nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendment) Act, 2008″

n|u - The Open Security Community
n|u - The Open Security Communityn|u - The Open Security Community
The Information Technology Act, 2000  and  The Information Technology (amendment) Act, 2008 A Comparative analysis ,[object Object]
Birth of Cyber Laws ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Birth of Cyber Laws ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
nullcon Goa 2010 http://nullcon.net
Electronic authentication ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Electronic authentication ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Types of electronic signatures ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Types of electronic signatures ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Types of electronic signatures ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Civil Provisions ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 43 nullcon Goa 2010 http://nullcon.net
Civil Provisions ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Civil Provisions ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Adjudication of Civil offences ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Criminal Provisions Section 66 ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 66(A) ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 66(B) ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 66(C) ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 66(D) ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 66(E) ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 66(F) ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Cyber Pornography ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Cyber Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Child Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Preservation of information by intermediaries ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Government’s power to intercept ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Government’s power to intercept ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Liability of Intermediary not to disclose any personal information ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Liability of Intermediary ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Liability of Intermediary ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Abetment ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Attempt  ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Investigation Powers ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Compounding of Offences ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Compounding of Offences ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
nullcon Goa 2010 http://nullcon.net
[object Object],[object Object]
1 sur 37

Recommandé

Right to privacy on internet and Data Protection par
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
11.4K vues43 diapositives
Cybercrime Investigations and IT Act,2000 par
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
11.2K vues70 diapositives
IT Act 2000 par
IT Act 2000IT Act 2000
IT Act 2000Pradeep Tomar
854 vues19 diapositives
Information technology ACT - 2000 (Legal Aspect of Business) par
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
353 vues15 diapositives
Information technology Act with Cyber offences .pptx par
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
345 vues27 diapositives
It act 2000 par
It act 2000It act 2000
It act 2000Vidhu Arora
1.9K vues18 diapositives

Contenu connexe

Tendances

Cyber laws in India par
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
2.3K vues23 diapositives
IT ACT, 2000 (Information Technology Act, 2000) par
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
5.4K vues75 diapositives
Copyright issues in cyberspace par
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
5.8K vues43 diapositives
Indian it act 2000 par
Indian it act 2000Indian it act 2000
Indian it act 2000Avinash Katariya
3.2K vues26 diapositives
Introduction to Cyber Crimes par
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
6.3K vues74 diapositives

Tendances(20)

Cyber laws in India par saumi17
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi172.3K vues
Copyright issues in cyberspace par atuljaybhaye
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
atuljaybhaye5.8K vues
Introduction to Cyber Crimes par atuljaybhaye
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye6.3K vues
Information Technology Act par maruhope
Information Technology ActInformation Technology Act
Information Technology Act
maruhope11.9K vues
Cyber defamation par Tuhin Batra
Cyber defamationCyber defamation
Cyber defamation
Tuhin Batra25.3K vues
Information technology act par AKSHAY KHATRI
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI12.1K vues
Data Privacy in India and data theft par Amber Gupta
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
Amber Gupta5K vues
Cyber crimes in the digital age par atuljaybhaye
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye553 vues
Indian Cyber laws par mulikaa
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa1.3K vues
Cyber Law and Information Technology Act 2000 with case studies par Sneha J Chouhan
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan5.3K vues

En vedette

Cyber law In India: its need & importance par
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
83.6K vues33 diapositives
Information technology act 2000 par
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
187.1K vues27 diapositives
Cyber law-it-act-2000 par
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000Mayuresh Patil
35.2K vues23 diapositives
An Introduction to Cyber Law - I.T. Act 2000 (India) par
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
58K vues17 diapositives
Cyber law par
Cyber lawCyber law
Cyber lawArnab Roy Chowdhury
108.4K vues31 diapositives
Information technology-act 2000 par
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
19K vues85 diapositives

En vedette(20)

Cyber law In India: its need & importance par Aditya Shukla
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla83.6K vues
Information technology act 2000 par Akash Varaiya
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya187.1K vues
An Introduction to Cyber Law - I.T. Act 2000 (India) par Chetan Bharadwaj
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj58K vues
Information technology-act 2000 par Onkar Sule
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
Onkar Sule19K vues
Cyber Law par fariez91
Cyber  LawCyber  Law
Cyber Law
fariez9133.2K vues
Unit 3 Cyber Crimes and Torts 8 hr par Tushar Rajput
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput1.9K vues
Unit 4 Commerce and Cyberspace par Tushar Rajput
Unit 4 Commerce and CyberspaceUnit 4 Commerce and Cyberspace
Unit 4 Commerce and Cyberspace
Tushar Rajput1.9K vues
Data Security par backdoor
Data SecurityData Security
Data Security
backdoor761 vues
Rohas - State of Cyber Law in India - ClubHack2008 par ClubHack
Rohas - State of Cyber Law in India - ClubHack2008Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008
ClubHack730 vues
Cyberstalking par Trevschic
CyberstalkingCyberstalking
Cyberstalking
Trevschic5.9K vues
SITA LAB PPT (XYBER CRIME) par Asish Verma
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Asish Verma2.1K vues

Similaire à nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendment) Act, 2008″

IT ACT 2000 _ AA 2008_TAPAN.pptx par
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
3 vues21 diapositives
cyberlaw par
cyberlawcyberlaw
cyberlawdivyaanjali8
16 vues11 diapositives
Information Technology Act 2000 - Santosh K Pathak par
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
1.6K vues22 diapositives
Information Technology Act.pdf par
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdfnithyam40
16 vues10 diapositives
CYBERLAW & IT ACT par
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACTJulainaMehraj
106 vues10 diapositives
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009 par
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
845 vues3 diapositives

Similaire à nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendment) Act, 2008″(20)

IT ACT 2000 _ AA 2008_TAPAN.pptx par Tapan Khilar
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
Tapan Khilar3 vues
Information Technology Act 2000 - Santosh K Pathak par Dipayan Sarkar
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar1.6K vues
Information Technology Act.pdf par nithyam40
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
nithyam4016 vues
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009 par Neeraj Aarora
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
Neeraj Aarora845 vues
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ... par Rahul Bharati
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
Rahul Bharati15 vues
Information Technology act 2000 & Threats to India using Google par Hemraj Singh Chouhan
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
Cybercrime Analysis using Criminal Information Management System: An E-Govern... par Ashish Karan
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Ashish Karan10 vues
INDIAN CYBERLAW AND SECURITY par pattok
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok7.4K vues
PPT on cyber LAW And ACT Of INDIA par Hardik Solanki
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki483 vues
Information technology act par bahubali1611
Information technology actInformation technology act
Information technology act
bahubali1611134 vues

Plus de n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter) par
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)n|u - The Open Security Community
588 vues19 diapositives
Osint primer par
Osint primerOsint primer
Osint primern|u - The Open Security Community
362 vues22 diapositives
SSRF exploit the trust relationship par
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationshipn|u - The Open Security Community
465 vues24 diapositives
Nmap basics par
Nmap basicsNmap basics
Nmap basicsn|u - The Open Security Community
515 vues38 diapositives
Metasploit primary par
Metasploit primaryMetasploit primary
Metasploit primaryn|u - The Open Security Community
196 vues26 diapositives
Api security-testing par
Api security-testingApi security-testing
Api security-testingn|u - The Open Security Community
773 vues24 diapositives

Plus de n|u - The Open Security Community(20)

Dernier

Network Source of Truth and Infrastructure as Code revisited par
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
26 vues45 diapositives
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
85 vues32 diapositives
Melek BEN MAHMOUD.pdf par
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdfMelekBenMahmoud
14 vues1 diapositive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
31 vues35 diapositives
STPI OctaNE CoE Brochure.pdf par
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
14 vues1 diapositive
Tunable Laser (1).pptx par
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptxHajira Mahmood
24 vues37 diapositives

Dernier(20)

GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson85 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
STPI OctaNE CoE Brochure.pdf par madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 vues
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... par Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
handbook for web 3 adoption.pdf par Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 vues
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors par sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 vues
Empathic Computing: Delivering the Potential of the Metaverse par Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse

nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendment) Act, 2008″