SlideShare a Scribd company logo
1 of 34
INFORMATION TECHNOLOGY
ACT, RATHER THAN GIVING
INFORMATION AND
TECHNOLOGY GIVE RISE TO
MORE CYBER CRIMES
Introduction
 Information Technology.
 Application in IT.
 E-commerce.
IT in Banking Sector
 Many facilities provided.
 Conversion of currencies to ‘Plastic Money’.
 IT is increasingly moving from a back office function to a
prime assistant.
 Traditional banking loosing its existence.
 E-banking and its benefits.
Information Technology Act,
2000
The Information Technology Act 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament (No
21 of 2000) notified on October 17, 2000.
 Essence of the ACT
 Purpose
 Objective
 Advantages
 Shortcomings
Key Terms
 Digital Signature
 E Governance
 Encryption
 Decryption
 Computer Source Code
 Cyber Terrorism
 Electronic Documents
Important Sections of IT
Act,2000
1) Section 65-
 Tampering with any computer source code used for a
computer, computer programme, computer system or
computer network.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to two lakh rupees.
2) Section 66-
 Hacking with computer system.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to five lakh rupees, or with both.
3) Section 67-
 Publishing transmitting information which is obscene in
electronic form shall be punished.
 Punishment-
o Imprisonment of either three years and with fine which may
extend to five lakh rupees.
o Imprisonment of either five years and also with fine which
may extend to ten lakh rupees.
4) Penalty for Breach of Confidentiality and Privacy
(Section 72)-
 Any person who has secured access to any electronic
record, book, register, correspondence, information,
document or other material without the consent of the
person concerned.
 Punishment-Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
5) Punishment for publishing Digital Signature Certificate
false in certain particulars (Section 73)-
 Punishment- Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
Amendments in Information
Technology Act, 2008
The IT Amendment Bill 2008 has been passed by the Lok
Sabha and the Rajya Sabha in the last week of December,
2008.
 Different Sections-
 Section 66B
 Section 66C
 Section 66E
 Section 67A
 Section 67B
 Section 72A
Case Study
• The Hyderabad case study.
• Section 66D- Punishments for cheating by personation by
using computer resource (Inserted Vide ITA 2008).
• Punishment-Imprisonment of three years and shall also be
liable to fine which may extend to one lakh rupees.
Cyber Crime
Unlawful acts wherein the computer is either a tool or a target or both
What is Cyber Crime ??
 Criminals can operate anonymously over the
computer networks.
 Hackers invade privacy.
 Hackers destroy “property” in the form of
computer files or records.
 Hackers injure other computer users by
destroying information systems.
 Computer pirates steal intellectual property.
Financial Crimes
 It includes cheating, credit card frauds, money laundering.
Cyber Pornography
 It includes pornographic websites; pornographic magazines
produced using computers (to publish and print the
material) and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
Web Jacking
 This occurs when someone forcefully takes control of a
website (by cracking the password and later changing it).
 Sale of illegal articles
 Phishing
 Online gambling
 Email spoofing
Intellectual Property
crimes-
These include software piracy, copyright infringement,
trademarks violations, theft of computer source code etc.
Cyber Criminals
 Kids (age group (9-16 years)
 Organized hacktivitsts
 Disgruntled employees
 Professional hackers
Case Study
 Case study related to bank.
 Case study related to cyber crime.
Cyber Crime in India
4639
1.4
3
India
online fraud
intrusion or hacking
malicious code
harrassment
Reports registered by RBI for
cyber fraud and the amount spent
for the same
Distribution of targets
Global Cyber Crime
NASSCOM INITIATIVES
 Global Trade Development
 National Skills Registry for IT/ITES Professional (NSR-
ITP)
 Sector Skills Councils
NASSCOM FORUMS
 Gaming Forum
 BPO
 Engineering Services
 Remote Infrastructure Management
Conclusion
 The fundamental approach of the Act is towards validating and
legalising electronic and on-line transactions.
 Awareness must be created.
 It leaves various issues untouched
 The Parliament must ensure that it keeps amending the law and
enacting new laws
 That there are no reliable statistics on the problem
 India is amongst few of the countries in the world which have
any legal framework for e-commerce and e-governance
Suggestions
1) Recruitment
2) Red Coding System
3) Training and Development
4) Domain
5) Vague Definations
Bibliography
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
Thank You!!

More Related Content

What's hot

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

What's hot (20)

Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 

Similar to IT Act,2000 - Law

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
Hemant
 

Similar to IT Act,2000 - Law (20)

Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
It act 2000
It act 2000It act 2000
It act 2000
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

IT Act,2000 - Law

  • 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION AND TECHNOLOGY GIVE RISE TO MORE CYBER CRIMES
  • 2. Introduction  Information Technology.  Application in IT.  E-commerce.
  • 3. IT in Banking Sector  Many facilities provided.  Conversion of currencies to ‘Plastic Money’.  IT is increasingly moving from a back office function to a prime assistant.  Traditional banking loosing its existence.  E-banking and its benefits.
  • 4. Information Technology Act, 2000 The Information Technology Act 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000.  Essence of the ACT  Purpose  Objective  Advantages  Shortcomings
  • 5. Key Terms  Digital Signature  E Governance  Encryption  Decryption  Computer Source Code  Cyber Terrorism  Electronic Documents
  • 6. Important Sections of IT Act,2000 1) Section 65-  Tampering with any computer source code used for a computer, computer programme, computer system or computer network.  Punishment- Imprisonment up to three years, or with fine which may extend up to two lakh rupees.
  • 7. 2) Section 66-  Hacking with computer system.  Punishment- Imprisonment up to three years, or with fine which may extend up to five lakh rupees, or with both.
  • 8. 3) Section 67-  Publishing transmitting information which is obscene in electronic form shall be punished.  Punishment- o Imprisonment of either three years and with fine which may extend to five lakh rupees. o Imprisonment of either five years and also with fine which may extend to ten lakh rupees.
  • 9. 4) Penalty for Breach of Confidentiality and Privacy (Section 72)-  Any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned.  Punishment-Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 10. 5) Punishment for publishing Digital Signature Certificate false in certain particulars (Section 73)-  Punishment- Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 11. Amendments in Information Technology Act, 2008 The IT Amendment Bill 2008 has been passed by the Lok Sabha and the Rajya Sabha in the last week of December, 2008.  Different Sections-  Section 66B  Section 66C  Section 66E  Section 67A  Section 67B  Section 72A
  • 12. Case Study • The Hyderabad case study. • Section 66D- Punishments for cheating by personation by using computer resource (Inserted Vide ITA 2008). • Punishment-Imprisonment of three years and shall also be liable to fine which may extend to one lakh rupees.
  • 13. Cyber Crime Unlawful acts wherein the computer is either a tool or a target or both
  • 14. What is Cyber Crime ??  Criminals can operate anonymously over the computer networks.  Hackers invade privacy.  Hackers destroy “property” in the form of computer files or records.  Hackers injure other computer users by destroying information systems.  Computer pirates steal intellectual property.
  • 15. Financial Crimes  It includes cheating, credit card frauds, money laundering.
  • 16. Cyber Pornography  It includes pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).
  • 17. Web Jacking  This occurs when someone forcefully takes control of a website (by cracking the password and later changing it).
  • 18.  Sale of illegal articles  Phishing  Online gambling  Email spoofing
  • 19. Intellectual Property crimes- These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  • 20. Cyber Criminals  Kids (age group (9-16 years)  Organized hacktivitsts  Disgruntled employees  Professional hackers
  • 21. Case Study  Case study related to bank.  Case study related to cyber crime.
  • 22. Cyber Crime in India
  • 23. 4639 1.4 3 India online fraud intrusion or hacking malicious code harrassment
  • 24. Reports registered by RBI for cyber fraud and the amount spent for the same
  • 27.
  • 28. NASSCOM INITIATIVES  Global Trade Development  National Skills Registry for IT/ITES Professional (NSR- ITP)  Sector Skills Councils
  • 29. NASSCOM FORUMS  Gaming Forum  BPO  Engineering Services  Remote Infrastructure Management
  • 30. Conclusion  The fundamental approach of the Act is towards validating and legalising electronic and on-line transactions.  Awareness must be created.  It leaves various issues untouched  The Parliament must ensure that it keeps amending the law and enacting new laws  That there are no reliable statistics on the problem  India is amongst few of the countries in the world which have any legal framework for e-commerce and e-governance
  • 31. Suggestions 1) Recruitment 2) Red Coding System 3) Training and Development 4) Domain 5) Vague Definations
  • 32. Bibliography  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields
  • 33.  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields