SlideShare une entreprise Scribd logo
1  sur  23
Information Technology
Act 2000- An overview
Presented by,
Kinjal Vaghela(115330)
Usha Chaudhari(115328)
Need of Cyber Law
"The modern thief can steal more with a computer
than with a gun. Tomorrow's terrorist may be able to do
more damage with a keyboard than with a bomb".
National Research Council, U S A "Computers at
Risk”.1991
Need of Cyber Law
➢ Internet has dramatically changed Our life.
➢ Transition from paper to paperless world.
➢ Laws of real world can not be interpreted in the light
of emerging Cyberspace.
➢ Internet requires an enabling and supportive legal
infrastructure to tune with the times
Cyber Law ?
➢ Cyber Law is the law governing cyber space.
➢ Cyber space includes computers, networks, software's,
data storage devices (such as hard disks, USB disks etc),
the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Crime ?
➢ Any crime with the help of computer and
telecommunication technology.
➢ Any crime where either the computer is used
as an object or subject.
Categories of Cyber Crime
➢ Cybercrimes against persons.
➢ Cybercrimes against property.
➢ Cybercrimes against government.
Statistics of Cyber Crimes
IT Act-2000
➢ The Information Technology Act, 2000 (IT Act),
came into force on 17 October 2000.
➢ The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
filing of electronic records with the Government.
➢ Information Technology Act 2000 consisted of
94 sections segregated into 13 chapters.
IT Act-2000 : Objectives
➢ To provide legal recognition for transactions
➢ To facilitate electronic filing of documents with
the Government agencies.
➢ To amend the Indian Penal Code, The Indian
Evidence Act, 1872, The Banker's Book Evidence
Act, 1891 and the Reserve Bank of India
Act, 1934.
➢ Aims to provide the legal framework to all
electronic records.
10
Section 65
• Offence Name - Tampering with computer Source
documents.
• Description - If a person knowingly or intentionally
conceals, destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any computer
source code used for a computer, computer programme,
computer system or computer network, when the
computer source code is required to be kept or maintained
by law for the time being in force.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
11
Section 66
• Offence Name - Hacking with computer system
• Description - If a person with the intent to cause or
knowing that he is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or alters any
information residing in a computer resource or diminishes
its value or utility or affects it injuriously by any means,
commits hack.
• Penalty
Imprisonment up to three years, or/and with fine up
to 500,000
12
Section 66B
• Offence Name - Receiving stolen computer or communication
device
• Description - - A person receives or retains a computer
resource or communication device which is known to be
stolen or the person has reason to believe is stolen.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
13
Section 66C
• Offence Name - Using password of another person
• Description - A person fradulently uses the password, digital
signature or other unique identification of another person.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
14
Section 66D
• Offence Name - Cheating using computer resource
• Description - If a person cheats someone using a computer
resource or communication.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
15
Section 66E
• Offence Name - Publishing private images of others
• Description - If a person captures, transmits or publishes
images of a person's private parts without his/her consent or
knowledge.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
SECTION 67C
• Offence Name - Failure to maintain records
• Description:Persons deemed as
intermediatary (such as an ISP) must maintain
required records for stipulated time. Failure is
an offence.
17
Section 68
• Offence Name - Failure/refusal to comply with orders
• Description - The Controller may, by order, direct a Certifying
Authority or any employee of such Authority to take such
measures or cease carrying on such activities as specified in
the order if those are necessary to ensure compliance with
the provisions of this Act, rules or any regulations made
thereunder. Any person who fails to comply with any such
order shall be guilty of an offence.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
18
Section 70
• Offence Name - Securing access or attempting to secure
access to a protected system
• Description - The appropriate Government may, by
notification in the Official Gazette, declare that any
computer, computer system or computer network to be a
protected system.The appropriate Government may, by order
in writing, authorise the persons who are authorised to
access protected systems. If a person who secures access or
attempts to secure access to a protected system, then he is
committing an offence.
• Penalty
- Imprisonment up to ten years, or/and with fine
19
Section 71
• Offence Name - Misrepresentation
• Description - If anyone makes any misrepresentation
to, or suppresses any material fact from, the
Controller or the Certifying Authority for obtaining
any license or Digital Signature Certificate.
• Penalty
- Imprisonment up to three years, or/and with fine up
to 100,000
IT Act Amendment-2008
➢ The Information Technology Amendment Act, 2008
(IT Act 2008) has been passed by the parliament on
23rd December 2008.
➢ It received the assent of President of India on
5th February, 2009.
➢ The IT Act 2008 has been notified on October 27,
2009.
➢ ITA-2008, is a new version of IT Act 2000.
➢ Provides additional focus on Information
Security.
➢ Added several new sections on offences
including Cyber Terrorism and Data
Protection.
➢ 124 sections and 14 chapters.
➢ Schedule I and II have been replaced &
Schedules III and IV are deleted.
IT Act Amendment-2008
➢ We are living in highly digitalized world.
➢ All companies depend upon their computer
networks and keep their valuable data in electronic
form.
➢ Government forms including income tax returns,
company law forms etc are now filled in electronic
form.
➢ Consumers are increasingly using credit cards for
shopping.
➢ Even in "non-cyber crime" cases, important
Importance of Cyber Law
Thank You

Contenu connexe

Tendances

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionAkshay Sharma
 

Tendances (20)

Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protection
 

Similaire à Cyber securitylaw

Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 

Similaire à Cyber securitylaw (20)

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber
CyberCyber
Cyber
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
it act
it act it act
it act
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 

Dernier

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Dernier (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Cyber securitylaw

  • 1. Information Technology Act 2000- An overview Presented by, Kinjal Vaghela(115330) Usha Chaudhari(115328)
  • 2. Need of Cyber Law "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, U S A "Computers at Risk”.1991
  • 3. Need of Cyber Law ➢ Internet has dramatically changed Our life. ➢ Transition from paper to paperless world. ➢ Laws of real world can not be interpreted in the light of emerging Cyberspace. ➢ Internet requires an enabling and supportive legal infrastructure to tune with the times
  • 4. Cyber Law ? ➢ Cyber Law is the law governing cyber space. ➢ Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 5. Cyber Crime ? ➢ Any crime with the help of computer and telecommunication technology. ➢ Any crime where either the computer is used as an object or subject.
  • 6. Categories of Cyber Crime ➢ Cybercrimes against persons. ➢ Cybercrimes against property. ➢ Cybercrimes against government.
  • 8. IT Act-2000 ➢ The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000. ➢ The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. ➢ Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
  • 9. IT Act-2000 : Objectives ➢ To provide legal recognition for transactions ➢ To facilitate electronic filing of documents with the Government agencies. ➢ To amend the Indian Penal Code, The Indian Evidence Act, 1872, The Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934. ➢ Aims to provide the legal framework to all electronic records.
  • 10. 10 Section 65 • Offence Name - Tampering with computer Source documents. • Description - If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 11. 11 Section 66 • Offence Name - Hacking with computer system • Description - If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. • Penalty Imprisonment up to three years, or/and with fine up to 500,000
  • 12. 12 Section 66B • Offence Name - Receiving stolen computer or communication device • Description - - A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 13. 13 Section 66C • Offence Name - Using password of another person • Description - A person fradulently uses the password, digital signature or other unique identification of another person. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 14. 14 Section 66D • Offence Name - Cheating using computer resource • Description - If a person cheats someone using a computer resource or communication. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 15. 15 Section 66E • Offence Name - Publishing private images of others • Description - If a person captures, transmits or publishes images of a person's private parts without his/her consent or knowledge. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 16. SECTION 67C • Offence Name - Failure to maintain records • Description:Persons deemed as intermediatary (such as an ISP) must maintain required records for stipulated time. Failure is an offence.
  • 17. 17 Section 68 • Offence Name - Failure/refusal to comply with orders • Description - The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Any person who fails to comply with any such order shall be guilty of an offence. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 18. 18 Section 70 • Offence Name - Securing access or attempting to secure access to a protected system • Description - The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system.The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. • Penalty - Imprisonment up to ten years, or/and with fine
  • 19. 19 Section 71 • Offence Name - Misrepresentation • Description - If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate. • Penalty - Imprisonment up to three years, or/and with fine up to 100,000
  • 20. IT Act Amendment-2008 ➢ The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008. ➢ It received the assent of President of India on 5th February, 2009. ➢ The IT Act 2008 has been notified on October 27, 2009.
  • 21. ➢ ITA-2008, is a new version of IT Act 2000. ➢ Provides additional focus on Information Security. ➢ Added several new sections on offences including Cyber Terrorism and Data Protection. ➢ 124 sections and 14 chapters. ➢ Schedule I and II have been replaced & Schedules III and IV are deleted. IT Act Amendment-2008
  • 22. ➢ We are living in highly digitalized world. ➢ All companies depend upon their computer networks and keep their valuable data in electronic form. ➢ Government forms including income tax returns, company law forms etc are now filled in electronic form. ➢ Consumers are increasingly using credit cards for shopping. ➢ Even in "non-cyber crime" cases, important Importance of Cyber Law