SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
LOGO




       Presentation By:
Objectives of the IT Act
To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
   other means of electronic communication, commonly
   referred to as "electronic commerce“
 To facilitate electronic filing of documents with
   Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
   Act,1872, the Banker’s Books Evidence Act 1891,Reserve
   Bank of India Act ,1934
 Aims to provide for the legal framework so that legal
   sanctity is accorded to all electronic records and other
   activities carried out by electronic means.
IT Act 2000 Objectives
 Legal Recognition for E-Commerce
      Digital Signatures and Regulatory Regime
      Electronic Documents at par with paper documents
 E-Governance
      Electronic Filing of Documents
 Amend certain Acts
 Define Civil wrongs, Offences, punishments
      Investigation, Adjudication
      Appellate Regime
Definitions
 A total of 34 definition given in bare act
 Categorized into
      Digital Infrastructure
      Authorizing agency
      Documentation
Definitions ( section 2)
 "computer" means electronic, magnetic, optical or other high-speed
  date processing device or system which performs logical, arithmetic
  and memory functions by manipulations of electronic, magnetic or
  optical impulses, and includes all
  input, output, processing, storage, computer software or
  communication facilities which are connected or relates to the
  computer in a computer system or computer network;
 "computer network" means the inter-connection of one or more
  computers through-
    (i) the use of satellite, microwave, terrestrial lime or other
     communication media; and
    (ii) terminals or a complex consisting of two or more interconnected
     computers whether or not the interconnection is continuously
     maintained;
Definitions ( section 2)
 "computer system" means a device or collection of devices, including
  input and output support devices and excluding calculators which are
  not programmable and capable being used in conjunction with
  external files which contain computer programmes, electronic
  instructions, input data and output data that performs logic,
  arithmetic, data storage and retrieval, communication control and
  other functions;
 "data" means a representation of information, knowledge, facts,
  concepts or instruction which are being prepared or have been
  prepared in a formalised manner, and is intended to be processed, is
  being processed or has been processed in a computer system or
  computer network, and may be in any form (including computer
  printouts magnetic or optical storage media, punched cards, punched
  tapes) or stored internally in the memory of the computer.
Definitions ( section 2)
 "electronic record" means date, record or date generated, image or
  sound stored, received or sent in an electronic form or micro film or
  computer generated micro fiche;
 “secure system” means computer hardware, software, and
  procedure that-
  (a) are reasonably secure from unauthorized access and misuse;
  (b) provide a reasonable level of reliability and correct operation;
  (c) are reasonably suited to performing the intended function; and
  (d) adhere to generally accepted security procedures
 “security procedure” means the security procedure prescribed by the
  Central Government under the IT Act, 2000.
 secure electronic record – where any security procedure has been
  applied to an electronic record at a specific point of time, then such
  record shall be deemed to be a secure electronic record from such
  point of time to the time of verification
Definitions ( section 2)
 "Certifying Authority" means a person who has been granted a
  licence to issue a Digital Signature Certificate
 "Controller" means the Controller of Certifying Authorities appointed
  under sub-section (l) of section 17
 "Cyber Appellate Tribunal" means the Cyber Regulations Appellate
  Tribunal established under sub-section (1) of section 48
 "Electronic Gazette" means the Official Gazette published in the
  electronic form;
 "originator" means a person who sends, generates, stores or
  transmits any electronic message or causes any electronic message
  to be sent, generated, stored or transmitted to any other person but
  does not include an intermediary;
 "subscriber" means a person in whose name the Digital Signature
  Certificate is issued;
Definitions ( section 2)
 "Act'' means the Information Technology Act, 2000; (21 of 2000);
 "Agent" means a person duly authorised by a party to present an
  application or reply on its behalf before the Tribunal;
 "Application" means an application made to the Tribunal under
  section 57;
 "Legal practitioner" shall have the same meaning as is assigned to it
  in the Advocates Act, 1961 (25 of 1971):
 "Presiding OfficerRegistrar" means the R" means the Presiding
  Officer of the Tribunal;
 “Registrar of the Tribunal” and includes any officer to whom the
  powers and functions of the Registrar may be delegated;
 "Registry" means the Registry of the Tribunal;
 "Section" means a section of the Act;
Definitions ( section 2)
 "affixing digital signature" means adoption of any methodology or
  procedure by a person for the purpose of authenticating an electronic
  record by means of digital signature;
 "digital signature" means authentication of any electronic record by a
  subscriber by means of an electronic method or procedure ;
 "Digital Signature Certificate" means a Digital Signature Certificate
  issued under subsection (4) of section 35;
 "electronic form" with reference to information means any
  information generated, sent, received or stored in
  media, magnetic, optical, computer memory, micro film, computer
  generated micro fiche or similar device;
 "key pair", in an asymmetric crypto system, means a private key and
  its mathematically related public key, which are so related that the
  public key can verify a digital signature created by the private key;
Issue addressed
 Legal Recognition of Electronic Documents
     Legal recognition of Electronic Transaction /
      Record
     Legal recognition of digital signature is at par
      with the handwritten signature
     Electronic Communication by means of reliable
      electronic record
Issue addressed
 Legal Recognition of Digital Signatures
      Acceptance of contract expressed by electronic means
       e-Commerce and Electronic Data interchange
       e-Governance
       Electronic filing of documents
       Retention of documents in electronic form
       Uniformity of rules, regulations and standards regarding
       the authentication and integrity of electronic
       records or documents
       Publication of official gazette in the electronic form
       Interception of any message transmitted in the
       electronic or encrypted form
Issue addressed
 Offenses and Contraventions
      Prevention of Computer Crime, forged electronic
      records, international alteration of electronic
      records
      fraud, forgery or falsification in e-Commerce and
      electronic transaction.
Issue addressed
 Justice Dispensation Systems for
  Cybercrimes
     Authorities
      • Controller to certify the public keys of the
      Certifying Authorities (CAs)
      • Controller to act as repository of all digital
      signature certificates
      • Certifying Authorities to get Licence from the
      Controller to issue digital signature .
REGULATION OF CERTIFYING AUTHORITIES
                                                                               J
                                                                               U
                          Govt. Of India                       Supreme Court   D
                                                                               I
                                                                               C
                                                                               I
Controller of                                                                  A
 Certifying                                                     High Court     L
 Authorities

                                                                               S
                                   Cyber Regulations                           T
         Deputy Controllers                                                    R
                                   Appellate Tribunal.
                                                                               U
                                                                               C
                                                                               T
                 Assistant                                                     U
                                                     Officer                   R
                Controllers
                                                                               E
        Regulation Structure
REGULATION OF CERTIFYING AUTHORITIES

 Appointment of Controller and other
  officers.
     The Central Government may, appoint a
      Controller of Certifying Authorities
     The Deputy Controllers and Assistant Controllers
      shall perform the functions assigned to them by
      the Controller
REGULATION OF CERTIFYING AUTHORITIES

 Functions of Controller.
     exercising supervision over the activities of the
      Certifying Authorities
     certifying public keys of the Certifying
      Authorities
     specifying the contents of written, printed or
      visual materials and advertisements that may be
      distributed or used in respect of a Digital
      Signature Certificate and the public key
     resolving any conflict of interests between the
      Certifying Authorities and the subscribers;
civil offences under the IT Act 2000
Sec     Offence                                            Punishment

43      Damage to Computer, Computer system etc.           Compensation to the tune of Rs.1 crore to the affected person.

44(a)   For failing to furnish any document, return on     Penalty not exceeding one lakh and fifty thousand rupees for
        report to the Controller or the Certifying         each such failure.
        Authority.
44(b)   For failing to file any return or furnish any      Penalty not exceeding five thousand rupees for every day
        information or other document within the           during which such failure continues.
        prescribed time.
44(c)   For not maintaining books of account or records.   Penalty not exceeding ten thousand rupees for every day
                                                           during which the failure continues.
45      Offences for which no penalty is separately        Compensation not exceeding twenty five thousand rupees to
        provided.                                          the affected person or a penalty not exceeding twenty five
                                                           thousand rupees.
65      Tampering with computer source documents.          Imprisonment upto three years, or with fine which may extend
                                                           upto two lakh rupees, or with both.
66      Hacking with computer system with the intent or    Imprisonment upto three years, or with fine which may extend
        knowledge to cause wrongful loss.                  upto two lakh rupees, or with both.
66A     For sending offensive messages through             Imprisonment for a term which may extend to three years and
        communication service etc.                         with fine.
66B     For dishonestly receiving stolen computer          Imprisonment of either description for a term which may
        resource or communication device.                  extend to three years or with fine which may extend to rupees
                                                           one lakh or with both.
Sec    Offence                                               Punishment
66D    For cheating by personation by using computer         Imprisonment of either description for a term which may
       resource.                                             extend to three years and shall also be liable to fine which may
                                                             extend to one lakh rupees.
66D    For cheating by personation by using computer         Imprisonment of either description for a term which may
       resource.                                             extend to three years and shall also be liable to fine which may
                                                             extend to one lakh rupees.
66E.   For violation of privacy                              Imprisonment which may extend to three years or with fine not
                                                             exceeding two lakh rupees, or with both.
66F    For cyber terrorism                                   Imprisonment which may extend to imprisonment for life.
67     Publication of obscene material in an electronic      Imprisonment upto 5 years and with fine which may extend to
       form.                                                 one lakh rupees on first conviction and its double punishment
                                                             for second and subsequent convictions.
67A    For publishing or transmitting of material            Imprisonment upto 5 years and with fine which may extend to
       containing sexually explicit act etc. in electronic   ten lakh rupees and in the event of second or subsequent
       form.                                                 conviction with imprisonment of either description for a term
                                                             which may extend to seven years and also with fine which may
                                                             extend to ten lakh rupees.
67B    For publishing or transmitting of material            Imprisonment upto five years and with fine which may extend
       depicting children in sexually explicit act etc. in   to ten lakh rupees and in the event of second or subsequent
       electronic form.                                      conviction with imprisonment of seven years and also with fine
                                                             which may extend to ten lakh rupees.
67C    For preserving and retention of information by        Imprisonment upto three years and also liable to fine.
       Intermediaries.
68     For failing to comply with the directions of the      Imprisonment upto 3 years and fine upto two lakhs, or both.
Sec   Offence                                        Punishment

69    For failing to extend facilities to decrypt    Imprisonment which may extend to seven years.
      information which is against the interest
      of sovereignty or integrity of India.
70    Securing or attempting to secure access        Imprisonment which may extend to 10 years and fine.
      to a protected system.
71    For misrepresentation or suppression of        Imprisonment upto 2 years, or fine upto rupees one lakh or with
      any material fact from the Controller or       both.
      the Certifying Authority.
72    For break of confidentiality and privacy       Imprisonment upto two years or fine upto rupees one lakh, or
                                                     with both.
72A   For disclosure of information in breach of     Imprisonment upto three years or with fine upto five lakh
      lawful contract.                               rupees or with both.
73    For publishing digital signature certificate   Imprisonment upto two years or with fine which may extend to
      false in certain particulars.                  one lakh rupees or with both.

74.   Publication of Digital Signature Certificate Imprisonment upto two years or fine upto rupees one lakh.
      for any fraudulent or unlawful purpose.

76    Any computer, computer system,                 Liable to confiscation.
      floppies, compact disks, tape drives or
      any other accessories related thereto
      used for contravention of this Act, rules,
      orders or regulations made thereunder.
civil offences under the IT Act 2000

• Unauthorised copying, extracting and downloading
of any data, database
• Unauthorised access to computer, computer system
or computer network
• Introduction of virus
• Damage to computer System and Computer Network
• Disruption of Computer, computer network
• Denial of access to authorised person to computer
• Providing assistance to any person to facilitate
unauthorised access to a computer
• Charging the service availed by a person to an account
of another person by tampering and manipulation of
other computer Section 44 of the IT Act provides for
penalty on failure to furnish information, return etc. to
the Controller by Certifying Authorities.
criminal offences
• Tampering with computer source documents
• Hacking with computer system
• Electronic forgery I.e. affixing of false digital
signature, making false electronic record
• Electronic forgery for the purpose of cheating
• Electronic forgery for the purpose of harming reputation
• Using a forged electronic record
• Publication of digital signature certificate for fraudulent
purpose
• Offences and contravention by companies
• Unauthorised access to protected system
• Confiscation of computer, network, etc.
• Publication of information which is obscene in electronic form
• Misrepresentation or suppressing of material facts for
obtaining Digital Signature Certificates
• Breach of confidentiality and Privacy
• Publishing false Digital Signature Certificate
Checklist Information security manager
 Establish information security forum
 Define scope of Management Information
  System
 Risk assessment
 Division of threats of Information within
  centralized and distributed systems
Checklist Information security manager
 IT security policy
       Formulate mission and goal
       Alignment to IT requirement
       Alignment to organizational policy
       Compliance with regulations and standards
 Security procedure & std of performance
       Formalize steps
       Standard operating procedure
       Define hierarchy of security and level of authority
 Practice
       Operationalize policy through execution of procedure
       Endpoint security problem
       IT security training
       Support for internal control ( behavioral, technical)
 Monitor system, enforcement of saction (rewards, penalties)
Pending Cases
 Indian Social Action ... vs The Union Of India on 16 September, 2011
        Booked under clause(r) of section 2 of the InformationTechnology Act, 2000
         (21 of 2000) for misuse of medium, dismissed without any order as to costs.
 KARNAVATI SCHOOL OF DENTISTRY versus UNION OF INDIA 30
  August, 2011
        Petitioner forwarded documents to start PG courses, ambiguous response
         from Dental Council of India, followed by rejection.
        Respondent claimed that published documents were flawed
        Court found petitioner at mistake under under the Regulations as electronic
         form as defined u/Sec.2(r), and dismissed without penalty

Pending Cases
 Case No.99/2008 under Section 66 of the IT Act also relates to purchase of
  airline tickets in four transactions of Rs.7200/- each and is still under
  investigation.
 Case No.29/2009 under Section 66(A) of the IT Act is regarding insult to the
  complainant and hurt the integrity in her individual and professional capacity
  and is still under investigation.
 Case No.Cr.No.131/10 under Section 379 IPC & 66(c), 66(d), 67(a) of the IT Act
  is a complaint of hacking, theft and cheating. In this case the accused was
  arrested on 16.4.2010 and the case is still under investigation.
 Case No.Cr.No.126/10 under Section 66(C) of the IT Act is a complaint filed
  on 6.5.2010 by Ms.Sandhya Pandurang Naik stating that some unknown
  accused person created false E-mail ID of the complainant lady as Sandhya
  Naik @Gmau.com and thereby committed theft of e-mail. The case is under
  investigation.
 Recent case of Jilted lover from Gandhidham creates fake Facebook profile,
  just got arrested.
Pending Cases
 The Complaint in Cr.No.74/2009 relates to the Section 420 IPC read with
  Section 66 of the IT Act,2000 where a false e-mail was sent directing the
  complainant to deposit an amount of Rs.1,69,420/- as he has won the COCO
  COLA contest of one lakh Pounds. On the investigation he was arrested at
  Imphal East Manipal. This case is still under investigation.
 Similar complaint under Section 420 IPC read with Section 66 of IT Act,2000
  was filed for depositing a sum of Rs.35000/- towards custom charges to Elite
  Creative with PAN No.AMGPA2286A, ICICI Bank branch New Delhi. This case
  is still under investigation.
 In the another complaint under Section 67 IT Act,2000, the complaint was
  lodged when husband has transmitted SMS having vulgar and malicious text
  on his wife’s mobile and the husband was arrested and was released on bail.
  This case is still under investigation.
 Case No.72/2009 is under Section 66 of the IT Act,2000. In this complaint the
  complainant complained that some unknown accused person gained access
  without permission to the computer system of HDFC Bank and purchased
  tickets for travel worth Rs.30,000/-. This case is still under investigation.
I.T laws in UK
 Various laws for different aspects of IT
  requirement
 Much older and mature laws compared to
  Indian
 Different laws for different region
 Scottish law has developed separately from English
  criminal law
 Freedom of Information (Scotland) Act, 2002, differs
  significantly from the UK FoI Act 2000
 Scottish, Welsh and Northern Ireland parliaments and
  assemblies have some different law making powers
I.T laws in UK
 Copyright Act 1956
 Misrepresentation Act 1967 (Hardware)
 Sale of Goods Act 1979 (Hardware)
 Supply of Goods and Services Act 1982
  (Software)
 Copyright (Computer Software)
  Amendment Act 1985
 Computer Misuse Act 1990
 Data Protection Act(s) 1984 & 1998
 The Privacy and Electronic
  Communications Regulations 2003 – EC
  Directive
I.T laws in UK
Outlawing criminal behaviour and computer misuse
     Unlawful access to data and systems
        Hacking and viruses
          Criminal Damage Act 1971 was insufficient and replaced
          Computer Misuse Act 1990 is now in reform

     Unlawful data use and data publication
        Obscenity and pornography
          Obscene Publications Act 1959
          Protection of Children Act 1978

          Criminal Justice Act 1988 e.g. Harassment

          Telecommunications Act 1984

          Protection from Harassment Act 1997




                                                          ACE2159
References
 Information Technology ACT 2000
 CYBER APPELLATE TRIBUNAL
 Ministry of Communications & Information
  Technology
 Asian School of Cyber Laws, Pune
 National Institute of Financial
  Management
 Gujarat Police
 Archives from various courts
 University of SouthHampton, UK
“Justice that love gives is a
surrender, justice that law gives is
a punishment. “
           -Mohandas Gandhi

Contenu connexe

Tendances

Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)Himanshu Goyal
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 

Tendances (20)

Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 

Similaire à it act 2000

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdfNavarajBaniya1
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 

Similaire à it act 2000 (20)

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Class it act
Class it actClass it act
Class it act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
It act 2000
It act 2000It act 2000
It act 2000
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber
CyberCyber
Cyber
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 

Dernier

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Dernier (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

it act 2000

  • 1. LOGO Presentation By:
  • 2. Objectives of the IT Act To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934  Aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.
  • 3. IT Act 2000 Objectives  Legal Recognition for E-Commerce  Digital Signatures and Regulatory Regime  Electronic Documents at par with paper documents  E-Governance  Electronic Filing of Documents  Amend certain Acts  Define Civil wrongs, Offences, punishments  Investigation, Adjudication  Appellate Regime
  • 4. Definitions  A total of 34 definition given in bare act  Categorized into  Digital Infrastructure  Authorizing agency  Documentation
  • 5. Definitions ( section 2)  "computer" means electronic, magnetic, optical or other high-speed date processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or relates to the computer in a computer system or computer network;  "computer network" means the inter-connection of one or more computers through-  (i) the use of satellite, microwave, terrestrial lime or other communication media; and  (ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained;
  • 6. Definitions ( section 2)  "computer system" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable being used in conjunction with external files which contain computer programmes, electronic instructions, input data and output data that performs logic, arithmetic, data storage and retrieval, communication control and other functions;  "data" means a representation of information, knowledge, facts, concepts or instruction which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer.
  • 7. Definitions ( section 2)  "electronic record" means date, record or date generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche;  “secure system” means computer hardware, software, and procedure that- (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended function; and (d) adhere to generally accepted security procedures  “security procedure” means the security procedure prescribed by the Central Government under the IT Act, 2000.  secure electronic record – where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification
  • 8. Definitions ( section 2)  "Certifying Authority" means a person who has been granted a licence to issue a Digital Signature Certificate  "Controller" means the Controller of Certifying Authorities appointed under sub-section (l) of section 17  "Cyber Appellate Tribunal" means the Cyber Regulations Appellate Tribunal established under sub-section (1) of section 48  "Electronic Gazette" means the Official Gazette published in the electronic form;  "originator" means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary;  "subscriber" means a person in whose name the Digital Signature Certificate is issued;
  • 9. Definitions ( section 2)  "Act'' means the Information Technology Act, 2000; (21 of 2000);  "Agent" means a person duly authorised by a party to present an application or reply on its behalf before the Tribunal;  "Application" means an application made to the Tribunal under section 57;  "Legal practitioner" shall have the same meaning as is assigned to it in the Advocates Act, 1961 (25 of 1971):  "Presiding OfficerRegistrar" means the R" means the Presiding Officer of the Tribunal;  “Registrar of the Tribunal” and includes any officer to whom the powers and functions of the Registrar may be delegated;  "Registry" means the Registry of the Tribunal;  "Section" means a section of the Act;
  • 10. Definitions ( section 2)  "affixing digital signature" means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature;  "digital signature" means authentication of any electronic record by a subscriber by means of an electronic method or procedure ;  "Digital Signature Certificate" means a Digital Signature Certificate issued under subsection (4) of section 35;  "electronic form" with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device;  "key pair", in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key;
  • 11. Issue addressed  Legal Recognition of Electronic Documents  Legal recognition of Electronic Transaction / Record  Legal recognition of digital signature is at par with the handwritten signature  Electronic Communication by means of reliable electronic record
  • 12. Issue addressed  Legal Recognition of Digital Signatures  Acceptance of contract expressed by electronic means  e-Commerce and Electronic Data interchange  e-Governance  Electronic filing of documents  Retention of documents in electronic form  Uniformity of rules, regulations and standards regarding the authentication and integrity of electronic records or documents  Publication of official gazette in the electronic form  Interception of any message transmitted in the electronic or encrypted form
  • 13. Issue addressed  Offenses and Contraventions  Prevention of Computer Crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-Commerce and electronic transaction.
  • 14. Issue addressed  Justice Dispensation Systems for Cybercrimes  Authorities • Controller to certify the public keys of the Certifying Authorities (CAs) • Controller to act as repository of all digital signature certificates • Certifying Authorities to get Licence from the Controller to issue digital signature .
  • 15. REGULATION OF CERTIFYING AUTHORITIES J U Govt. Of India Supreme Court D I C I Controller of A Certifying High Court L Authorities S Cyber Regulations T Deputy Controllers R Appellate Tribunal. U C T Assistant U Officer R Controllers E Regulation Structure
  • 16. REGULATION OF CERTIFYING AUTHORITIES  Appointment of Controller and other officers.  The Central Government may, appoint a Controller of Certifying Authorities  The Deputy Controllers and Assistant Controllers shall perform the functions assigned to them by the Controller
  • 17. REGULATION OF CERTIFYING AUTHORITIES  Functions of Controller.  exercising supervision over the activities of the Certifying Authorities  certifying public keys of the Certifying Authorities  specifying the contents of written, printed or visual materials and advertisements that may be distributed or used in respect of a Digital Signature Certificate and the public key  resolving any conflict of interests between the Certifying Authorities and the subscribers;
  • 18. civil offences under the IT Act 2000 Sec Offence Punishment 43 Damage to Computer, Computer system etc. Compensation to the tune of Rs.1 crore to the affected person. 44(a) For failing to furnish any document, return on Penalty not exceeding one lakh and fifty thousand rupees for report to the Controller or the Certifying each such failure. Authority. 44(b) For failing to file any return or furnish any Penalty not exceeding five thousand rupees for every day information or other document within the during which such failure continues. prescribed time. 44(c) For not maintaining books of account or records. Penalty not exceeding ten thousand rupees for every day during which the failure continues. 45 Offences for which no penalty is separately Compensation not exceeding twenty five thousand rupees to provided. the affected person or a penalty not exceeding twenty five thousand rupees. 65 Tampering with computer source documents. Imprisonment upto three years, or with fine which may extend upto two lakh rupees, or with both. 66 Hacking with computer system with the intent or Imprisonment upto three years, or with fine which may extend knowledge to cause wrongful loss. upto two lakh rupees, or with both. 66A For sending offensive messages through Imprisonment for a term which may extend to three years and communication service etc. with fine. 66B For dishonestly receiving stolen computer Imprisonment of either description for a term which may resource or communication device. extend to three years or with fine which may extend to rupees one lakh or with both.
  • 19. Sec Offence Punishment 66D For cheating by personation by using computer Imprisonment of either description for a term which may resource. extend to three years and shall also be liable to fine which may extend to one lakh rupees. 66D For cheating by personation by using computer Imprisonment of either description for a term which may resource. extend to three years and shall also be liable to fine which may extend to one lakh rupees. 66E. For violation of privacy Imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. 66F For cyber terrorism Imprisonment which may extend to imprisonment for life. 67 Publication of obscene material in an electronic Imprisonment upto 5 years and with fine which may extend to form. one lakh rupees on first conviction and its double punishment for second and subsequent convictions. 67A For publishing or transmitting of material Imprisonment upto 5 years and with fine which may extend to containing sexually explicit act etc. in electronic ten lakh rupees and in the event of second or subsequent form. conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees. 67B For publishing or transmitting of material Imprisonment upto five years and with fine which may extend depicting children in sexually explicit act etc. in to ten lakh rupees and in the event of second or subsequent electronic form. conviction with imprisonment of seven years and also with fine which may extend to ten lakh rupees. 67C For preserving and retention of information by Imprisonment upto three years and also liable to fine. Intermediaries. 68 For failing to comply with the directions of the Imprisonment upto 3 years and fine upto two lakhs, or both.
  • 20. Sec Offence Punishment 69 For failing to extend facilities to decrypt Imprisonment which may extend to seven years. information which is against the interest of sovereignty or integrity of India. 70 Securing or attempting to secure access Imprisonment which may extend to 10 years and fine. to a protected system. 71 For misrepresentation or suppression of Imprisonment upto 2 years, or fine upto rupees one lakh or with any material fact from the Controller or both. the Certifying Authority. 72 For break of confidentiality and privacy Imprisonment upto two years or fine upto rupees one lakh, or with both. 72A For disclosure of information in breach of Imprisonment upto three years or with fine upto five lakh lawful contract. rupees or with both. 73 For publishing digital signature certificate Imprisonment upto two years or with fine which may extend to false in certain particulars. one lakh rupees or with both. 74. Publication of Digital Signature Certificate Imprisonment upto two years or fine upto rupees one lakh. for any fraudulent or unlawful purpose. 76 Any computer, computer system, Liable to confiscation. floppies, compact disks, tape drives or any other accessories related thereto used for contravention of this Act, rules, orders or regulations made thereunder.
  • 21. civil offences under the IT Act 2000 • Unauthorised copying, extracting and downloading of any data, database • Unauthorised access to computer, computer system or computer network • Introduction of virus • Damage to computer System and Computer Network • Disruption of Computer, computer network • Denial of access to authorised person to computer • Providing assistance to any person to facilitate unauthorised access to a computer • Charging the service availed by a person to an account of another person by tampering and manipulation of other computer Section 44 of the IT Act provides for penalty on failure to furnish information, return etc. to the Controller by Certifying Authorities.
  • 22. criminal offences • Tampering with computer source documents • Hacking with computer system • Electronic forgery I.e. affixing of false digital signature, making false electronic record • Electronic forgery for the purpose of cheating • Electronic forgery for the purpose of harming reputation • Using a forged electronic record • Publication of digital signature certificate for fraudulent purpose • Offences and contravention by companies • Unauthorised access to protected system • Confiscation of computer, network, etc. • Publication of information which is obscene in electronic form • Misrepresentation or suppressing of material facts for obtaining Digital Signature Certificates • Breach of confidentiality and Privacy • Publishing false Digital Signature Certificate
  • 23. Checklist Information security manager  Establish information security forum  Define scope of Management Information System  Risk assessment  Division of threats of Information within centralized and distributed systems
  • 24. Checklist Information security manager  IT security policy  Formulate mission and goal  Alignment to IT requirement  Alignment to organizational policy  Compliance with regulations and standards  Security procedure & std of performance  Formalize steps  Standard operating procedure  Define hierarchy of security and level of authority  Practice  Operationalize policy through execution of procedure  Endpoint security problem  IT security training  Support for internal control ( behavioral, technical)  Monitor system, enforcement of saction (rewards, penalties)
  • 25. Pending Cases  Indian Social Action ... vs The Union Of India on 16 September, 2011  Booked under clause(r) of section 2 of the InformationTechnology Act, 2000 (21 of 2000) for misuse of medium, dismissed without any order as to costs.  KARNAVATI SCHOOL OF DENTISTRY versus UNION OF INDIA 30 August, 2011  Petitioner forwarded documents to start PG courses, ambiguous response from Dental Council of India, followed by rejection.  Respondent claimed that published documents were flawed  Court found petitioner at mistake under under the Regulations as electronic form as defined u/Sec.2(r), and dismissed without penalty 
  • 26. Pending Cases  Case No.99/2008 under Section 66 of the IT Act also relates to purchase of airline tickets in four transactions of Rs.7200/- each and is still under investigation.  Case No.29/2009 under Section 66(A) of the IT Act is regarding insult to the complainant and hurt the integrity in her individual and professional capacity and is still under investigation.  Case No.Cr.No.131/10 under Section 379 IPC & 66(c), 66(d), 67(a) of the IT Act is a complaint of hacking, theft and cheating. In this case the accused was arrested on 16.4.2010 and the case is still under investigation.  Case No.Cr.No.126/10 under Section 66(C) of the IT Act is a complaint filed on 6.5.2010 by Ms.Sandhya Pandurang Naik stating that some unknown accused person created false E-mail ID of the complainant lady as Sandhya Naik @Gmau.com and thereby committed theft of e-mail. The case is under investigation.  Recent case of Jilted lover from Gandhidham creates fake Facebook profile, just got arrested.
  • 27. Pending Cases  The Complaint in Cr.No.74/2009 relates to the Section 420 IPC read with Section 66 of the IT Act,2000 where a false e-mail was sent directing the complainant to deposit an amount of Rs.1,69,420/- as he has won the COCO COLA contest of one lakh Pounds. On the investigation he was arrested at Imphal East Manipal. This case is still under investigation.  Similar complaint under Section 420 IPC read with Section 66 of IT Act,2000 was filed for depositing a sum of Rs.35000/- towards custom charges to Elite Creative with PAN No.AMGPA2286A, ICICI Bank branch New Delhi. This case is still under investigation.  In the another complaint under Section 67 IT Act,2000, the complaint was lodged when husband has transmitted SMS having vulgar and malicious text on his wife’s mobile and the husband was arrested and was released on bail. This case is still under investigation.  Case No.72/2009 is under Section 66 of the IT Act,2000. In this complaint the complainant complained that some unknown accused person gained access without permission to the computer system of HDFC Bank and purchased tickets for travel worth Rs.30,000/-. This case is still under investigation.
  • 28. I.T laws in UK  Various laws for different aspects of IT requirement  Much older and mature laws compared to Indian  Different laws for different region  Scottish law has developed separately from English criminal law  Freedom of Information (Scotland) Act, 2002, differs significantly from the UK FoI Act 2000  Scottish, Welsh and Northern Ireland parliaments and assemblies have some different law making powers
  • 29. I.T laws in UK  Copyright Act 1956  Misrepresentation Act 1967 (Hardware)  Sale of Goods Act 1979 (Hardware)  Supply of Goods and Services Act 1982 (Software)  Copyright (Computer Software) Amendment Act 1985  Computer Misuse Act 1990  Data Protection Act(s) 1984 & 1998  The Privacy and Electronic Communications Regulations 2003 – EC Directive
  • 30. I.T laws in UK Outlawing criminal behaviour and computer misuse  Unlawful access to data and systems  Hacking and viruses  Criminal Damage Act 1971 was insufficient and replaced  Computer Misuse Act 1990 is now in reform  Unlawful data use and data publication  Obscenity and pornography  Obscene Publications Act 1959  Protection of Children Act 1978  Criminal Justice Act 1988 e.g. Harassment  Telecommunications Act 1984  Protection from Harassment Act 1997 ACE2159
  • 31. References  Information Technology ACT 2000  CYBER APPELLATE TRIBUNAL  Ministry of Communications & Information Technology  Asian School of Cyber Laws, Pune  National Institute of Financial Management  Gujarat Police  Archives from various courts  University of SouthHampton, UK
  • 32. “Justice that love gives is a surrender, justice that law gives is a punishment. “ -Mohandas Gandhi