SlideShare a Scribd company logo
1 of 4
A NOTE ON INFORMATION TECHNOLOGY ACT,2000(IT Act,2000)
(This is in addition to the Xerox notes handed out)
Objective:- (please read from the Xerox notes)
IT Act, 2000 was enacted to implement the Model Law on Electronic commerce adopted by the “United Nations
Commission on International Trade Law” also known as “UNCITRAL”, in 1996.
IT Act, 2000 extends to whole of India.
IT Act, 2000 is NOT Applicable to the following Instruments or documents, namely:1) a Negotiable Instrument(ie a Bill of Exchange, Promissory Note and Cheque) other than a CHEQUE.
2) a Power of Attorney
3) a Trust
4) a Will
5) a Contract for the sale or conveyance of immovable property or any interest in such property.
6) any class of documents or transactions as may be notified by the Central Government in the Official Gazette.
The Two principal hurdles which stand in the way of facilitating electronic commerce and electronic governance
are the
1) requirement as to writing and
2) signature for legal recognition
Technical Points:- (certain important definitions found in the Zerox notes)
1) Access S.2(1)(a)
2) Affixing digital signature S.2(1)(d)
3)Certifying Authority. S.2(1) (g):- means a person who has been authorized to issue a Digital Signature Certificate
(DSC) under S.24 of the IT Act, 2000 by the CONTROLLER.
4)Controller:- S.2(1)(m) means the Controller of Certifying Authorities appointed by Central Govt.
5) Computer:- S.2(1)(i)
6) Computer Network:- S.2(1)(j)
7) Computer System:- S.2(1)(l)
8) Computer Resource:-S.2(1)(k)
Legal Recognition of Electronic Records:- S.4
Where ANY LAW provides that information or any other matter shall be in writing or in the typewritten or printed
form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been
satisfied if such information is—
(a) rendered or made available in an electronic form and
(b) accessible so as to be usable for a subsequent reference
Legal Recognition of Digital Signatures:- S.5
If any information or any other matter is required by law to be authenticated by affixing the signature, then
such requirement shall be deemed to have been satisfied if such information or matter is AUTHENTICATED
by means of digital signature affixed in the prescribed manner.
What is authentication?
According to S.3 of the IT Act, 2000, any SUBSCRIBER(ie a person in whose name the DSC is issued) may
AUTHENTICATE an electronic record by AFFIXING his Digital Signature.
What is meant by “Affixing the Digital signature”?
It means the adoption of any methodology or procedure by a person for the purpose of authenticating an
electronic record by means of a Digital signature.
How an authentication of the electronic record done?
It shall be done by the use of “asymmetric crypto system” and “hash function”, which ENVELOP AND TRANSFORM
the initial electronic record into another electronic record.(explanation to S.3, describes “Hash function)
S.2(1) defines “asymmetric crypto system” as a system of a secure KEY PAIR consisting of a Private key for
creating a Digital signature and a Public key to verify the Digital signature/record.
Key pair in an asymmetric crypto system means a Private Key and its MATHEMATICALLY RELATED Public
Key which are SO RELATED that the Public Key can verify a digital signature created by the Private Key.
As stated above, the Public Key encryption uses a system of two keys, namely,
a) a Private Key which only the user knows and Protects with a “Pass word” and
b) a Public Key which the other people use which is generally stored on “Public Key server”.
The “ Controller ” appointed by the Central Government under the IT Act, 2000 is the repository(the person with
whom things are kept) of the Public key server.
A document which is ENCRYPTED with one of the keys can be DECRYPTED only with the other key in the
Key pair.
Digital Signature Certificate is the ELECTRONIC equivalent of a physical signature that uses Cryptographic
Technologies to (1)establish the identity and authenticity of the person signing and (2) ensures that the
digitally signed data remains secure. Digital Signature Certificates are ENDORSED (signed) by a trusted
Authority(the Certifying Authority), which is empowered under the IT Act,2000 to issue them. The Certifying
Authority signs the DSCs with his Private Key to ensure its authenticity.
What is a CYBER CRIME?
It Connotes(means)more of crimes using computers as a tool for perpetration (to commit) or those having
as their end result, the “unauthorized access, manipulation etc., of intangible data stored on a computers
drives or other digital storage media.
Classification of Cyber Crime:It is of two broad types, namely:a)The use of computers and the internet as tools/media to perpetrate(commit)a traditional offence like
online fraud, criminal copyright infringement, defamation etc. Further, the new technologies make these
crimes easier to commit and more difficult to identify and prevent.
b) A computer or computer network is the target or subject of the attack.
Some examples where computer is the target are as follows:(i) Unauthorised access to computer files and programmes. This could occur as a result of password theft or
through the use of trapdoors that make it possible to enter a site bypassing or avoiding security protocols.
Trapdoors are built in for code writers to make quick entry and change and update code when there are
Bugs. Often trapdoors are left open and this can result in someone taking it over and changing code.
(ii) Unauthorized disruption of computer system, network. Here, an entity without the permission, interferes
with the FUNCTIONALITY of computer software or hardware. Viruses,worms, logic bombs, salami attacks,
Trojan horses, denial of service attacks are some of the examples.
Virus is a programme that modifies other programmes and the modified programme replicates.
Trojan horse is a computer programme that performs some apparently useful function but also contains
some malicious hidden code, which may introduce a virus or other bug or may permit unauthorized access
to an outsider.
(iii) Identity theft.
This may be simple such as “password sniffing “ or complex, such as “cross-site scripting” where code put
into a website that forces it to send out information against the will of its owners.
What is the effect of not COMPLYING with the Information Technology Act, 2000?
Non Compliance with the IT Act, 2000 results in either CONTRAVENTION OR AN OFFENCE.
What is a Contravention?
Generally contravention means not following the stipulations of an Act. However, S.43 of the IT Act, 2000
stipulates the following as Contraventions, namely:The following Acts IF DONE WITHOUT THE PERMISSION OF THE OWNER OR ANY OTHER PERSON WHO
IS INCHARGE OF A COMPUTER/NETWORK, are Contraventions:a) accessing or securing access to the computer/network
b) down loading any data or information from the computer/network
c) Introducing or causing to be introduced any computer contaminant or computer virus into the
computer/network
d) damaging or causing to be damaged the computer/network, data, computer data base or any other
programmes residing in it
e) disrupting or causing disruption of the computer/network
f) denying or causing the denial of access to any person authorized to access the computer/network by any
means
g) Providing assistance to any person to facilitate access to the computer/network in contravention of
provisions of the Act, rules or regulations made thereunder
h) CHARGING the services availed of by a person to the account of another person by tampering with or
manipulating any computer network.
As regards the consequence of contravention, the philosophy of dispute settlement under the IT Act,2000 is
through Compensation for damages. Thus, strictly no punishment/penalty can be imposed under S.43 of the
IT Act,2000. The person contravening any of the above eight clauses will be liable to pay DAMAGES by way
of compensation NOT EXCEEDING RUPEES ONE CRORE to the person so affected.
What are Offences?
The following are the offences under the IT Act,2000.
(i) Source code attacks:- knowingly concealing, destroying or altering any computer source code use for a
Computer/network and where computer code is required to be kept by law for the time being in force.
Computer Source code means listing of programmes, computer commands, design and layout and programme
Analysis of computer resource in any form.
(ii) Hacking with Computer system:- Destroying, deleting or altering any information residing in a Computer
resource(Computer resource means Computer, computer system, computer network, data, computer data
base or software) or diminishing its value with intent to cause WRONGFUL LOSS OR DAMAGE to the public
or any person.
(iii) PUBLISHING any material which is lustful or obscene in electronic form
(iv) Securing access to computer/network designated by Government as a “Protected Systems”.( like BARC,
DRDO etc)
(v) Offences relating to Digital signatures like making available DSCs for fraudulent purposes etc.
(vi) Penalty for misrepresentation:- It means misrepresentation to or suppression of any material fact
from the Controller or Certifying Authority for obtaining licence or Digital Signature Certificate
(vii) Non Compliance of the order of the Controller by the Certifying Authority or an employee of the
Certifying Authority.
(ix) Non Compliance of the order of the Controller to a Subscriber(of DSC) to extend facilities to
decrypt certain information in the interest of the sovereignty or integrity of India or the security
of the State.
When an offence is committed, there is punishment and NOT compensation as in the case of Contravention.
The punishment is varying punishment of imprisonment or fine or both according the severity of the offence.
S.75 of the IT Act, 2000 states that the IT Act,2000 applies even for an Offence or Contravention committed
Outside India by ANY PERSON irrespective of his NATIONALITY if the act or conduct constituting the
Offence or contravention INVOLVES a COMPUTER OR COMPUTER SYSTEM OR COMPUTER NETWORK
LOCATED IN INDIA.
S.76 of the IT Act deals with CONFISCATION. It states that any Computer, Computer system, floppies,
compact disks etc., in respect of which any provision of the IT Act, 2000, rules, orders or regulations
are contravened, SHALL BE LIABLE TO CONFISCATION.
@@@@@0@@@@@
It act,2000 note

More Related Content

What's hot

Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000Leo Lukose
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
The information technology act
The information technology actThe information technology act
The information technology actDhii Raymond
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

What's hot (20)

Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Class it act
Class it actClass it act
Class it act
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
The information technology act
The information technology actThe information technology act
The information technology act
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Similar to It act,2000 note

Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 

Similar to It act,2000 note (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
It act
It actIt act
It act
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 

More from videoaakash15

Articlesof association
Articlesof associationArticlesof association
Articlesof associationvideoaakash15
 
Allotment of shares vamsi
Allotment of shares vamsiAllotment of shares vamsi
Allotment of shares vamsivideoaakash15
 
Allotment of shares total
Allotment of shares totalAllotment of shares total
Allotment of shares totalvideoaakash15
 
2448661 issue-of-shares
2448661 issue-of-shares2448661 issue-of-shares
2448661 issue-of-sharesvideoaakash15
 
87099 19849-book bulding process
87099 19849-book bulding process87099 19849-book bulding process
87099 19849-book bulding processvideoaakash15
 
Ultravires. cons.notice & indoor
Ultravires. cons.notice & indoorUltravires. cons.notice & indoor
Ultravires. cons.notice & indoorvideoaakash15
 
Procedure for incorporating a public limited company
Procedure for incorporating a public limited companyProcedure for incorporating a public limited company
Procedure for incorporating a public limited companyvideoaakash15
 
Minor as a member of a limited company
Minor as a member of a limited companyMinor as a member of a limited company
Minor as a member of a limited companyvideoaakash15
 
Mergers and amalgamations
Mergers and amalgamationsMergers and amalgamations
Mergers and amalgamationsvideoaakash15
 
Legal environment of business
Legal environment of businessLegal environment of business
Legal environment of businessvideoaakash15
 
Law of special contracts
Law of special contractsLaw of special contracts
Law of special contractsvideoaakash15
 
Introduction to legal frame work
Introduction to legal frame workIntroduction to legal frame work
Introduction to legal frame workvideoaakash15
 
Exhaus comp old form
Exhaus comp old formExhaus comp old form
Exhaus comp old formvideoaakash15
 

More from videoaakash15 (20)

Articlesof association
Articlesof associationArticlesof association
Articlesof association
 
Allotment shares
Allotment sharesAllotment shares
Allotment shares
 
Ca
CaCa
Ca
 
Allotment of shares vamsi
Allotment of shares vamsiAllotment of shares vamsi
Allotment of shares vamsi
 
Allotment of shares total
Allotment of shares totalAllotment of shares total
Allotment of shares total
 
2448661 issue-of-shares
2448661 issue-of-shares2448661 issue-of-shares
2448661 issue-of-shares
 
87099 19849-book bulding process
87099 19849-book bulding process87099 19849-book bulding process
87099 19849-book bulding process
 
Ultravires. cons.notice & indoor
Ultravires. cons.notice & indoorUltravires. cons.notice & indoor
Ultravires. cons.notice & indoor
 
The contract act
The contract actThe contract act
The contract act
 
Procedure for incorporating a public limited company
Procedure for incorporating a public limited companyProcedure for incorporating a public limited company
Procedure for incorporating a public limited company
 
Notes on wto etc
Notes on wto etcNotes on wto etc
Notes on wto etc
 
Mms la12corsout
Mms la12corsoutMms la12corsout
Mms la12corsout
 
Minor as a member of a limited company
Minor as a member of a limited companyMinor as a member of a limited company
Minor as a member of a limited company
 
Mergers and amalgamations
Mergers and amalgamationsMergers and amalgamations
Mergers and amalgamations
 
Legal environment of business
Legal environment of businessLegal environment of business
Legal environment of business
 
Law of special contracts
Law of special contractsLaw of special contracts
Law of special contracts
 
Ipr notes
Ipr notesIpr notes
Ipr notes
 
Introduction to legal frame work
Introduction to legal frame workIntroduction to legal frame work
Introduction to legal frame work
 
Exhaus comp old form
Exhaus comp old formExhaus comp old form
Exhaus comp old form
 
D mat
D matD mat
D mat
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

It act,2000 note

  • 1. A NOTE ON INFORMATION TECHNOLOGY ACT,2000(IT Act,2000) (This is in addition to the Xerox notes handed out) Objective:- (please read from the Xerox notes) IT Act, 2000 was enacted to implement the Model Law on Electronic commerce adopted by the “United Nations Commission on International Trade Law” also known as “UNCITRAL”, in 1996. IT Act, 2000 extends to whole of India. IT Act, 2000 is NOT Applicable to the following Instruments or documents, namely:1) a Negotiable Instrument(ie a Bill of Exchange, Promissory Note and Cheque) other than a CHEQUE. 2) a Power of Attorney 3) a Trust 4) a Will 5) a Contract for the sale or conveyance of immovable property or any interest in such property. 6) any class of documents or transactions as may be notified by the Central Government in the Official Gazette. The Two principal hurdles which stand in the way of facilitating electronic commerce and electronic governance are the 1) requirement as to writing and 2) signature for legal recognition Technical Points:- (certain important definitions found in the Zerox notes) 1) Access S.2(1)(a) 2) Affixing digital signature S.2(1)(d) 3)Certifying Authority. S.2(1) (g):- means a person who has been authorized to issue a Digital Signature Certificate (DSC) under S.24 of the IT Act, 2000 by the CONTROLLER. 4)Controller:- S.2(1)(m) means the Controller of Certifying Authorities appointed by Central Govt. 5) Computer:- S.2(1)(i) 6) Computer Network:- S.2(1)(j) 7) Computer System:- S.2(1)(l) 8) Computer Resource:-S.2(1)(k) Legal Recognition of Electronic Records:- S.4 Where ANY LAW provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information is— (a) rendered or made available in an electronic form and (b) accessible so as to be usable for a subsequent reference Legal Recognition of Digital Signatures:- S.5 If any information or any other matter is required by law to be authenticated by affixing the signature, then such requirement shall be deemed to have been satisfied if such information or matter is AUTHENTICATED by means of digital signature affixed in the prescribed manner. What is authentication? According to S.3 of the IT Act, 2000, any SUBSCRIBER(ie a person in whose name the DSC is issued) may AUTHENTICATE an electronic record by AFFIXING his Digital Signature. What is meant by “Affixing the Digital signature”? It means the adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of a Digital signature. How an authentication of the electronic record done? It shall be done by the use of “asymmetric crypto system” and “hash function”, which ENVELOP AND TRANSFORM the initial electronic record into another electronic record.(explanation to S.3, describes “Hash function)
  • 2. S.2(1) defines “asymmetric crypto system” as a system of a secure KEY PAIR consisting of a Private key for creating a Digital signature and a Public key to verify the Digital signature/record. Key pair in an asymmetric crypto system means a Private Key and its MATHEMATICALLY RELATED Public Key which are SO RELATED that the Public Key can verify a digital signature created by the Private Key. As stated above, the Public Key encryption uses a system of two keys, namely, a) a Private Key which only the user knows and Protects with a “Pass word” and b) a Public Key which the other people use which is generally stored on “Public Key server”. The “ Controller ” appointed by the Central Government under the IT Act, 2000 is the repository(the person with whom things are kept) of the Public key server. A document which is ENCRYPTED with one of the keys can be DECRYPTED only with the other key in the Key pair. Digital Signature Certificate is the ELECTRONIC equivalent of a physical signature that uses Cryptographic Technologies to (1)establish the identity and authenticity of the person signing and (2) ensures that the digitally signed data remains secure. Digital Signature Certificates are ENDORSED (signed) by a trusted Authority(the Certifying Authority), which is empowered under the IT Act,2000 to issue them. The Certifying Authority signs the DSCs with his Private Key to ensure its authenticity. What is a CYBER CRIME? It Connotes(means)more of crimes using computers as a tool for perpetration (to commit) or those having as their end result, the “unauthorized access, manipulation etc., of intangible data stored on a computers drives or other digital storage media. Classification of Cyber Crime:It is of two broad types, namely:a)The use of computers and the internet as tools/media to perpetrate(commit)a traditional offence like online fraud, criminal copyright infringement, defamation etc. Further, the new technologies make these crimes easier to commit and more difficult to identify and prevent. b) A computer or computer network is the target or subject of the attack. Some examples where computer is the target are as follows:(i) Unauthorised access to computer files and programmes. This could occur as a result of password theft or through the use of trapdoors that make it possible to enter a site bypassing or avoiding security protocols. Trapdoors are built in for code writers to make quick entry and change and update code when there are Bugs. Often trapdoors are left open and this can result in someone taking it over and changing code. (ii) Unauthorized disruption of computer system, network. Here, an entity without the permission, interferes with the FUNCTIONALITY of computer software or hardware. Viruses,worms, logic bombs, salami attacks, Trojan horses, denial of service attacks are some of the examples. Virus is a programme that modifies other programmes and the modified programme replicates. Trojan horse is a computer programme that performs some apparently useful function but also contains some malicious hidden code, which may introduce a virus or other bug or may permit unauthorized access to an outsider. (iii) Identity theft. This may be simple such as “password sniffing “ or complex, such as “cross-site scripting” where code put into a website that forces it to send out information against the will of its owners. What is the effect of not COMPLYING with the Information Technology Act, 2000? Non Compliance with the IT Act, 2000 results in either CONTRAVENTION OR AN OFFENCE. What is a Contravention? Generally contravention means not following the stipulations of an Act. However, S.43 of the IT Act, 2000 stipulates the following as Contraventions, namely:The following Acts IF DONE WITHOUT THE PERMISSION OF THE OWNER OR ANY OTHER PERSON WHO IS INCHARGE OF A COMPUTER/NETWORK, are Contraventions:a) accessing or securing access to the computer/network
  • 3. b) down loading any data or information from the computer/network c) Introducing or causing to be introduced any computer contaminant or computer virus into the computer/network d) damaging or causing to be damaged the computer/network, data, computer data base or any other programmes residing in it e) disrupting or causing disruption of the computer/network f) denying or causing the denial of access to any person authorized to access the computer/network by any means g) Providing assistance to any person to facilitate access to the computer/network in contravention of provisions of the Act, rules or regulations made thereunder h) CHARGING the services availed of by a person to the account of another person by tampering with or manipulating any computer network. As regards the consequence of contravention, the philosophy of dispute settlement under the IT Act,2000 is through Compensation for damages. Thus, strictly no punishment/penalty can be imposed under S.43 of the IT Act,2000. The person contravening any of the above eight clauses will be liable to pay DAMAGES by way of compensation NOT EXCEEDING RUPEES ONE CRORE to the person so affected. What are Offences? The following are the offences under the IT Act,2000. (i) Source code attacks:- knowingly concealing, destroying or altering any computer source code use for a Computer/network and where computer code is required to be kept by law for the time being in force. Computer Source code means listing of programmes, computer commands, design and layout and programme Analysis of computer resource in any form. (ii) Hacking with Computer system:- Destroying, deleting or altering any information residing in a Computer resource(Computer resource means Computer, computer system, computer network, data, computer data base or software) or diminishing its value with intent to cause WRONGFUL LOSS OR DAMAGE to the public or any person. (iii) PUBLISHING any material which is lustful or obscene in electronic form (iv) Securing access to computer/network designated by Government as a “Protected Systems”.( like BARC, DRDO etc) (v) Offences relating to Digital signatures like making available DSCs for fraudulent purposes etc. (vi) Penalty for misrepresentation:- It means misrepresentation to or suppression of any material fact from the Controller or Certifying Authority for obtaining licence or Digital Signature Certificate (vii) Non Compliance of the order of the Controller by the Certifying Authority or an employee of the Certifying Authority. (ix) Non Compliance of the order of the Controller to a Subscriber(of DSC) to extend facilities to decrypt certain information in the interest of the sovereignty or integrity of India or the security of the State. When an offence is committed, there is punishment and NOT compensation as in the case of Contravention. The punishment is varying punishment of imprisonment or fine or both according the severity of the offence. S.75 of the IT Act, 2000 states that the IT Act,2000 applies even for an Offence or Contravention committed Outside India by ANY PERSON irrespective of his NATIONALITY if the act or conduct constituting the Offence or contravention INVOLVES a COMPUTER OR COMPUTER SYSTEM OR COMPUTER NETWORK LOCATED IN INDIA. S.76 of the IT Act deals with CONFISCATION. It states that any Computer, Computer system, floppies, compact disks etc., in respect of which any provision of the IT Act, 2000, rules, orders or regulations are contravened, SHALL BE LIABLE TO CONFISCATION. @@@@@0@@@@@