digital signature based on
cryptography.
Electronic World
 Digital signatures created and verified using cryptography
 Public key System based on Asymmetric keys
 An algorithm generates two different and related keys
 Public key
 Private Key
 Private key used to digitally sign.
 Public key used to verify.
Public Key Infrastructure
Allow parties to have free access to the signer’s
public key
This assures that the public key corresponds to
the signer’s private key
Trust between parties as if they know one another
Parties with no trading partner agreements,
operating on open networks, need to have
highest level of trust in one another
Government has to provide the definition of
the structure of PKI
the number of levels of authority and their juridical
form (public or private certification)
which authorities are allowed to issue key pairs
the extent to which the use of cryptography should
be authorised for confidentiality purposes
whether the Central Authority should have access to
the encrypted information; when and how
the key length, its security standard and its time
validity
Role of the Government
Certificate based Key
Management
 Operated by trusted-third party - CA
 Provides Trading Partners
Certificates
 Notarises the relationship between a
public key and its owner
CA
User A User B
CA A B
CA A CA B
Section 4- Legal recognition of
Electronic Records
 If any information is required in printed or written form under
any law the Information provided in electronic form, which is
accessible so as to be usable for subsequent use, shall be
deemed to satisfy the requirement of presenting the
document in writing or printed form.
Sections 5, 6 & 7
 Legal recognition of Digital Signatures
 Use of Electronic Records in Government & Its
Agencies
 Publications of rules and regulations in the Electronic
Gazette.
 Retention of Electronic Records
 Accessibility of information, same format, particulars of
dispatch, origin, destination, time stamp ,etc
CCA has to regulate the
functioning of CAs in the country by-
Licensing Certifying Authorities (CAs) under section
21 of the IT Act and exercising supervision over their
activities.
Certifying the public keys of the CAs, i.e. their Digital
Signature Certificates more commonly known as
Public Key Certificates (PKCs).
Laying down the standards to be maintained by the
CAs,
Addressing the issues related to the licensing
process
The licensing process
 Examining the application and accompanying documents as
provided in sections 21 to 24 of the IT Act, and all the Rules
and Regulations there- under;
 Approving the Certification Practice Statement(CPS);
 Auditing the physical and technical infrastructure of the
applicants through a panel of auditors maintained by the
CCA.
Audit Process
 Adequacy of security policies and implementation thereof;
 Existence of adequate physical security;
 Evaluation of functionalities in technology as it supports CA
operations;
 CA’s services administration processes and procedures;
 Compliance to relevant CPS as approved and provided by
the Controller;
 Adequacy to contracts/agreements for all outsourced CA
operations;
 Adherence to Information Technology Act 2000, the rules
and regulations thereunder, and guidelines issued by the
Controller from time-to-time.
ADJUDICATION,
PENALTIES AND
COMPENSATION
ADJUDICATION
 Every Adjudicating Officer shall have the powers of a Civil Court which
are conferred on the Cyber Appellate Tribunal and all proceedings
before the Adjudicating Officer shall be deemed to be a Civil Court. [sec
46].
 While Adjudging the quantum of compensation, the Adjudicating Officer
shall have due regard to the following factors:
I. the amount of unfair advantage, wherever quantifiable, made as a result
of the default.
II.The amount of the loss caused to any person as a result of the default.
III.The repetitive nature of the default. [sec 47].
ADJUDICATION
 Officer not below the rank of a director to the government or an equivalent
officer of a State Government, possessing the prescribed experience in the
field of Information technology and legal or judicial experience, shall be
appointed as an Adjudicating Officer by the CG to adjudge whether any person
has committed a contravention of any of the provisions of the Act, or of any
rule, regulation, direction or order made thereunder which renders him liable to
pay penalty or compensation
 The claim for injury or damage should not exceed rupees five crores.
 The jurisdiction in respect to claim for injury or damage exceeding rupees five
crores shall vest with competent court.
 Person liable to pay shall be given a reasonable opportunity for making
representation in the matter.
 After such an inquiry, if the adjudicating officer is satisfied that the person is
liable to pay he may impose the penalty he thinks fit in accordance with the
provisions of the applicable section
OFFENCES, COMPENSATION
AND PENALTIES
1. Penalty and compensation for damage to computer, computer system etc:
If any person, without permission of the owner or any other person who is in
charge of the computer, computer system or computer network –
a. Accesses or secures access to such computer, computer system or computer
network;
b. Downloads, copies, extracts any data, computer database, or information;
c. Introduces any computer virus;
d. Damages or causes to damage the computer;
e. Disrupts or causes disruption;
f. Denies or causes to denial of access to any person authorized to access;
g. Steals,conceals,destroys .
(Upto 3 yrs or upto upto 5 lacs or both)
Microsoft Excel
Worksheet
TYPES OF CYBER CRIMES
 Cyber terrorism
 Cyber pornography
 Defamation
 Cyber stalking (section 509 IPC)
 Sale of illegal articles-narcotics,
weapons, wildlife
 Online gambling
 Intellectual Property crimes- software
piracy, copyright infringement,
trademarks violations, theft of
computer source code
 Email spoofing
 Forgery
 Phising
 Credit card frauds
Crime against property
Crime against Government
Crime against persons
© Seth Associates, 2008 All Rights Reserved
TYPES OF CYBER CRIMES
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Denial of
Service
attacks
Trojan
attacks
Web jacking
© Seth Associates, 2008 All Rights Reserved
Frequency of reporting
Cybercrime in India
During the year 2005, 179 cases were
registered under IT Act as compared to 68
cases during 2004 21.2% cases reported
from Karnataka, followed by
Maharashtra(26) , Tamil Nadu(22) and
Chhattisgarh and Rajasthan (18 each) out of
179 cases, 50% were related to Section 67 IT
Act.,125 persons were arrested. 74 cases of
hacking were reported wherein 41 were
arrested.
© Seth Associates, 2008 All Rights Reserved
Section 65: Source Code
Most important asset of software
companies
“Computer Source Code" means the
listing of programmes, computer
commands, design and layout
Ingredients
Knowledge or intention
Concealment, destruction, alteration
computer source code required to be
kept or maintained by law
Punishment
imprisonment up to three years and / or
 fine up to Rs. 2 lakh
Section 66: Hacking
• Ingredients
– Intention or Knowledge to cause wrongful loss
or damage to the public or any person
– Destruction, deletion, alteration, diminishing
value or utility or injuriously affecting
information residing in a computer resource
• Punishment
– imprisonment up to three years, and / or
– fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
Section 66 covers data theft aswell as data alterationSection 66 covers data theft aswell as data alteration
Sec. 67. Pornography
 Ingredients
 Publishing or transmitting or causing to be published
 in the electronic form,
 Obscene material
 Punishment
 On first conviction
 imprisonment of either description up to five years and
 fine up to Rs. 1 lakh
 On subsequent conviction
 imprisonment of either description up to ten years and
 fine up to Rs. 2 lakh
 Section covers
 Internet Service Providers,
 Search engines,
 Pornographic websites
 Cognizable, Non-Bailable, JMIC/ Court of Sessions
THANK YOUShikha Sachdev
Karan Bhatia
Kunal Khatwani
Akshat Agarwal
Vishesh Dalal

Contenu connexe

Tendances

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 

Tendances (20)

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
E contracts
E contractsE contracts
E contracts
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 

En vedette

digital law
digital lawdigital law
digital law11tsk
 
Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship12mk
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointTala
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnesspakkwok
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnessPat Bruinsma
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Electronic Transaction Act 2063 (ETA 2063)
Electronic Transaction Act 2063 (ETA 2063)Electronic Transaction Act 2063 (ETA 2063)
Electronic Transaction Act 2063 (ETA 2063)Krishna Pandey
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and securitymdhague
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 

En vedette (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Nehaa Chaudhari - WIPO Initiatives / NLSIU, 05.03.2016
Nehaa Chaudhari - WIPO Initiatives / NLSIU, 05.03.2016Nehaa Chaudhari - WIPO Initiatives / NLSIU, 05.03.2016
Nehaa Chaudhari - WIPO Initiatives / NLSIU, 05.03.2016
 
digital law
digital lawdigital law
digital law
 
Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship
 
Digital law
Digital lawDigital law
Digital law
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital law
Digital lawDigital law
Digital law
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Class it act
Class it actClass it act
Class it act
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
It act 2000
It act 2000It act 2000
It act 2000
 
Electronic Transaction Act 2063 (ETA 2063)
Electronic Transaction Act 2063 (ETA 2063)Electronic Transaction Act 2063 (ETA 2063)
Electronic Transaction Act 2063 (ETA 2063)
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber law in nepal and implementation
Cyber law in nepal and implementationCyber law in nepal and implementation
Cyber law in nepal and implementation
 
Wipo
WipoWipo
Wipo
 

Similaire à It act law ppt

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic SignaturesClaire Webber
 

Similaire à It act law ppt (20)

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
E-signing-3
E-signing-3E-signing-3
E-signing-3
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber
CyberCyber
Cyber
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic Signatures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 

Plus de Vishesh Dalal

E commerce - impact on credit card industry
E commerce - impact on credit card industryE commerce - impact on credit card industry
E commerce - impact on credit card industryVishesh Dalal
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-educationVishesh Dalal
 
robot, reconditioning, automation
robot, reconditioning, automation   robot, reconditioning, automation
robot, reconditioning, automation Vishesh Dalal
 
Cinepass investment-spend-plan
Cinepass investment-spend-planCinepass investment-spend-plan
Cinepass investment-spend-planVishesh Dalal
 
Blackberry 2013 project
Blackberry 2013 projectBlackberry 2013 project
Blackberry 2013 projectVishesh Dalal
 
Pearson education, greycell, blackberry
Pearson education, greycell, blackberryPearson education, greycell, blackberry
Pearson education, greycell, blackberryVishesh Dalal
 
Wars that india has fought
Wars that india has foughtWars that india has fought
Wars that india has foughtVishesh Dalal
 
The case study of michael dell
The case study of michael dellThe case study of michael dell
The case study of michael dellVishesh Dalal
 
Robot, reconditioning, automation
Robot, reconditioning, automationRobot, reconditioning, automation
Robot, reconditioning, automationVishesh Dalal
 

Plus de Vishesh Dalal (20)

E commerce - impact on credit card industry
E commerce - impact on credit card industryE commerce - impact on credit card industry
E commerce - impact on credit card industry
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-education
 
Reality shows final
Reality shows finalReality shows final
Reality shows final
 
robot, reconditioning, automation
robot, reconditioning, automation   robot, reconditioning, automation
robot, reconditioning, automation
 
Cinepass investment-spend-plan
Cinepass investment-spend-planCinepass investment-spend-plan
Cinepass investment-spend-plan
 
Vk engg
Vk enggVk engg
Vk engg
 
Education survery
Education  surveryEducation  survery
Education survery
 
Final reality shows
Final reality showsFinal reality shows
Final reality shows
 
Swoc
SwocSwoc
Swoc
 
Blackberry 2013 project
Blackberry 2013 projectBlackberry 2013 project
Blackberry 2013 project
 
Netherlands
NetherlandsNetherlands
Netherlands
 
Pearson education, greycell, blackberry
Pearson education, greycell, blackberryPearson education, greycell, blackberry
Pearson education, greycell, blackberry
 
Brazil
BrazilBrazil
Brazil
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Wars that india has fought
Wars that india has foughtWars that india has fought
Wars that india has fought
 
Aam aadmi party
Aam aadmi partyAam aadmi party
Aam aadmi party
 
The case study of michael dell
The case study of michael dellThe case study of michael dell
The case study of michael dell
 
Robot, reconditioning, automation
Robot, reconditioning, automationRobot, reconditioning, automation
Robot, reconditioning, automation
 
Netherlands
NetherlandsNetherlands
Netherlands
 
Dell case
Dell caseDell case
Dell case
 

Dernier

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Dernier (20)

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

It act law ppt

  • 1. Information Technology Act 2000 Shikha Sachdev Karan Bhatia Kunal Khatwani Akshat Agarwal Vishesh Dalal
  • 2. IT Act, 2000 Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws IT Act is based on Model law on e- commerce adopted by UNCITRAL
  • 3. Objectives of the IT Act To provide legal recognition for transactions:- Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“ To facilitate electronic filing of documents with Government agencies and E-Payments To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 4. Extent of application Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India
  • 5. Definitions ( section 2)  "electronic record" means date, record or date generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche;  “secure system” means computer hardware, software, and procedure that-  (a)    are reasonably secure from unauthorized access and misuse; (b)   provide a reasonable level of reliability and correct operation; (c)    are reasonably suited to performing the intended function; and (d) adhere to generally accepted security procedures  “security procedure” means the security procedure prescribed by the Central Government under the IT Act, 2000.  secure electronic record – where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification
  • 6. Act is not applicable to…  (a) a negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881;  (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882;  (c) a trust as defined in section 3 of the Indian Trusts Act, 1882;
  • 7. Act is not applicable to… (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition (e) any contract for the sale or conveyance of immovable property or any interest in such property; (f) any such class of documents or transactions as may be notified by the Central Government
  • 9. DIGITAL SIGNATURE Digital signature means authentication of any electronic record by a subscriber by means of an electronic method or procedure. CREATION OF DIGITAL SIGNATURE To sign an electronic record or any other item of information the signer shall first apply the hash function in the signers software. The signers software transform the hash result into a digital signature using signers private key. The digital signature shall be attached to its electronic record and stored or transmitted with the electronic record.
  • 10. Manner in which information be authenticated by means of digital signature :  A digital signature shall- a.Be created and verified by cryptography b.Use what is known as “PUBLIC KEY CRYPTOGRAPHY”. Verification of digital signature Verification means to determine whether:- a.The initial electronic record was affixed. b.The initial electronic record is retained.
  • 11. DIGITAL SIGNATURE CERTIFICATE REPRESENATION UPON ISSUANCE OF DIGITAL SIGNATURE CERTIFICATE EXPIRY OF DIGITAL SIGNATURE CERTIFICATE FEES FOR ISSUE OF DIGITAL SIGNATURE CERTIFICATE CONTENT OF DIGITAL SIGNATURE CERTIFICATE
  • 12. GENERATION OF DIGITAL SIGNATURE CERTIFICATE COMPROMISE OF DIGITAL SIGNATURE CERTIFICATE SUSPENSION OF DIGITAL SIGNATURE CERTIFICATE. ARCHIVAL OF DIGITAL SIGNATURE CERTIFICATE
  • 13. ELECTRONIC SIGNATURE Electronic signature means authentication of any electronic record by a subscriber of the electronic technique specified in the second schedule and includes digital signature. The electronic signature was adopted by the United Nation Commission on International Trade Law in the year 2001 which came into force from 27.10.2009
  • 14. Rules In Respect Of Electronic Signature : Electronic Signature Certificate Certification Practice Statement SUBSCRIBER Subscriber means a person in whose name the digital/electronic signature certificate is issued. The method used to verify and authenticate the identity of a subscriber is known as “Subscriber Identity Verification Method”. Duties Of Subscriber 1.Generating key pair 2.On acceptance of Digital Signature Certificate 3.Control of private key
  • 16. Electronic Commerce EC transactions over the Internet include  Formation of Contracts  Delivery of Information and Services  Delivery of Content Future of Electronic Commerce depends on “the trust that the transacting parties place in the security of the transmission and content of their communications”
  • 17. Electronic World  Electronic document produced by a computer. Stored in digital form, and cannot be perceived without using a computer  It can be deleted, modified and rewritten without leaving a mark  Integrity of an electronic document is “genetically” impossible to verify  A copy is indistinguishable from the original  It can’t be sealed in the traditional way, where the author affixes his signature  The functions of identification, declaration, proof of electronic documents carried out using a digital signature based on cryptography.
  • 18. Electronic World  Digital signatures created and verified using cryptography  Public key System based on Asymmetric keys  An algorithm generates two different and related keys  Public key  Private Key  Private key used to digitally sign.  Public key used to verify.
  • 19. Public Key Infrastructure Allow parties to have free access to the signer’s public key This assures that the public key corresponds to the signer’s private key Trust between parties as if they know one another Parties with no trading partner agreements, operating on open networks, need to have highest level of trust in one another
  • 20. Government has to provide the definition of the structure of PKI the number of levels of authority and their juridical form (public or private certification) which authorities are allowed to issue key pairs the extent to which the use of cryptography should be authorised for confidentiality purposes whether the Central Authority should have access to the encrypted information; when and how the key length, its security standard and its time validity Role of the Government
  • 21. Certificate based Key Management  Operated by trusted-third party - CA  Provides Trading Partners Certificates  Notarises the relationship between a public key and its owner CA User A User B CA A B CA A CA B
  • 22. Section 4- Legal recognition of Electronic Records  If any information is required in printed or written form under any law the Information provided in electronic form, which is accessible so as to be usable for subsequent use, shall be deemed to satisfy the requirement of presenting the document in writing or printed form.
  • 23. Sections 5, 6 & 7  Legal recognition of Digital Signatures  Use of Electronic Records in Government & Its Agencies  Publications of rules and regulations in the Electronic Gazette.  Retention of Electronic Records  Accessibility of information, same format, particulars of dispatch, origin, destination, time stamp ,etc
  • 24. CCA has to regulate the functioning of CAs in the country by- Licensing Certifying Authorities (CAs) under section 21 of the IT Act and exercising supervision over their activities. Certifying the public keys of the CAs, i.e. their Digital Signature Certificates more commonly known as Public Key Certificates (PKCs). Laying down the standards to be maintained by the CAs, Addressing the issues related to the licensing process
  • 25. The licensing process  Examining the application and accompanying documents as provided in sections 21 to 24 of the IT Act, and all the Rules and Regulations there- under;  Approving the Certification Practice Statement(CPS);  Auditing the physical and technical infrastructure of the applicants through a panel of auditors maintained by the CCA.
  • 26. Audit Process  Adequacy of security policies and implementation thereof;  Existence of adequate physical security;  Evaluation of functionalities in technology as it supports CA operations;  CA’s services administration processes and procedures;  Compliance to relevant CPS as approved and provided by the Controller;  Adequacy to contracts/agreements for all outsourced CA operations;  Adherence to Information Technology Act 2000, the rules and regulations thereunder, and guidelines issued by the Controller from time-to-time.
  • 28. ADJUDICATION  Every Adjudicating Officer shall have the powers of a Civil Court which are conferred on the Cyber Appellate Tribunal and all proceedings before the Adjudicating Officer shall be deemed to be a Civil Court. [sec 46].  While Adjudging the quantum of compensation, the Adjudicating Officer shall have due regard to the following factors: I. the amount of unfair advantage, wherever quantifiable, made as a result of the default. II.The amount of the loss caused to any person as a result of the default. III.The repetitive nature of the default. [sec 47].
  • 29. ADJUDICATION  Officer not below the rank of a director to the government or an equivalent officer of a State Government, possessing the prescribed experience in the field of Information technology and legal or judicial experience, shall be appointed as an Adjudicating Officer by the CG to adjudge whether any person has committed a contravention of any of the provisions of the Act, or of any rule, regulation, direction or order made thereunder which renders him liable to pay penalty or compensation  The claim for injury or damage should not exceed rupees five crores.  The jurisdiction in respect to claim for injury or damage exceeding rupees five crores shall vest with competent court.  Person liable to pay shall be given a reasonable opportunity for making representation in the matter.  After such an inquiry, if the adjudicating officer is satisfied that the person is liable to pay he may impose the penalty he thinks fit in accordance with the provisions of the applicable section
  • 30. OFFENCES, COMPENSATION AND PENALTIES 1. Penalty and compensation for damage to computer, computer system etc: If any person, without permission of the owner or any other person who is in charge of the computer, computer system or computer network – a. Accesses or secures access to such computer, computer system or computer network; b. Downloads, copies, extracts any data, computer database, or information; c. Introduces any computer virus; d. Damages or causes to damage the computer; e. Disrupts or causes disruption; f. Denies or causes to denial of access to any person authorized to access; g. Steals,conceals,destroys . (Upto 3 yrs or upto upto 5 lacs or both)
  • 32. TYPES OF CYBER CRIMES  Cyber terrorism  Cyber pornography  Defamation  Cyber stalking (section 509 IPC)  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code  Email spoofing  Forgery  Phising  Credit card frauds Crime against property Crime against Government Crime against persons © Seth Associates, 2008 All Rights Reserved
  • 33. TYPES OF CYBER CRIMES Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking © Seth Associates, 2008 All Rights Reserved
  • 34. Frequency of reporting Cybercrime in India During the year 2005, 179 cases were registered under IT Act as compared to 68 cases during 2004 21.2% cases reported from Karnataka, followed by Maharashtra(26) , Tamil Nadu(22) and Chhattisgarh and Rajasthan (18 each) out of 179 cases, 50% were related to Section 67 IT Act.,125 persons were arrested. 74 cases of hacking were reported wherein 41 were arrested. © Seth Associates, 2008 All Rights Reserved
  • 35. Section 65: Source Code Most important asset of software companies “Computer Source Code" means the listing of programmes, computer commands, design and layout Ingredients Knowledge or intention Concealment, destruction, alteration computer source code required to be kept or maintained by law Punishment imprisonment up to three years and / or  fine up to Rs. 2 lakh
  • 36. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alterationSection 66 covers data theft aswell as data alteration
  • 37. Sec. 67. Pornography  Ingredients  Publishing or transmitting or causing to be published  in the electronic form,  Obscene material  Punishment  On first conviction  imprisonment of either description up to five years and  fine up to Rs. 1 lakh  On subsequent conviction  imprisonment of either description up to ten years and  fine up to Rs. 2 lakh  Section covers  Internet Service Providers,  Search engines,  Pornographic websites  Cognizable, Non-Bailable, JMIC/ Court of Sessions
  • 38. THANK YOUShikha Sachdev Karan Bhatia Kunal Khatwani Akshat Agarwal Vishesh Dalal