SlideShare une entreprise Scribd logo
1  sur  28
CYBER LAWS AND INFORMATION
TECHNOLOGY ACT 2000
THE ACT OF PARLIAMENT RECEIVED THE ASSENT OF
THE PRESIDENT ON THE 9TH JUNE, 2000
PRESENTED BYPRESENTED BY
SNEHA CHOUHAN
(Roll No. 21)
DR. D Y PATIL UNIVERSITY,
SCHOOL OF BUSINESS
MANAGEMENT,
NAVI MUMBAI.
CONTENTS
1. INFORMATION TECHNOLOGY ACT 2000
2. OBJECTIVES OF THE IT ACT 2000
3. SECTIONS OF IT ACT 2000
4. SECTION 5 LEGAL RECOGNITION OF DIGITAL SIGNATURES
5. SECTION 15 SECURE DIGITAL SIGNATURE.
6. SECTION 65 TAMPERING WITH COMPUTER SOURCE DOCUMENTS
7. SECTION 66 HACKING WITH COMPUTER SYSTEM
8. SECTION 67 PUBLISHING OF OBSCENE INFORMATION
9. SECTION 73 - PENALTY FOR PUBLISHING FALSE DIGITAL SIGNATURE
CERTIFICATE
10. SECTION 74 PUBLICATION FOR FRAUDULENT PURPOSE
11. THE CYBER REGULATIONS APPELLATE TRIBUNAL
12. SECTION 48 ESTABLISHMENT OF CYBER APPELLATE TRIBUNAL
13. SECTION 49 COMPOSITION OF CYBER APPELLATE TRIBUNAL
14. CASE STUDIES AND OTHER AMENDMENTS
INFORMATION TECHNOLOGY
ACT 2000
• The act of parliament received the assent of the president
on the 9th
June, 2000.
• Information Technology Act 2000, is to provide legal
recognition for transactions carried out by means of
electronic data interchange and other means of electronic
communication, commonly referred to as “electronic
commerce”, which involve the use of alternatives to paper-
based methods of communication and storage of
information, to facilitate electronic filing of documents with
the Government agencies and further to amend the Indian
Penal Code, the Indian Evidence Act, 1872, the Bankers
Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and for matters connected therewith or
incidental thereto.
• Information Technology Act 2000, is based on UNCITRAL
(United Nations Commission on International Trade Law)
Model Law.
• Information Technology Act 2000, has 13 chapters, 94
sections and 4 schedules.
– First 14 sections deals with some legal aspects
concerning digital signature.
– Further other sections deal with certifying authorities who
are licensed to issue digital signature certificate.
– Sections 43 to 47 provide for penalties and
compensation.
– Sections 48 to 64 deals with Tribunals a appeal to high
court.
– Section 65 to 79 of the act deals with offences.
– Section 80 to 94 deals with miscellaneous of the Act.
OBJECTIVES OF THE IT ACT
2000
To provide legal recognition for transactions:-
Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as "electronic commerce“
To facilitate electronic filing of documents with
Government agencies and E-Payments
To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act ,1934
Aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other
activities carried out by electronic means.
OBJECTIVES OF THE IT ACT
2000
Legal Recognition for E-Commerce
• Digital Signatures and Regulatory Regime
• Electronic Documents at par with paper documents
E-Governance
• Electronic Filing of Documents
Amend certain Acts
Define Civil wrongs, Offences, punishments
• Investigation, Adjudication
• Appellate Regime
COMPUTER (CYBER) CRIME
There are various types of computer crimes (also known as cyber crimes)
which are as follows:
– Phreakers
– Fraud
– Hackers (Hacking)
– Pornography
– Viruses
– Pedophiles
– Harassment
– Email Security Destruction
– Data Fiddling
– Violation of Privacy
– Crackers etc.
SECTIONS OF IT ACT 2000
• Sections 2(d) of the act defines “affixing digital signature” as
affixing digital signature, with its grammatical variations and
cognate expressions means adoption of any methodology or
procedure by a person for the purpose of authenticating an
electronic record by means of digital signature.
• Section 2(i) “computer” is defined as any electronic, magnetic,
optical or high speed data proceeding device or systems which
performs logical, arithmetic and memory functions by
manipulations of electronic, magnetic or optical impulses and
includes all input, output, proceedings, storage, computer
software or communication facilities which are concerned or
related to the computer in a computer system or computer
network.
• Section 2(zc) defines private key as the key of a key pair used to
create a digital signature.
• Section 2(zd) defines public key as the key of a key pair used to
verify a digital signature and listed in Digital Signature Certificate.
SECTION 5 LEGAL RECOGNITION
OF DIGITAL SIGNATURES
• Section 5 of the Act gives legal recognition to digital
signatures.
• Where any law provides that information or any other
matter shall be authenticated by affixing the signature or
any document shall be signed or bear the signature of any
person then, notwithstanding anything contained in such
law, such requirement shall be deemed to have been
satisfied, if such information or matter is authenticated by
means of digital signature affixed in such manner as may
be prescribed by the Central Government.
SECTION 15 SECURE DIGITAL
SIGNATURE.
If, by application of a security procedure agreed to by the
parties concerned, it can be verified that a digital signature,
at the time it was affixed, was—
– unique to the subscriber affixing it;
– capable of identifying such subscriber;
– created in a manner or using a means under the exclusive
control of the subscriber and is linked to the electronic
record to which it relates in such a manner that if the
electronic record was altered the digital signature would be
invalidated,
then such digital signature shall be deemed to be a secure
digital signature.
SECTION 65 TAMPERING WITH
COMPUTER SOURCE DOCUMENTS
• Whoever knowingly or intentionally conceals,
destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any
computer source code used for a computer,
computer programme, computer system or
computer network, when the computer source
code is required to be kept or maintained by law
for the time being in force, shall be punishable
with imprisonment up to three years, or with fine
which may extend up to two lakh rupees, or with
both.
SECTION 66 HACKING WITH
COMPUTER SYSTEM
• Whoever with the intent to cause or knowing that he is
likely to cause wrongful loss or damage to the public or any
person destroys or deletes or alters any information residing
in a computer resource or diminishes its value or utility or
affects it injuriously by any means, commits hack:
• Whoever commits hacking shall be punished with
imprisonment up to three years, or with fine which may
extend upto two lakh rupees, or with both
SECTION 67 PUBLISHING OF
OBSCENE INFORMATION
• Whoever publishes or transmits or causes to be
published in the electronic form, any material which is
lascivious or appeals to the prurient interest or if its
effect is such as to tend to deprave and corrupt persons
who are likely, having regard to all relevant
circumstances, to read, see or hear the matter contained
or embodied in it, shall be punished on first conviction
with imprisonment of either description for a term which
may extend to five years and with fine which may extend
to one lakh rupees and in the event of a second or
subsequent conviction with imprisonment of either
description for a term which may extend to ten years and
also with fine which may extend to two lakh rupees.
SECTION 73 - PENALTY FOR
PUBLISHING FALSE DIGITAL
SIGNATURE CERTIFICATE
• No person shall publish a Digital Signature Certificate or otherwise
make it available to any other person with the knowledge that—
– the Certifying Authority listed in the certificate has not issued it; or
– the subscriber listed in the certificate has not accepted it; or
– the certificate has been revoked or suspended,
• unless such publication is for the purpose of verifying a digital
signature created prior to such suspension or revocation.
• Any person who contravenes the provisions of sub-section
(1) shall be punished with imprisonment for a term which may extend
to two years, or with fine which may extend to one lakh rupees, or
with both.
SECTION 74 PUBLICATION
FOR FRAUDULENT PURPOSE
Whoever knowingly creates, publishes or otherwise makes
available a Digital Signature Certificate for any fraudulent or
unlawful purpose shall be punished with imprisonment for a
term which may extend to two years, or with fine which may
extend to one lakh rupees, or with both.
THE CYBER REGULATIONS
APPELLATE TRIBUNAL
Cyber Appellate Tribunal are created to regulate and
supervise the Certifying Authorities who issue Digital
Signature certificates.
• Cyber Appellate Tribunal provide for appeal by person
aggrieved against an order made by the Adjudicating Officer
under the Information Technology Act.
•Section 48 to 64 of Information Technology Act 2000
contains provisions relating to Cyber Appellate Tribunal.
SECTION 48 ESTABLISHMENT
OF CYBER APPELLATE
TRIBUNAL
• The Central Government shall, by notification, establish one
or more appellate tribunals to be known as the Cyber
Regulations Appellate Tribunal.
• The Central Government shall also specify, in the
notification referred to in subsection
(1), the matters and places in relation to which the Cyber
Appellate Tribunal may exercise jurisdiction.
SECTION 49 COMPOSITION OF
CYBER APPELLATE TRIBUNAL
A Cyber Appellate Tribunal shall
consist of one person only
(hereinafter referred to as the
Residing Officer of the Cyber
Appellate Tribunal) to be appointed,
by notification, by the Central
Government
ELECTRONIC
GOVERNANCE
• Legal recognition of electronic records.
• Legal recognition of digital signatures.
• Use of electronic records and digital signatures in
Government and its agencies.
• Retention of electronic records.
• Publication of rule, regulation, etc., in Electronic Gazette.
• Sections 6,7 and 8 not to confer right to insist document
should be accepted in electronic form.
• Power to make rules by Central Government in respect of
digital signature.
ADVANTAGES OF IT ACT
2000
Helpful to promote Ecommerce
Enhance the corporate business
Filing online forms
High penalty for cyber crime
CASE STUDIES
AND SOME
RECENT
AMENDMENTS
CASE STUDY – 1
STATE OF TAMIL NADU V/S SUHAS KATTI
CONVICTION WITHIN 7 MONTHS
• The case related to posting of obscene, defamatory and annoying message
about a divorcee woman in the yahoo message group. E-Mails were also
forwarded to the victim for information by the accused through a false e-mail
account opened by him in the name of the victim. The posting of the
message resulted in annoying phone calls to the lady in the belief that she
was soliciting.
• The accused was a known family friend of the victim and was reportedly
interested in marrying her. She however married another person. This
marriage later ended in divorce and the accused started contacting her once
again. On her reluctance to marry him, the accused took up the harassment
through the Internet.
• The accused is found guilty and convicted for offences under section 469,
509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted
under section 67 of Information Technology Act 2000 in India.
• The accused paid fine amount and he was lodged at Central Prison, Chennai.
This is considered as the first case convicted under section 67 of Information
Technology Act 2000 in India.
CASE STUDY – 2
EXTORTION OF MONEY THROUGH
INTERNET
• The complainant has received a threatening email and demanded
protection from unknown person claiming to be the member of
Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC.
• The sender of the email used the email ID xyz@yahoo.com &
abc@yahoo.com and signed as Chengez Babar.
Both the email accounts were tracked, details collected from ISP’s
(Internet Service Provider) & locations were identified.
• The Cyber cafes from which the emails has been made were
monitored and the accused person was nabbed red handed.
CASE STUDY – 3
FIR NO. 76/02FIR NO. 76/02
PS PARLIAMENT STREETPS PARLIAMENT STREET
• Mrs. Sonia Gandhi received threatening E - mail from
missionrevenge84@hotmail.com
• The case was referred to Cyber Cell
• Accused was traces and found that he had lost his parents
during 1984 riots and thus sent threatening emails to Sonia.
CASE STUDY – 4
CYBER STALKING
• Ritu Kohli (first lady to register the cyber stalking case) is
a victim of cyber-stalking.
• A friend of her husband gave her phone number and
name on a chat site for immoral purposes.
• A computer expert, Kohli was able to trace the culprit.
• Now, the latter is being tried for "outraging the modesty
of a woman", under Section 509 of IPC.
RECENT AMENDMENT
RELATED TO INFORMATION
TECHNOLOGY ACT
• Section 66 A
THANKYOU

Contenu connexe

Tendances

Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Insider trading
Insider tradingInsider trading
Insider tradingsristi1992
 
Insights of Insider Trading
Insights of Insider Trading Insights of Insider Trading
Insights of Insider Trading Pavan Kumar Vijay
 
The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)Himanshu Goyal
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remediesAltacit Global
 
Prevention of money laundering act, 2002 part i
Prevention of money laundering act, 2002 part iPrevention of money laundering act, 2002 part i
Prevention of money laundering act, 2002 part iDVSResearchFoundatio
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

Tendances (20)

IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Insider trading
Insider tradingInsider trading
Insider trading
 
Insights of Insider Trading
Insights of Insider Trading Insights of Insider Trading
Insights of Insider Trading
 
The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remedies
 
Prevention of money laundering act, 2002 part i
Prevention of money laundering act, 2002 part iPrevention of money laundering act, 2002 part i
Prevention of money laundering act, 2002 part i
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 

En vedette

Interview Questions- Human Resource Management
Interview Questions- Human Resource ManagementInterview Questions- Human Resource Management
Interview Questions- Human Resource ManagementSneha J Chouhan
 
Marketing Management PPT
Marketing Management PPTMarketing Management PPT
Marketing Management PPTSneha J Chouhan
 
Does Young Generation Behave Ethically
Does Young Generation Behave EthicallyDoes Young Generation Behave Ethically
Does Young Generation Behave EthicallySnehaJChauhan
 
An Analysis Of the Union Budget from 2010- 2015 Education Sector
An Analysis Of the Union Budget from 2010- 2015 Education SectorAn Analysis Of the Union Budget from 2010- 2015 Education Sector
An Analysis Of the Union Budget from 2010- 2015 Education SectorSneha J Chouhan
 
Marketing Strategies comparison between Samsung, HTC and Motorola
Marketing Strategies comparison between Samsung, HTC and MotorolaMarketing Strategies comparison between Samsung, HTC and Motorola
Marketing Strategies comparison between Samsung, HTC and MotorolaSneha J Chouhan
 
A brief summary about Bharat Petroleum Corporation Limited (BPCL)
A brief summary about Bharat Petroleum Corporation Limited (BPCL)A brief summary about Bharat Petroleum Corporation Limited (BPCL)
A brief summary about Bharat Petroleum Corporation Limited (BPCL)Sneha J Chouhan
 
Leadership and a business game on leadership.
Leadership and a business game on leadership.Leadership and a business game on leadership.
Leadership and a business game on leadership.Sneha J Chouhan
 
Indian Contract Act 1872 Competency Of The Parties to contract
Indian Contract Act 1872 Competency Of The Parties to contract Indian Contract Act 1872 Competency Of The Parties to contract
Indian Contract Act 1872 Competency Of The Parties to contract SnehaJChauhan
 
Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...
Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...
Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...Sneha J Chouhan
 
A Business Plan On Catering Services (Wholesome Catering Services)
A Business Plan On Catering Services (Wholesome Catering Services)A Business Plan On Catering Services (Wholesome Catering Services)
A Business Plan On Catering Services (Wholesome Catering Services)Sneha J Chouhan
 
Public Distribution System
Public Distribution SystemPublic Distribution System
Public Distribution SystemSneha J Chouhan
 
Service Sector Management at State Bank of India
Service Sector Management at State Bank of IndiaService Sector Management at State Bank of India
Service Sector Management at State Bank of IndiaSneha J Chouhan
 
Why & How to Design a Deck: Transform Slides into Remarkable Presentations
 Why & How to Design a Deck: Transform Slides into Remarkable Presentations Why & How to Design a Deck: Transform Slides into Remarkable Presentations
Why & How to Design a Deck: Transform Slides into Remarkable PresentationsOnkaro
 

En vedette (20)

Interview Questions- Human Resource Management
Interview Questions- Human Resource ManagementInterview Questions- Human Resource Management
Interview Questions- Human Resource Management
 
Quality Control
Quality ControlQuality Control
Quality Control
 
Sales Promotion
Sales PromotionSales Promotion
Sales Promotion
 
Sand Mafia (India)
Sand Mafia (India)Sand Mafia (India)
Sand Mafia (India)
 
Research Process.
Research Process.Research Process.
Research Process.
 
Marketing Management PPT
Marketing Management PPTMarketing Management PPT
Marketing Management PPT
 
Does Young Generation Behave Ethically
Does Young Generation Behave EthicallyDoes Young Generation Behave Ethically
Does Young Generation Behave Ethically
 
An Analysis Of the Union Budget from 2010- 2015 Education Sector
An Analysis Of the Union Budget from 2010- 2015 Education SectorAn Analysis Of the Union Budget from 2010- 2015 Education Sector
An Analysis Of the Union Budget from 2010- 2015 Education Sector
 
Marketing Strategies comparison between Samsung, HTC and Motorola
Marketing Strategies comparison between Samsung, HTC and MotorolaMarketing Strategies comparison between Samsung, HTC and Motorola
Marketing Strategies comparison between Samsung, HTC and Motorola
 
A brief summary about Bharat Petroleum Corporation Limited (BPCL)
A brief summary about Bharat Petroleum Corporation Limited (BPCL)A brief summary about Bharat Petroleum Corporation Limited (BPCL)
A brief summary about Bharat Petroleum Corporation Limited (BPCL)
 
Thinking skills
Thinking skillsThinking skills
Thinking skills
 
Leadership and a business game on leadership.
Leadership and a business game on leadership.Leadership and a business game on leadership.
Leadership and a business game on leadership.
 
Indian Contract Act 1872 Competency Of The Parties to contract
Indian Contract Act 1872 Competency Of The Parties to contract Indian Contract Act 1872 Competency Of The Parties to contract
Indian Contract Act 1872 Competency Of The Parties to contract
 
Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...
Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...
Functions Of Management At Subway (Planning, Organising, Directing, Staffing,...
 
A Business Plan On Catering Services (Wholesome Catering Services)
A Business Plan On Catering Services (Wholesome Catering Services)A Business Plan On Catering Services (Wholesome Catering Services)
A Business Plan On Catering Services (Wholesome Catering Services)
 
Public Distribution System
Public Distribution SystemPublic Distribution System
Public Distribution System
 
Service Sector Management at State Bank of India
Service Sector Management at State Bank of IndiaService Sector Management at State Bank of India
Service Sector Management at State Bank of India
 
Decision Making Skills
Decision Making Skills Decision Making Skills
Decision Making Skills
 
Capital Market
Capital MarketCapital Market
Capital Market
 
Why & How to Design a Deck: Transform Slides into Remarkable Presentations
 Why & How to Design a Deck: Transform Slides into Remarkable Presentations Why & How to Design a Deck: Transform Slides into Remarkable Presentations
Why & How to Design a Deck: Transform Slides into Remarkable Presentations
 

Similaire à IT Act 2000 overview

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptAdityaRanjan789094
 

Similaire à IT Act 2000 overview (20)

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
law.pptx
law.pptxlaw.pptx
law.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Class it act
Class it actClass it act
Class it act
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber
CyberCyber
Cyber
 
It act 2000
It act 2000It act 2000
It act 2000
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
 

Dernier

Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxjohnpazperpetua10
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 

Dernier (20)

Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptx
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 

IT Act 2000 overview

  • 1. CYBER LAWS AND INFORMATION TECHNOLOGY ACT 2000 THE ACT OF PARLIAMENT RECEIVED THE ASSENT OF THE PRESIDENT ON THE 9TH JUNE, 2000
  • 2. PRESENTED BYPRESENTED BY SNEHA CHOUHAN (Roll No. 21) DR. D Y PATIL UNIVERSITY, SCHOOL OF BUSINESS MANAGEMENT, NAVI MUMBAI.
  • 3. CONTENTS 1. INFORMATION TECHNOLOGY ACT 2000 2. OBJECTIVES OF THE IT ACT 2000 3. SECTIONS OF IT ACT 2000 4. SECTION 5 LEGAL RECOGNITION OF DIGITAL SIGNATURES 5. SECTION 15 SECURE DIGITAL SIGNATURE. 6. SECTION 65 TAMPERING WITH COMPUTER SOURCE DOCUMENTS 7. SECTION 66 HACKING WITH COMPUTER SYSTEM 8. SECTION 67 PUBLISHING OF OBSCENE INFORMATION 9. SECTION 73 - PENALTY FOR PUBLISHING FALSE DIGITAL SIGNATURE CERTIFICATE 10. SECTION 74 PUBLICATION FOR FRAUDULENT PURPOSE 11. THE CYBER REGULATIONS APPELLATE TRIBUNAL 12. SECTION 48 ESTABLISHMENT OF CYBER APPELLATE TRIBUNAL 13. SECTION 49 COMPOSITION OF CYBER APPELLATE TRIBUNAL 14. CASE STUDIES AND OTHER AMENDMENTS
  • 4. INFORMATION TECHNOLOGY ACT 2000 • The act of parliament received the assent of the president on the 9th June, 2000. • Information Technology Act 2000, is to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper- based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.
  • 5. • Information Technology Act 2000, is based on UNCITRAL (United Nations Commission on International Trade Law) Model Law. • Information Technology Act 2000, has 13 chapters, 94 sections and 4 schedules. – First 14 sections deals with some legal aspects concerning digital signature. – Further other sections deal with certifying authorities who are licensed to issue digital signature certificate. – Sections 43 to 47 provide for penalties and compensation. – Sections 48 to 64 deals with Tribunals a appeal to high court. – Section 65 to 79 of the act deals with offences. – Section 80 to 94 deals with miscellaneous of the Act.
  • 6. OBJECTIVES OF THE IT ACT 2000 To provide legal recognition for transactions:- Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“ To facilitate electronic filing of documents with Government agencies and E-Payments To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934 Aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.
  • 7. OBJECTIVES OF THE IT ACT 2000 Legal Recognition for E-Commerce • Digital Signatures and Regulatory Regime • Electronic Documents at par with paper documents E-Governance • Electronic Filing of Documents Amend certain Acts Define Civil wrongs, Offences, punishments • Investigation, Adjudication • Appellate Regime
  • 8. COMPUTER (CYBER) CRIME There are various types of computer crimes (also known as cyber crimes) which are as follows: – Phreakers – Fraud – Hackers (Hacking) – Pornography – Viruses – Pedophiles – Harassment – Email Security Destruction – Data Fiddling – Violation of Privacy – Crackers etc.
  • 9. SECTIONS OF IT ACT 2000 • Sections 2(d) of the act defines “affixing digital signature” as affixing digital signature, with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature. • Section 2(i) “computer” is defined as any electronic, magnetic, optical or high speed data proceeding device or systems which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses and includes all input, output, proceedings, storage, computer software or communication facilities which are concerned or related to the computer in a computer system or computer network. • Section 2(zc) defines private key as the key of a key pair used to create a digital signature. • Section 2(zd) defines public key as the key of a key pair used to verify a digital signature and listed in Digital Signature Certificate.
  • 10. SECTION 5 LEGAL RECOGNITION OF DIGITAL SIGNATURES • Section 5 of the Act gives legal recognition to digital signatures. • Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document shall be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of digital signature affixed in such manner as may be prescribed by the Central Government.
  • 11. SECTION 15 SECURE DIGITAL SIGNATURE. If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was— – unique to the subscriber affixing it; – capable of identifying such subscriber; – created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature.
  • 12. SECTION 65 TAMPERING WITH COMPUTER SOURCE DOCUMENTS • Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 13. SECTION 66 HACKING WITH COMPUTER SYSTEM • Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack: • Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both
  • 14. SECTION 67 PUBLISHING OF OBSCENE INFORMATION • Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.
  • 15. SECTION 73 - PENALTY FOR PUBLISHING FALSE DIGITAL SIGNATURE CERTIFICATE • No person shall publish a Digital Signature Certificate or otherwise make it available to any other person with the knowledge that— – the Certifying Authority listed in the certificate has not issued it; or – the subscriber listed in the certificate has not accepted it; or – the certificate has been revoked or suspended, • unless such publication is for the purpose of verifying a digital signature created prior to such suspension or revocation. • Any person who contravenes the provisions of sub-section (1) shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 16. SECTION 74 PUBLICATION FOR FRAUDULENT PURPOSE Whoever knowingly creates, publishes or otherwise makes available a Digital Signature Certificate for any fraudulent or unlawful purpose shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 17. THE CYBER REGULATIONS APPELLATE TRIBUNAL Cyber Appellate Tribunal are created to regulate and supervise the Certifying Authorities who issue Digital Signature certificates. • Cyber Appellate Tribunal provide for appeal by person aggrieved against an order made by the Adjudicating Officer under the Information Technology Act. •Section 48 to 64 of Information Technology Act 2000 contains provisions relating to Cyber Appellate Tribunal.
  • 18. SECTION 48 ESTABLISHMENT OF CYBER APPELLATE TRIBUNAL • The Central Government shall, by notification, establish one or more appellate tribunals to be known as the Cyber Regulations Appellate Tribunal. • The Central Government shall also specify, in the notification referred to in subsection (1), the matters and places in relation to which the Cyber Appellate Tribunal may exercise jurisdiction.
  • 19. SECTION 49 COMPOSITION OF CYBER APPELLATE TRIBUNAL A Cyber Appellate Tribunal shall consist of one person only (hereinafter referred to as the Residing Officer of the Cyber Appellate Tribunal) to be appointed, by notification, by the Central Government
  • 20. ELECTRONIC GOVERNANCE • Legal recognition of electronic records. • Legal recognition of digital signatures. • Use of electronic records and digital signatures in Government and its agencies. • Retention of electronic records. • Publication of rule, regulation, etc., in Electronic Gazette. • Sections 6,7 and 8 not to confer right to insist document should be accepted in electronic form. • Power to make rules by Central Government in respect of digital signature.
  • 21. ADVANTAGES OF IT ACT 2000 Helpful to promote Ecommerce Enhance the corporate business Filing online forms High penalty for cyber crime
  • 23. CASE STUDY – 1 STATE OF TAMIL NADU V/S SUHAS KATTI CONVICTION WITHIN 7 MONTHS • The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. • The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. • The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. • The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India.
  • 24. CASE STUDY – 2 EXTORTION OF MONEY THROUGH INTERNET • The complainant has received a threatening email and demanded protection from unknown person claiming to be the member of Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC. • The sender of the email used the email ID xyz@yahoo.com & abc@yahoo.com and signed as Chengez Babar. Both the email accounts were tracked, details collected from ISP’s (Internet Service Provider) & locations were identified. • The Cyber cafes from which the emails has been made were monitored and the accused person was nabbed red handed.
  • 25. CASE STUDY – 3 FIR NO. 76/02FIR NO. 76/02 PS PARLIAMENT STREETPS PARLIAMENT STREET • Mrs. Sonia Gandhi received threatening E - mail from missionrevenge84@hotmail.com • The case was referred to Cyber Cell • Accused was traces and found that he had lost his parents during 1984 riots and thus sent threatening emails to Sonia.
  • 26. CASE STUDY – 4 CYBER STALKING • Ritu Kohli (first lady to register the cyber stalking case) is a victim of cyber-stalking. • A friend of her husband gave her phone number and name on a chat site for immoral purposes. • A computer expert, Kohli was able to trace the culprit. • Now, the latter is being tried for "outraging the modesty of a woman", under Section 509 of IPC.
  • 27. RECENT AMENDMENT RELATED TO INFORMATION TECHNOLOGY ACT • Section 66 A