SlideShare une entreprise Scribd logo
1  sur  46
Cyber Law
Prof. Shrinivas VK
Prof. SVK
Need of Cyber Law
"The modern thief can steal more with a computer than
with a gun. Tomorrow's terrorist may be able to do more
damage with a keyboard than with a bomb".
National Research Council, U S A "Computers at
Risk”.1991
Prof. SVK
Cyber Law ?
 Cyber Law is the law governing cyber space.
 Cyber space includes computers, networks, software's, data
storage devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic devices such as
cell phones, ATM machines etc.
Prof. SVK
Cyber Law Deals with
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
Prof. SVK
IT Act, 2000
• Enacted on 17th May
2000- India is 12th
nation in the world to
adopt cyber laws
• IT Act is based on
Model law on e-
commerce adopted by
UNCITRAL
Prof. SVK
Objectives of the IT Act
To provide legal recognition for transactions:-
• Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as "electronic commerce“
• To facilitate electronic filing of documents with Government
agencies and E-Payments
• To amend the Indian Penal Code, Indian Evidence Act,1872,
the Banker’s Books Evidence Act 1891,Reserve Bank of India
Act ,1934
Prof. SVK
Extent of application
• Extends to whole of India and also applies to any offence or
contravention there under committed outside India by any
person {section 1 (2)} read with Section 75- Act applies to
offence or contravention committed outside India by any
person irrespective of his nationality, if such act involves a
computer, computer system or network located in India
• Section 2 (1) (a) –”Access” means gaining entry into
,instructing or communicating with the logical, arithmetic or
memory function resources of a computer, computer
resource or network
Prof. SVK
Definitions ( section 2)
• "computer" means electronic, magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic and
memory functions by manipulations of electronic, magnetic or optical
impulses, and includes all input, output, processing, storage, computer
software or communication facilities which are connected or relates to the
computer in a computer system or computer network;
• "computer network" means the inter-connection of one or more
computers through-
• (i) the use of satellite, microwave, terrestrial lime or other communication
media; and
• (ii) terminals or a complex consisting of two or more interconnected
computers whether or not the interconnection is continuously
maintained;
Prof. SVK
Definitions ( section 2)
• "computer system" means a device or collection of devices, including
input and output support devices and excluding calculators which are not
programmable and capable being used in conjunction with external files
which contain computer programmes, electronic instructions, input data
and output data that performs logic, arithmetic, data storage and
retrieval, communication control and other functions;
• "data" means a representation of information, knowledge, facts, concepts
or instruction which are being prepared or have been prepared in a
formalised manner, and is intended to be processed, is being processed or
has been processed in a computer system or computer network, and may
be in any form (including computer printouts magnetic or optical storage
media, punched cards, punched tapes) or stored internally in the memory
of the computer.
Prof. SVK
Definitions ( section 2)
• "electronic record" means data, record or data generated, image or sound
stored, received or sent in an electronic form or micro film or computer
generated micro fiche;
• “secure system” means computer hardware, software, and procedure
that-
(a) are reasonably secure from unauthorized access and misuse;
(b) provide a reasonable level of reliability and correct operation;
(c) are reasonably suited to performing the intended function; and
(d) adhere to generally accepted security procedures
• “security procedure” means the security procedure prescribed by the
Central Government under the IT Act, 2000.
• secure electronic record – where any security procedure has been applied
to an electronic record at a specific point of time, then such record shall
be deemed to be a secure electronic record from such point of time to the
time of verification
Prof. SVK
Act is in applicable to…
• (a) a negotiable instrument (Other than a
cheque) as defined in section 13 of the
Negotiable Instruments Act, 1881;
• (b) a power-of-attorney as defined in section
1A of the Powers-of-Attorney Act, 1882;
• (c) a trust as defined in section 3 of the Indian
Trusts Act, 1882;
Prof. SVK
Act is in applicable to…
• (d) a will as defined in clause (h) of section 2 of
the Indian Succession Act, 1925 including any
other testamentary disposition
• (e) any contract for the sale or conveyance of
immovable property or any interest in such
property;
• (f) any such class of documents or transactions
as may be notified by the Central Government
Prof. SVK
OBJECTIVES OF IT ACT
1. It is objective of I.T. Act 2000 to give legal recognition to any
transaction which is done by electronic way or use of
internet.
2. To give legal recognition to digital signature for accepting any
agreement via computer.
3. To provide facility of filling document online relating to school
admission or registration in employment exchange.
4. According to I.T. Act 2000, any company can store their data in
electronic storage. Prof. SVK
OBJECTIVES OF IT ACT..
5. To stop computer crime and protect privacy of internet users.
6. To give legal recognition for keeping books of accounts by
bankers and other companies in electronic form.
7. To make more power to RBI and Indian Evidence act for
restricting electronic crime.
Prof. SVK
SCOPE OF IT ACT
1. Information technology act 2000 is not applicable on the
attestation for creating trust via electronic way. Physical
attestation is must.
2. I.T. Act 2000 is not applicable on the attestation for making
will of any body. Physical attestation by two witnesses is must.
3. A contract of sale of any immovable property.
4. Attestation for giving power of attorney of property is not
possible via electronic record.Prof. SVK
Advantages of Cyber Laws
• Helpful to promote e-commerce
• Enhance the corporate business
• Filing online forms
• High penalty for cyber crime
• Digital signatures have been given legal
validity and sanction in the Act.
Prof. SVK
Digital signature
• Digital signature means authentication of any
electronic record by a subscriber by means of
an electronic method or procedure in
accordance with the provisions of section 3.
Section 3 deals with the conditions subject to
which an electronic record may be
authenticated by means of affixing digital
signature which is created in two definite
steps.
Prof. SVK
First, the electronic record is converted into a message
digest by using a mathematical function known as 'Hash
function' which digitally freezes the electronic record thus
ensuring the integrity of the content of the intended
communication contained in the electronic record. Any
tampering with the contents of the electronic record will
immediately invalidate the digital signature.
Secondly, the identity of the person affixing the digital
signature is authenticated through the use of a private key
which attaches itself to the message digest and which can
be verified by anybody who has the public key
corresponding to such private key. This will enable anybody
to verify whether the electronic record is retained intact or
has been tampered with since it was so fixed with the digital
signature. It will also enable a person who has a public key
to identify the originator of the message.
Prof. SVK
Attribution of electronic records.
An electronic record shall be attributed to the
originator -
• if it was sent by the originator himself.
• by a person who had the authority to act on
behalf of the originator in respect of that
electronic record, or
• by an information system programmed by or
on behalf of the originator to operate
automatically.
Prof. SVK
Acknowledgment of receipt
Where the originator has not agreed with the addressee
that the acknowledgment of receipt of electronic
record be given in a particular form or by a particular
method, an acknowledgment may be given by –
• any communication by the addressee, automated or
otherwise, or
• any conduct of the addressee, sufficient to indicate to
the originator that the electronic record has been
received.
• unless acknowledgment has been so received, the
electronic record shall be deemed to have been never
sent by the originator.
Prof. SVK
despatch and receipt of electronic
record
• if the addressee has designated a computer resource
for the purpose of receiving electronic records -
– receipt occurs at the time when the electronic, record
enters the designated computer resource, or
– if the electronic record is sent to a computer resource of
the addressee that is not the designated computer
resource, receipt occurs at the time when the electronic
record is retrieved by the addressee.
• if the addressee has not designated a computer
resource along with specified timings, if any, receipt
occurs when the electronic record enters the computer
resource of the addressee.
Prof. SVK
Digital Signature Certificates
• (DSC) are the digital equivalent (that is electronic
format) of physical or paper certificates.
• Examples of physical certificates are drivers' licenses,
passports or membership cards.
• Certificates serve as proof of identity of an individual
for a certain purpose; for example, a driver's license
identifies someone who can legally drive in a particular
country. Likewise, a digital certificate can be presented
electronically to prove your identity, to access
information or services on the Internet or to sign
certain documents digitally.
Prof. SVK
Who issues the Digital Signature
Certificate
• A licensed Certifying Authority (CA) issues the digital signature.
Certifying Authority (CA) means a person who has been granted a
license to issue a digital signature certificate under Section 24 of
the Indian IT-Act 2000.
Tata Consultancy Services (TCS)
National Informatics Center (NIC)
IDRBT(Institute for Development & Research in Banking
Technology)Certifying Authority
SafeScrypt CA Services, Sify Communications Ltd.
(n) Code Solutions CAMTNL
Trust Line*
Customs & Central Excise
E-MUDHRA
Prof. SVK
Regulation of Certifying Authorities
Appointment of Controller and other officers.
• The Central Government may, by notification in the Official
Gazette, appoint a Controller of Certifying Authorities for
the purposes of this Act and may also by the same or
subsequent notification appoint such number of Deputy
Controllers and Assistant Controllers as it deems fit.
• The Controller shall discharge his functions under this Act
subject to the general control and directions of the Central
Government.
• The Deputy Controllers and Assistant Controllers shall
perform the functions assigned to them by the Controller
under the general superintendence and control of the
Controller.
Prof. SVK
Appointment of Controller and other
officers.
• The qualifications, experience and terms and
conditions of service of Controller, Deputy
Controllers and Assistant Controllers shall be such
as may be prescribed by the Central Government.
• The Head Office and Branch Office of the office of
the Controller shall be at such places as the
Central Government may specify, and these may
be established at such places as the Central
Government may think fit.
• There shall be a seal of the Office of the
Controller.
Prof. SVK
Functions of Controller
The Controller may perform all or any of the following functions,
namely: -
• exercising supervision over the activities of the Certifying
Authorities.
• certifying public keys of the Certifying Authorities.
• laying down the standards to be maintained by the Certifying
Authorities.
• specifying the qualifications and experience which employees of
the Certifying Authorities should possess.
• specifying the conditions subject to which the Certifying Authorities
shall conduct their business.
• specifying the contents of written, printed or visual materials and
advertisements that may be distributed or used in respect of a
Digital Signature Certificate and the public key.
Prof. SVK
Functions of Controller
• specifying the form and content of a Digital Signature
Certificate and the key.
• specifying the form and manner in which accounts shall be
maintained by the Certifying Authorities.
• specifying the terms and conditions subject to which
auditors may be appointed and the remuneration to be
paid to them.
• facilitating the establishment of any electronic system by a
Certifying Authority either solely or jointly with other
Certifying Authorities and regulation of such systems.
• specifying the manner in which the Certifying Authorities
shall conduct their dealings with the subscribers.
Prof. SVK
Functions of Controller
• resolving any conflict of interests between the
Certifying Authorities and the subscribers.
• laying down the duties of the Certifying
Authorities.
• maintaining a data base containing the
disclosure record of every Certifying Authority
containing such particulars as may be
specified by regulations, which shall be
accessible to public.
Prof. SVK
Offences & Penalties under the
Information Technology Act, 2000
• Offences:
Cyber offences are the unlawful acts which are carried in a very
sophisticated manner in which either the computer is the tool or target or
both. Cyber crime usually includes:
(a) Unauthorized access of the computers
(b) Data diddling
(c) Virus/worms attack
(d) Theft of computer system
(e) Hacking
(f) Denial of attacks
(g) Logic bombs
(h) Trojan attacks
(i) Internet time theft
(j) Web jacking
(k) Email bombing
(l) Salami attacks
(m) Physically damaging computer system.
Prof. SVK
Section 65. Tampering with computer
source documents:
• Whoever knowingly or intentionally conceals,
destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any
computer source code used for a computer,
computer Programme, computer system or
computer network, when the computer source code
is required to be kept or maintained by law for the
being time in force, shall be punishable with
Penalties: Imprisonment up to 3 years and / or
Fine: Two lakh rupees.
Prof. SVK
Section66. Hacking with the computer
system
Whoever with the intent to cause or knowing
that he is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or
alters any information residing in a computer
resource or diminishes its value or utility or
affects it injuriously by any means, commits
hacking.
Penalties: Punishment: Imprisoned up to three
years and
Fine: which may extend up to two lakh rupees Or
with both.
Prof. SVK
Section 67. Publishing of obscene
information in electronic form:
• Publishing or transmitting, or causing to be published,
pornographic material in electronic form
• Penalties: Punishment: On first conviction -
Imprisonment which may extend up to five years.
Fine: up to on first conviction which may extend to one
lakh rupees.
• On second conviction ---- imprisonment up to which
may extend to ten years and Fine which may extend up
to two lakh rupees.
Case Laws:
1. The State of Tamil Nadu v/s Suhas Katti.
Prof. SVK
Section 68. Power of controller to give
directions:
(1) The Controller may, by order, direct a Certifying Authority or any
employee of such Authority to take such measures or cease
carrying on such activities as specified in the order if those are
necessary to ensure compliance with the provisions of this Act,
rules or any regulations made there under.
(2) Any person who fails to comply with any order under sub-
section (1) shall be guilty of an offence and shall be liable on
conviction to imprisonment for a term not exceeding three years or
to a fine not exceeding two lakh rupees or to both.
Penalties: Punishment: imprisonment up to a term not exceeding
three years
Fine: not exceeding two lakh rupees.
Prof. SVK
Section 69. Directions of Controller to a
subscriber to extend facilities to decrypt
information:
If the Controller is satisfied that it is necessary or expedient so to
do in the interest of the sovereignty or integrity of India, the
security of the State, friendly relations with foreign States or
public order or for preventing incitement to the commission of
any cognizable offence; for reasons to be recorded in writing, by
order, direct any agency of the Government to intercept any
information transmitted through any computer resource.
The subscriber or any person in charge of the computer resource
shall, when called upon by any agency which has been directed
under sub-section (1), extend all facilities and technical assistance
to decrypt the information.
Penalties: imprisonment for a term which may extend to seven years.
http://www.legalservicesindia.com/article/article/offences-&-
penalties-under-the-it-act-2000-439-1.html
Prof. SVK
Section 70. Protected System
(1) The appropriate Government may, by notification in the Official
Gazette, declare that any computer, computer system or computer
network to be a protected system.
(2) The appropriate Government may, by order in writing, authorize the
persons who are authorized to access protected systems notified under
sub-section (1).
(3) Any person who secures access or attempts to secure access to a
protected system in contravention of the provision of this section shall be
punished with imprisonment of either description for a term which may
extend to ten years and shall also be liable to fine.
Explanation: This section grants the power to the appropriate government
to declare any computer, computer system or computer network, to be a
protected system. Only authorized person has the right to access to
protected system.
Penalties: Punishment: the imprisonment which may extend to ten years
and fine.
Prof. SVK
Section 71. Penalty for
misrepresentation
(1) Whoever makes any misrepresentation to, or
suppresses any material fact from, the Controller or the
Certifying Authority for obtaining any license or Digital
Signature Certificate, as the case may be, shall be
punished with imprisonment for a term which may
extend to two years, or which fine which may extend to
one lakh rupees, or with both.
Penalties: Punishment: imprisonment which may
extend to two years
Fine: may extend to one lakh rupees or with both.
Prof. SVK
Section 72. Penalty for breach of
confidentiality and privacy
This section relates to any to nay person who in pursuance
of any of the powers conferred by the Act or it allied rules
and regulations has secured access to any: Electronic
record, books, register, correspondence, information,
document, or other material.
If such person discloses such information, he will be
punished with penalty. It would not apply to disclosure of
personal information of a person by a website, by his email
service provider.
Penalties: Punishment: term which may extend to two
years.
Fine: one lakh rupees or with both.
Prof. SVK
Section 73. Penalty for publishing Digital Signature
Certificate false in certain particulars
(1) No person shall publish a Digital Signature Certificate or
otherwise make it available to any other person with the
knowledge that-
(a) The Certifying Authority listed in the certificate has not
issued it; or
(b) The subscriber listed in the certificate has not
accepted it; or
(c) The certificate has been revoked or suspended, unless
such publication is for the purpose of verifying a digital
signature created prior to such suspension or revocation.
(2) Penalties: Punishment imprisonment of a term of which
may extend to two years.
Fine: fine may extend to 1 lakh rupees or with both.
Prof. SVK
Section 74. Publication for fraudulent
purpose
Explanation: This section prescribes punishment for the following
acts:
Knowingly creating a digital signature certificate for any
i. fraudulent purpose or,
ii. unlawful purpose.
Knowingly publishing a digital signature certificate for any
i. fraudulent purpose or
ii. unlawful purpose
Knowingly making available a digital signature certificate for any
i. fraudulent purpose or
ii. unlawful purpose.
Penalties: Punishment: imprisonment for a term up to two years.
Fine: up to one lakh or both.
Prof. SVK
Section 75. Act to apply for offence or contravention
committed outside India
(1) Subject to the provisions of sub-section (2), the provisions
of this Act shall apply also to any offence or contravention
committed outside India by any person irrespective of his
nationality.
(2) For the purposes of sub-section (1), this Act shall apply to an
offence or Contravention committed outside India by any
person if the act or conduct constituting the offence or
contravention involves a computer, computer system or
computer network located in India.
Explanation: This section has broader perspective including
cyber crime, committed by cyber criminals, of any nationality,
any territoriality.
Prof. SVK
Section 76. Confiscation
The aforesaid section highlights that all devices
whether computer, computer system,
floppies, compact disks, tape drives or any
other storage, communication, input or
output device which helped in the
contravention of any provision of this Act,
rules, orders, or regulations made under there
under liable to be confiscated.
Prof. SVK
77. Penalties or confiscation not to
interfere with other punishments
No penalty imposed or confiscation made under
this Act shall prevent the imposition of any other
punishment to which the person affected thereby
is liable under any other law for the time being in
force.
Explanation: The aforesaid section lays down a
mandatory condition, which states the Penalties
or confiscation not to interfere with other
punishments to which the person affected
thereby is liable under any other law for the time
being in force.
Prof. SVK
78. Power to investigate offences
Notwithstanding anything contained in the
Code of Criminal Procedure, 1973, a police
officer not below the rank of Deputy
Superintendent of Police shall investigate any
offence under this Act.
Explanation: The police officer not below the
rank of Deputy Superintendent of police shall
investigate the offence.
Prof. SVK
Indiastands11th intherankingfor CyberCrimein theWorld,constituting3%of the
GlobalCyberCrime.
Prof. SVK
Conclusion…
“Indian Laws are well drafted and are capable of
handling all kinds of challenges as posed by cyber
criminals. However, the enforcement agencies are
required to be well versed with the changing technologies
and Laws.”
"As internet technology advances so does the threat of
cyber crime. In times like these we must protect ourselves
from cyber crime. Anti-virus software, firewalls and
security patches are just the beginning. Never open
suspicious e-mails and only navigate to trusted sites.”
Prof. SVK
Thank you.....
Prof. SVK

Contenu connexe

Tendances

Promissory note ppt, negotiable instrument act.
Promissory note ppt, negotiable instrument act.Promissory note ppt, negotiable instrument act.
Promissory note ppt, negotiable instrument act.Agile Informatics
 
Anti competitive agreements under the competition act
Anti competitive agreements under the competition actAnti competitive agreements under the competition act
Anti competitive agreements under the competition actAltacit Global
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in indiaatuljaybhaye
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Sales of goods act 1930
Sales of goods act 1930Sales of goods act 1930
Sales of goods act 1930Somya Tiwari
 
Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Chirantan Tiwari
 
ARTICLES OF ASSOCIATION
ARTICLES  OF  ASSOCIATIONARTICLES  OF  ASSOCIATION
ARTICLES OF ASSOCIATIONyash nahata
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contractsVijay Dalmia
 
Chapter 1[definition and nature of insurance]
Chapter 1[definition and nature of insurance]Chapter 1[definition and nature of insurance]
Chapter 1[definition and nature of insurance]aaykhan
 
FEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management ActFEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management ActVignesh Sreenivasan
 
Appointment and removal of directors
Appointment and removal of directorsAppointment and removal of directors
Appointment and removal of directorsDr. Seema H. Kadam
 
Unit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawUnit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawGanesha Pandian
 

Tendances (20)

Promissory note ppt, negotiable instrument act.
Promissory note ppt, negotiable instrument act.Promissory note ppt, negotiable instrument act.
Promissory note ppt, negotiable instrument act.
 
Anti competitive agreements under the competition act
Anti competitive agreements under the competition actAnti competitive agreements under the competition act
Anti competitive agreements under the competition act
 
E contract
E  contractE  contract
E contract
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Sales of goods act 1930
Sales of goods act 1930Sales of goods act 1930
Sales of goods act 1930
 
Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961
 
ARTICLES OF ASSOCIATION
ARTICLES  OF  ASSOCIATIONARTICLES  OF  ASSOCIATION
ARTICLES OF ASSOCIATION
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Chapter 1[definition and nature of insurance]
Chapter 1[definition and nature of insurance]Chapter 1[definition and nature of insurance]
Chapter 1[definition and nature of insurance]
 
FEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management ActFEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management Act
 
Customs duty levy and collection
Customs duty   levy and collectionCustoms duty   levy and collection
Customs duty levy and collection
 
Appointment and removal of directors
Appointment and removal of directorsAppointment and removal of directors
Appointment and removal of directors
 
winding up of a company
winding up of a companywinding up of a company
winding up of a company
 
LISTING OF SECURITIES
LISTING OF SECURITIESLISTING OF SECURITIES
LISTING OF SECURITIES
 
Income tax act 1961
Income tax act 1961Income tax act 1961
Income tax act 1961
 
Payment in due course1
Payment in due course1Payment in due course1
Payment in due course1
 
prospectus of a company
prospectus of a companyprospectus of a company
prospectus of a company
 
Unit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawUnit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber law
 

En vedette

En vedette (20)

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Competition act,2002-Business Law
Competition act,2002-Business LawCompetition act,2002-Business Law
Competition act,2002-Business Law
 
Intellectual Property Law/business law
Intellectual Property Law/business lawIntellectual Property Law/business law
Intellectual Property Law/business law
 
Contract of guarantee-business law
Contract of guarantee-business lawContract of guarantee-business law
Contract of guarantee-business law
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
BUSINESS ENVIRONMENT
BUSINESS ENVIRONMENTBUSINESS ENVIRONMENT
BUSINESS ENVIRONMENT
 
Organisational Behavior Introduction
Organisational Behavior IntroductionOrganisational Behavior Introduction
Organisational Behavior Introduction
 
Personality - Organisational Behavior
Personality - Organisational BehaviorPersonality - Organisational Behavior
Personality - Organisational Behavior
 
Copra act 1986/Business law
Copra act 1986/Business lawCopra act 1986/Business law
Copra act 1986/Business law
 
Sale of goods act 1930/Business Law
Sale of goods act 1930/Business LawSale of goods act 1930/Business Law
Sale of goods act 1930/Business Law
 
Law of contract - Business Law
Law of contract - Business LawLaw of contract - Business Law
Law of contract - Business Law
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
 
Personality
PersonalityPersonality
Personality
 
Business Law Chater 6
Business Law Chater 6Business Law Chater 6
Business Law Chater 6
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 

Similaire à Cyber law/Business law

IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautamShaurya
 

Similaire à Cyber law/Business law (20)

Class it act
Class it actClass it act
Class it act
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidence
 
It act 2000
It act 2000It act 2000
It act 2000
 

Plus de shrinivas kulkarni

Establishing An Enterprise and Project Management.pptx
Establishing An Enterprise and Project Management.pptxEstablishing An Enterprise and Project Management.pptx
Establishing An Enterprise and Project Management.pptxshrinivas kulkarni
 
Institutions Supporting Small Business Enterprises.pptx
Institutions Supporting Small Business Enterprises.pptxInstitutions Supporting Small Business Enterprises.pptx
Institutions Supporting Small Business Enterprises.pptxshrinivas kulkarni
 
social enterpreneurship - Entrpreneurship.ppt
social enterpreneurship - Entrpreneurship.pptsocial enterpreneurship - Entrpreneurship.ppt
social enterpreneurship - Entrpreneurship.pptshrinivas kulkarni
 
Information technology in marketing
Information technology in marketingInformation technology in marketing
Information technology in marketingshrinivas kulkarni
 
Promotion, marketing and society
Promotion, marketing and societyPromotion, marketing and society
Promotion, marketing and societyshrinivas kulkarni
 
Marketing process, Mktg mix, NPD,PLC, STP, Distribution
Marketing process, Mktg mix, NPD,PLC, STP, DistributionMarketing process, Mktg mix, NPD,PLC, STP, Distribution
Marketing process, Mktg mix, NPD,PLC, STP, Distributionshrinivas kulkarni
 
Introduction to Marketing Management
Introduction to Marketing ManagementIntroduction to Marketing Management
Introduction to Marketing Managementshrinivas kulkarni
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social Responsibilityshrinivas kulkarni
 
Sustainability Reporting- Business Ethics
Sustainability Reporting- Business EthicsSustainability Reporting- Business Ethics
Sustainability Reporting- Business Ethicsshrinivas kulkarni
 
Maintenance management- Production Management
Maintenance management- Production ManagementMaintenance management- Production Management
Maintenance management- Production Managementshrinivas kulkarni
 
Production Planning and Control
Production Planning and ControlProduction Planning and Control
Production Planning and Controlshrinivas kulkarni
 

Plus de shrinivas kulkarni (20)

Establishing An Enterprise and Project Management.pptx
Establishing An Enterprise and Project Management.pptxEstablishing An Enterprise and Project Management.pptx
Establishing An Enterprise and Project Management.pptx
 
Institutions Supporting Small Business Enterprises.pptx
Institutions Supporting Small Business Enterprises.pptxInstitutions Supporting Small Business Enterprises.pptx
Institutions Supporting Small Business Enterprises.pptx
 
social enterpreneurship - Entrpreneurship.ppt
social enterpreneurship - Entrpreneurship.pptsocial enterpreneurship - Entrpreneurship.ppt
social enterpreneurship - Entrpreneurship.ppt
 
Sales Management
Sales ManagementSales Management
Sales Management
 
Sustainability reporting
Sustainability reporting Sustainability reporting
Sustainability reporting
 
Ethics in finance
Ethics in financeEthics in finance
Ethics in finance
 
Bes lmr notes (1)
Bes lmr notes (1)Bes lmr notes (1)
Bes lmr notes (1)
 
International Finance
International FinanceInternational Finance
International Finance
 
Social venture creation
Social venture creationSocial venture creation
Social venture creation
 
Family business in india
Family business in indiaFamily business in india
Family business in india
 
Information technology in marketing
Information technology in marketingInformation technology in marketing
Information technology in marketing
 
Promotion, marketing and society
Promotion, marketing and societyPromotion, marketing and society
Promotion, marketing and society
 
Marketing process, Mktg mix, NPD,PLC, STP, Distribution
Marketing process, Mktg mix, NPD,PLC, STP, DistributionMarketing process, Mktg mix, NPD,PLC, STP, Distribution
Marketing process, Mktg mix, NPD,PLC, STP, Distribution
 
Introduction to Marketing Management
Introduction to Marketing ManagementIntroduction to Marketing Management
Introduction to Marketing Management
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social Responsibility
 
Sustainability Reporting- Business Ethics
Sustainability Reporting- Business EthicsSustainability Reporting- Business Ethics
Sustainability Reporting- Business Ethics
 
Waste management-Production
Waste management-ProductionWaste management-Production
Waste management-Production
 
Maintenance management- Production Management
Maintenance management- Production ManagementMaintenance management- Production Management
Maintenance management- Production Management
 
Production Planning and Control
Production Planning and ControlProduction Planning and Control
Production Planning and Control
 
PhD Viva PPT
PhD Viva PPTPhD Viva PPT
PhD Viva PPT
 

Dernier

INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 

Dernier (20)

Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 

Cyber law/Business law

  • 2. Need of Cyber Law "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, U S A "Computers at Risk”.1991 Prof. SVK
  • 3. Cyber Law ?  Cyber Law is the law governing cyber space.  Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Prof. SVK
  • 4. Cyber Law Deals with  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy Prof. SVK
  • 5. IT Act, 2000 • Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws • IT Act is based on Model law on e- commerce adopted by UNCITRAL Prof. SVK
  • 6. Objectives of the IT Act To provide legal recognition for transactions:- • Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“ • To facilitate electronic filing of documents with Government agencies and E-Payments • To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934 Prof. SVK
  • 7. Extent of application • Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India • Section 2 (1) (a) –”Access” means gaining entry into ,instructing or communicating with the logical, arithmetic or memory function resources of a computer, computer resource or network Prof. SVK
  • 8. Definitions ( section 2) • "computer" means electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or relates to the computer in a computer system or computer network; • "computer network" means the inter-connection of one or more computers through- • (i) the use of satellite, microwave, terrestrial lime or other communication media; and • (ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained; Prof. SVK
  • 9. Definitions ( section 2) • "computer system" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable being used in conjunction with external files which contain computer programmes, electronic instructions, input data and output data that performs logic, arithmetic, data storage and retrieval, communication control and other functions; • "data" means a representation of information, knowledge, facts, concepts or instruction which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. Prof. SVK
  • 10. Definitions ( section 2) • "electronic record" means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche; • “secure system” means computer hardware, software, and procedure that- (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended function; and (d) adhere to generally accepted security procedures • “security procedure” means the security procedure prescribed by the Central Government under the IT Act, 2000. • secure electronic record – where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification Prof. SVK
  • 11. Act is in applicable to… • (a) a negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881; • (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882; • (c) a trust as defined in section 3 of the Indian Trusts Act, 1882; Prof. SVK
  • 12. Act is in applicable to… • (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition • (e) any contract for the sale or conveyance of immovable property or any interest in such property; • (f) any such class of documents or transactions as may be notified by the Central Government Prof. SVK
  • 13. OBJECTIVES OF IT ACT 1. It is objective of I.T. Act 2000 to give legal recognition to any transaction which is done by electronic way or use of internet. 2. To give legal recognition to digital signature for accepting any agreement via computer. 3. To provide facility of filling document online relating to school admission or registration in employment exchange. 4. According to I.T. Act 2000, any company can store their data in electronic storage. Prof. SVK
  • 14. OBJECTIVES OF IT ACT.. 5. To stop computer crime and protect privacy of internet users. 6. To give legal recognition for keeping books of accounts by bankers and other companies in electronic form. 7. To make more power to RBI and Indian Evidence act for restricting electronic crime. Prof. SVK
  • 15. SCOPE OF IT ACT 1. Information technology act 2000 is not applicable on the attestation for creating trust via electronic way. Physical attestation is must. 2. I.T. Act 2000 is not applicable on the attestation for making will of any body. Physical attestation by two witnesses is must. 3. A contract of sale of any immovable property. 4. Attestation for giving power of attorney of property is not possible via electronic record.Prof. SVK
  • 16. Advantages of Cyber Laws • Helpful to promote e-commerce • Enhance the corporate business • Filing online forms • High penalty for cyber crime • Digital signatures have been given legal validity and sanction in the Act. Prof. SVK
  • 17. Digital signature • Digital signature means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3. Section 3 deals with the conditions subject to which an electronic record may be authenticated by means of affixing digital signature which is created in two definite steps. Prof. SVK
  • 18. First, the electronic record is converted into a message digest by using a mathematical function known as 'Hash function' which digitally freezes the electronic record thus ensuring the integrity of the content of the intended communication contained in the electronic record. Any tampering with the contents of the electronic record will immediately invalidate the digital signature. Secondly, the identity of the person affixing the digital signature is authenticated through the use of a private key which attaches itself to the message digest and which can be verified by anybody who has the public key corresponding to such private key. This will enable anybody to verify whether the electronic record is retained intact or has been tampered with since it was so fixed with the digital signature. It will also enable a person who has a public key to identify the originator of the message. Prof. SVK
  • 19. Attribution of electronic records. An electronic record shall be attributed to the originator - • if it was sent by the originator himself. • by a person who had the authority to act on behalf of the originator in respect of that electronic record, or • by an information system programmed by or on behalf of the originator to operate automatically. Prof. SVK
  • 20. Acknowledgment of receipt Where the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, an acknowledgment may be given by – • any communication by the addressee, automated or otherwise, or • any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received. • unless acknowledgment has been so received, the electronic record shall be deemed to have been never sent by the originator. Prof. SVK
  • 21. despatch and receipt of electronic record • if the addressee has designated a computer resource for the purpose of receiving electronic records - – receipt occurs at the time when the electronic, record enters the designated computer resource, or – if the electronic record is sent to a computer resource of the addressee that is not the designated computer resource, receipt occurs at the time when the electronic record is retrieved by the addressee. • if the addressee has not designated a computer resource along with specified timings, if any, receipt occurs when the electronic record enters the computer resource of the addressee. Prof. SVK
  • 22. Digital Signature Certificates • (DSC) are the digital equivalent (that is electronic format) of physical or paper certificates. • Examples of physical certificates are drivers' licenses, passports or membership cards. • Certificates serve as proof of identity of an individual for a certain purpose; for example, a driver's license identifies someone who can legally drive in a particular country. Likewise, a digital certificate can be presented electronically to prove your identity, to access information or services on the Internet or to sign certain documents digitally. Prof. SVK
  • 23. Who issues the Digital Signature Certificate • A licensed Certifying Authority (CA) issues the digital signature. Certifying Authority (CA) means a person who has been granted a license to issue a digital signature certificate under Section 24 of the Indian IT-Act 2000. Tata Consultancy Services (TCS) National Informatics Center (NIC) IDRBT(Institute for Development & Research in Banking Technology)Certifying Authority SafeScrypt CA Services, Sify Communications Ltd. (n) Code Solutions CAMTNL Trust Line* Customs & Central Excise E-MUDHRA Prof. SVK
  • 24. Regulation of Certifying Authorities Appointment of Controller and other officers. • The Central Government may, by notification in the Official Gazette, appoint a Controller of Certifying Authorities for the purposes of this Act and may also by the same or subsequent notification appoint such number of Deputy Controllers and Assistant Controllers as it deems fit. • The Controller shall discharge his functions under this Act subject to the general control and directions of the Central Government. • The Deputy Controllers and Assistant Controllers shall perform the functions assigned to them by the Controller under the general superintendence and control of the Controller. Prof. SVK
  • 25. Appointment of Controller and other officers. • The qualifications, experience and terms and conditions of service of Controller, Deputy Controllers and Assistant Controllers shall be such as may be prescribed by the Central Government. • The Head Office and Branch Office of the office of the Controller shall be at such places as the Central Government may specify, and these may be established at such places as the Central Government may think fit. • There shall be a seal of the Office of the Controller. Prof. SVK
  • 26. Functions of Controller The Controller may perform all or any of the following functions, namely: - • exercising supervision over the activities of the Certifying Authorities. • certifying public keys of the Certifying Authorities. • laying down the standards to be maintained by the Certifying Authorities. • specifying the qualifications and experience which employees of the Certifying Authorities should possess. • specifying the conditions subject to which the Certifying Authorities shall conduct their business. • specifying the contents of written, printed or visual materials and advertisements that may be distributed or used in respect of a Digital Signature Certificate and the public key. Prof. SVK
  • 27. Functions of Controller • specifying the form and content of a Digital Signature Certificate and the key. • specifying the form and manner in which accounts shall be maintained by the Certifying Authorities. • specifying the terms and conditions subject to which auditors may be appointed and the remuneration to be paid to them. • facilitating the establishment of any electronic system by a Certifying Authority either solely or jointly with other Certifying Authorities and regulation of such systems. • specifying the manner in which the Certifying Authorities shall conduct their dealings with the subscribers. Prof. SVK
  • 28. Functions of Controller • resolving any conflict of interests between the Certifying Authorities and the subscribers. • laying down the duties of the Certifying Authorities. • maintaining a data base containing the disclosure record of every Certifying Authority containing such particulars as may be specified by regulations, which shall be accessible to public. Prof. SVK
  • 29. Offences & Penalties under the Information Technology Act, 2000 • Offences: Cyber offences are the unlawful acts which are carried in a very sophisticated manner in which either the computer is the tool or target or both. Cyber crime usually includes: (a) Unauthorized access of the computers (b) Data diddling (c) Virus/worms attack (d) Theft of computer system (e) Hacking (f) Denial of attacks (g) Logic bombs (h) Trojan attacks (i) Internet time theft (j) Web jacking (k) Email bombing (l) Salami attacks (m) Physically damaging computer system. Prof. SVK
  • 30. Section 65. Tampering with computer source documents: • Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer Programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the being time in force, shall be punishable with Penalties: Imprisonment up to 3 years and / or Fine: Two lakh rupees. Prof. SVK
  • 31. Section66. Hacking with the computer system Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. Penalties: Punishment: Imprisoned up to three years and Fine: which may extend up to two lakh rupees Or with both. Prof. SVK
  • 32. Section 67. Publishing of obscene information in electronic form: • Publishing or transmitting, or causing to be published, pornographic material in electronic form • Penalties: Punishment: On first conviction - Imprisonment which may extend up to five years. Fine: up to on first conviction which may extend to one lakh rupees. • On second conviction ---- imprisonment up to which may extend to ten years and Fine which may extend up to two lakh rupees. Case Laws: 1. The State of Tamil Nadu v/s Suhas Katti. Prof. SVK
  • 33. Section 68. Power of controller to give directions: (1) The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made there under. (2) Any person who fails to comply with any order under sub- section (1) shall be guilty of an offence and shall be liable on conviction to imprisonment for a term not exceeding three years or to a fine not exceeding two lakh rupees or to both. Penalties: Punishment: imprisonment up to a term not exceeding three years Fine: not exceeding two lakh rupees. Prof. SVK
  • 34. Section 69. Directions of Controller to a subscriber to extend facilities to decrypt information: If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence; for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub-section (1), extend all facilities and technical assistance to decrypt the information. Penalties: imprisonment for a term which may extend to seven years. http://www.legalservicesindia.com/article/article/offences-&- penalties-under-the-it-act-2000-439-1.html Prof. SVK
  • 35. Section 70. Protected System (1) The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system. (2) The appropriate Government may, by order in writing, authorize the persons who are authorized to access protected systems notified under sub-section (1). (3) Any person who secures access or attempts to secure access to a protected system in contravention of the provision of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine. Explanation: This section grants the power to the appropriate government to declare any computer, computer system or computer network, to be a protected system. Only authorized person has the right to access to protected system. Penalties: Punishment: the imprisonment which may extend to ten years and fine. Prof. SVK
  • 36. Section 71. Penalty for misrepresentation (1) Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or which fine which may extend to one lakh rupees, or with both. Penalties: Punishment: imprisonment which may extend to two years Fine: may extend to one lakh rupees or with both. Prof. SVK
  • 37. Section 72. Penalty for breach of confidentiality and privacy This section relates to any to nay person who in pursuance of any of the powers conferred by the Act or it allied rules and regulations has secured access to any: Electronic record, books, register, correspondence, information, document, or other material. If such person discloses such information, he will be punished with penalty. It would not apply to disclosure of personal information of a person by a website, by his email service provider. Penalties: Punishment: term which may extend to two years. Fine: one lakh rupees or with both. Prof. SVK
  • 38. Section 73. Penalty for publishing Digital Signature Certificate false in certain particulars (1) No person shall publish a Digital Signature Certificate or otherwise make it available to any other person with the knowledge that- (a) The Certifying Authority listed in the certificate has not issued it; or (b) The subscriber listed in the certificate has not accepted it; or (c) The certificate has been revoked or suspended, unless such publication is for the purpose of verifying a digital signature created prior to such suspension or revocation. (2) Penalties: Punishment imprisonment of a term of which may extend to two years. Fine: fine may extend to 1 lakh rupees or with both. Prof. SVK
  • 39. Section 74. Publication for fraudulent purpose Explanation: This section prescribes punishment for the following acts: Knowingly creating a digital signature certificate for any i. fraudulent purpose or, ii. unlawful purpose. Knowingly publishing a digital signature certificate for any i. fraudulent purpose or ii. unlawful purpose Knowingly making available a digital signature certificate for any i. fraudulent purpose or ii. unlawful purpose. Penalties: Punishment: imprisonment for a term up to two years. Fine: up to one lakh or both. Prof. SVK
  • 40. Section 75. Act to apply for offence or contravention committed outside India (1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality. (2) For the purposes of sub-section (1), this Act shall apply to an offence or Contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India. Explanation: This section has broader perspective including cyber crime, committed by cyber criminals, of any nationality, any territoriality. Prof. SVK
  • 41. Section 76. Confiscation The aforesaid section highlights that all devices whether computer, computer system, floppies, compact disks, tape drives or any other storage, communication, input or output device which helped in the contravention of any provision of this Act, rules, orders, or regulations made under there under liable to be confiscated. Prof. SVK
  • 42. 77. Penalties or confiscation not to interfere with other punishments No penalty imposed or confiscation made under this Act shall prevent the imposition of any other punishment to which the person affected thereby is liable under any other law for the time being in force. Explanation: The aforesaid section lays down a mandatory condition, which states the Penalties or confiscation not to interfere with other punishments to which the person affected thereby is liable under any other law for the time being in force. Prof. SVK
  • 43. 78. Power to investigate offences Notwithstanding anything contained in the Code of Criminal Procedure, 1973, a police officer not below the rank of Deputy Superintendent of Police shall investigate any offence under this Act. Explanation: The police officer not below the rank of Deputy Superintendent of police shall investigate the offence. Prof. SVK
  • 44. Indiastands11th intherankingfor CyberCrimein theWorld,constituting3%of the GlobalCyberCrime. Prof. SVK
  • 45. Conclusion… “Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” "As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.” Prof. SVK