SlideShare une entreprise Scribd logo
1  sur  85
Information Technology Act 2000- An overview Date: 27 th  November 2008 Venue: National Institute of Financial Management  Faridabad Sector-48, Pali Road   Karnika Seth Partner and Cyber Lawyer   SETH ASSOCIATES  ADVOCATES AND CONSULTANTS All rights Reserved © Seth Associates 2008
IT Act, 2000 ,[object Object],[object Object]
Objectives of the IT Act ,[object Object],[object Object],[object Object],[object Object]
Extent of application ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Role of the Government
Section 3 Defines Digital Signatures ,[object Object],[object Object],[object Object]
Secure digital signature-S.15 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Certificate based Key Management ,[object Object],[object Object],[object Object],CA User A User B CA  A  B CA  A CA  B
Essential steps of the digital signature process   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essential steps of the digital signature process ,[object Object],[object Object],[object Object],[object Object]
Section 4- Legal recognition of Electronic Records ,[object Object]
Sections 5, 6 & 7 ,[object Object],[object Object],[object Object],[object Object],[object Object]
CCA has to regulate the    functioning of CAs in the country by- ,[object Object],[object Object],[object Object],[object Object]
The licensing process ,[object Object],[object Object],[object Object]
Audit Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditors Panel  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Size mandated by the CCA ,[object Object],[object Object],[object Object],[object Object]
Licensed Certifying Authorities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
Securing communications… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 15- Secure Digital Signatures ,[object Object],[object Object],[object Object]
Regulation of Certifying Authorities [Chapter IV]  ,[object Object],[object Object]
Digital Signature Certificate [Chapter VII] ,[object Object],[object Object]
IT Act –overview of other relevant provisions ,[object Object],[object Object],[object Object],[object Object]
Section 12- Acknowledgement of Receipt ,[object Object],[object Object],[object Object]
Section 13- Dispatch of Electronic record ,[object Object],[object Object],[object Object],[object Object]
Civil Wrongs under IT Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Civil Wrongs under IT Act (Contd.) © Seth Associates, 2008 All Rights Reserved
Data diddling:   changing data prior or during input into a computer   ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 46 IT Act ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 47, IT Act ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cybercrime provisions under IT Act,2000   Offences & Relevant   Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration  Sec.66 Publishing obscene information  Sec.67 Un-authorized access to protected system  Sec.70  Breach of Confidentiality and Privacy  Sec.72 Publishing false digital signature certificates  Sec.73 © Seth Associates, 2008 All Rights Reserved
TYPES OF CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved Crime against property Crime against Government Crime against persons
TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Cyber crimes Hacking Information  Theft E-mail bombing Salami  attacks Denial of  Service  attacks Trojan  attacks Web jacking
Frequency of reporting Cybercrime in India ,[object Object],© Seth Associates, 2008 All Rights Reserved
Section 65: Source Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss  or   damage to the public or any person – Destruction, deletion, alteration, diminishing   value or utility or injuriously affecting   information residing in a computer resource • Punishment – imprisonment up to three years, and / or   – fine up to Rs. 2 lakh • Cognizable, Non Bailable,   Section 66 covers data theft aswell as data alteration © Seth Associates, 2008 All Rights Reserved
Sec. 67. Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber Pornography Cases ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
State of  Tamil Nadu Vs Suhas Katti  Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting.  The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet.  The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
The verdict extract… “  The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
Sec 69: Decryption of information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Sec 70 Protected System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Sections 71 & 72 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sections 73 & 74 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber crimes punishable under various Indian laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
Some more offences dealt with under IPC… ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],Cognizability and Bailability   ,[object Object],- Rely on Part II of Schedule I of CrPC © Seth Associates, 2008 All Rights Reserved
Power of Police to Investigate ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Power of Police to investigate (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Email spoofing:   ,[object Object],© Seth Associates, 2008 All Rights Reserved
Legal provisions to counter identity theft ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Forgery ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber stalking ,[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber defamation ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Online gambling: virtual casinos, Cases of money laundering ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case Study- BPO Data Theft ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
BPO data theft -Case Study (contd.) ,[object Object],[object Object],© Seth Associates, 2007 All Rights Reserved
BPO data theft -Case Study  (contd.) ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case Study- Case of Extortion of Money Through Internet ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case of Extortion of Money Through Internet -Case Study (contd.) ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
FIR NO 76/02 PS PARLIAMENT STREET   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Other important provisions of the  IT Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amendments- Indian Evidence Act 1872 ,[object Object]
Presumptions in law ,[object Object]
Presumptions in law ,[object Object]
Societe Des products Nestle SA case  2006 (33 ) PTC 469 &  State v Mohd Afzal, 2003 (7) AD (Delhi)1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important issues to ponder..IT Act is incomplete?? ,[object Object],[object Object],[object Object],[object Object]
Is IT Act incomplete? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Report of the Expert Committee Proposed Amendments to  Information Technology Act 2000   SUMMARY  -August  2005  ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Suggestions from Report of the Expert Committee (contd..) ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
POSITIVE INITIATIVES & RECOMMENDATIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],POSITIVE INITIATIVES & RECOMMENDATIONS (Contd.) © Seth Associates, 2008 All Rights Reserved

Contenu connexe

Tendances

What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]Kamal Thakur
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
5 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 18725 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 1872Jharna Jagtiani
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Legal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONSLegal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONSTejinder Bhatti
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)Dr. Sandeep Kulshrestha
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

Tendances (20)

What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
5 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 18725 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 1872
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Cyber contract
Cyber contractCyber contract
Cyber contract
 
Legal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONSLegal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONS
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
It act 2000
It act 2000It act 2000
It act 2000
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cr.P.C framing of Charges
Cr.P.C framing of Charges Cr.P.C framing of Charges
Cr.P.C framing of Charges
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

En vedette

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

En vedette (20)

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
it act 2000
it act 2000it act 2000
it act 2000
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 

Similaire à Information technology-act 2000

Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 

Similaire à Information technology-act 2000 (20)

Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Class it act
Class it actClass it act
Class it act
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
It act
It actIt act
It act
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
It act 2000
It act 2000It act 2000
It act 2000
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Act2000n
Act2000nAct2000n
Act2000n
 

Plus de Onkar Sule

Plus de Onkar Sule (20)

Understanding e commerce
Understanding e commerceUnderstanding e commerce
Understanding e commerce
 
Tisc99keynote
Tisc99keynoteTisc99keynote
Tisc99keynote
 
Part i
Part iPart i
Part i
 
Overview
OverviewOverview
Overview
 
Nordin malaysia
Nordin malaysiaNordin malaysia
Nordin malaysia
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
I walden
I waldenI walden
I walden
 
I walden
I waldenI walden
I walden
 
Introduction to ecommerce
Introduction to ecommerceIntroduction to ecommerce
Introduction to ecommerce
 
Hengesbaugh
HengesbaughHengesbaugh
Hengesbaugh
 
E commerce052503
E commerce052503E commerce052503
E commerce052503
 
Ecommerce2
Ecommerce2Ecommerce2
Ecommerce2
 
E commerce
E commerceE commerce
E commerce
 
Ecommerce overview
Ecommerce overviewEcommerce overview
Ecommerce overview
 
Ecommerce (2)
Ecommerce (2)Ecommerce (2)
Ecommerce (2)
 
E commerce (1)
E commerce (1)E commerce (1)
E commerce (1)
 
Ecommerce (1)
Ecommerce (1)Ecommerce (1)
Ecommerce (1)
 
Ec elim purch
Ec elim purchEc elim purch
Ec elim purch
 
Conklin
ConklinConklin
Conklin
 
Conklin
ConklinConklin
Conklin
 

Dernier

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 

Dernier (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 

Information technology-act 2000

  • 1. Information Technology Act 2000- An overview Date: 27 th November 2008 Venue: National Institute of Financial Management Faridabad Sector-48, Pali Road Karnika Seth Partner and Cyber Lawyer SETH ASSOCIATES ADVOCATES AND CONSULTANTS All rights Reserved © Seth Associates 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Cybercrime provisions under IT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73 © Seth Associates, 2008 All Rights Reserved
  • 44.
  • 45. TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking
  • 46.
  • 47.
  • 48. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration © Seth Associates, 2008 All Rights Reserved
  • 49.
  • 50.
  • 51. State of Tamil Nadu Vs Suhas Katti Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
  • 52. The verdict extract… “ The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.