SlideShare a Scribd company logo
1 of 24
INFORMATION TECHNOLOGY ACT &
    CYBER CRIME




Presented By-
Roll No 01:Yogendra Wagh    Roll No 03:Sadanand Inamdar
Roll No 05:Poonam Gawade    Roll No 07:Ravi Konda
Roll No 09:Ronald Patrick   Roll No 11:Ganesh Sathe
Roll No 13:Ritesh Singh     Roll No 15:Pravin Sawant
Birth of Cyber Laws
The United Nations General Assembly have adopted the Model Law
 on Electronic Commerce on 30th January 1997.

It is referred to as the “UNCITRAL Model Law on E-Commerce”.

Enacted on 17th May 2000- India is 12th nation in the world to adopt
 cyber laws.

India passed the Information Technology Act, 2000 on 17th
 October, 2000.

Amended on 27th October 2009.
  Amended Act is known as - The Information Technology
 (amendment) Act, 2008.
THE IT ACT, 2000 –OBJECTIVES

 To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
 Other means of electronic communication, commonly referred to as "electronic
  commerce", involving the use of alternatives to paper-based methods of
  communication and storage of information,
 To facilitate electronic filing of documents with the Government agencies
   To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's
    Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934
Act is not applicable to…
 (a) a negotiable instrument (Other than a cheque) as defined in section 13 of the
     Negotiable Instruments Act, 1881;
 (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act,
     1882;
 (c) a trust as defined in section 3 of the Indian Trusts Act, 1882;
 (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925
     including any other testamentary disposition
 (e) any contract for the sale or conveyance of immovable property or any interest in
     such property;
 (f) any such class of documents or transactions as may be notified by the Central
      Government
Terms under IT ACT 2000
•   "Adjudicating officer“
•   "Digital signature"
•   "Affixing digital signature;
•   "Appropriate Government“
•   "Certifying Authority"
•   "Cyber Appellate Tribunal"
•   "Electronic form"
•   "Secure system“
•   "Electronic Gazette"
Impact on banking Sector
 Pressure from competition and regulatory environment .


 Threat of Competition and Retaining Customer Base.


 IT used for Communication, Connectivity and Business Process Re-
  engineering.


 Improve efficiency of money, capital and foreign exchange markets.


 Lead to convergence of computer and communication technology to
  enable TBA.
Cyber Law: Indian Culture And Government’s Role
“Any criminal activity that uses a computer either as an instrumentality, target or a means
for perpetuating further crimes comes within the ambit of cyber crime”

Need of Cyber Crime Law:
•Cyber space is an intangible and provides an extreme mobility

       events taking place on the internet are not happening in the locations where participants   or servers
   are physically located, but "in cyberspace".
•Cyber space offers great economic efficiency.

        Billions of dollars worth of software can be traded over the Internet without the need for any
   government licenses, shipping and handling charges and without paying any customs duty.
•Cyber space has Complete disrespect for national boundaries.

       A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer
   millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop
   computer and a cell phone.
•Cyber space is absolutely open to participation by all.

      A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity
   between them.
TYPES OF CYBER CRIMES
•   Cyber terrorism
•   Cyber pornography
•   Defamation                                                 Crime against Government
•   Cyber stalking (section 509 IPC)
•   Sale of illegal articles-narcotics, weapons, wildlife
•   Online gambling
                                                                Crime against persons
•   Intellectual Property crimes- software piracy, copyright
    infringement, trademarks violations, theft of computer
    source code
•   Email spoofing                                              Crime against property
•   Forgery
•   Phising
•   Credit card frauds
CYBER CRIMES : CLASSIFICATION
Against Individuals: –                    Against Organization ( Government / Pvt
i. Harassment via e-mails.                Firm/ Company): -
ii. Cyber-stalking.                       i. Unauthorized control/access over computer
iii. Dissemination of obscene material.   system
iv. Defamation.                           ii. Possession of unauthorized information.
v. Unauthorized control/access over       iii. Cyber terrorism against the government
computer system.                          organization.
vi. Indecent exposure                     iv. Distribution of pirated software etc.
vii. Email spoofing 
viii. Cheating & Fraud

Against Individual Property: -            Against Society at large: -
i. Computer vandalism.                    i.     Pornography (basically child pornography).
ii. Transmitting virus.                   ii.    Polluting the youth through indecent
iii. Netrespass                           exposure.
iv. Unauthorized control/access over      iii.   Trafficking
computer system.                          iv. Financial crimes
v. Intellectual Property crimes           v. Sale of illegal articles
vi. Internet time thefts                  vi. Online gambling
                                          vii.  Forgery
CYBER CRIME CASES REGISTERED & PERSON
ARRESTED UNDER IT ACT (2006-2009)
Cybercrime provisions under IT Act,2000

Tampering with Computer source documents          Sec.65

Hacking with Computer systems, Data alteration    Sec.66

Publishing obscene information                    Sec.67

Un-authorized access to protected system          Sec.70

Breach of Confidentiality and Privacy             Sec.72

Publishing false digital signature certificates   Sec.73
Amendment of IT Act 2000

•   Criminal Provisions :             Section 66(A)
    Section 66

                                      •Sending of offensive or false
•   Provision has been                messages - new provision
    significantly changed.
•   Under IT Act, 2008 all the acts
    referred under section 43, are    •Also known as “Cyber
    also covered u/Sec. 66 if they    Stalking”
    are done “dishonestly” or
    “fraudulently”.
                                      •Covers sending of menacing,
•   Many cybercrimes on which         offensive or false messages via
    there were no express             SMS/EMAIL/MMS
    provisions made in the IT Act,
    2000 are now included in the
    IT Act, 2008.                     •Punishment – imprisonment
                                      up to 3 years and fine
Cont……..
    •   Section 66(B)
                                 •   Section 66(C)
    •   Dishonestly
        receiving stolen         •   Identity theft - new
        computer resource or         provision
        communication
        device - new
                                 • Fraudulently or dishonestly
        provision
                                   using someone else’s
                                   electronic signature,
    • Also covers use of           password or any other
      stolen Computers,            unique identification
      mobile phones, SIM           feature
      Cards, etc
                                 • Punishment - imprisonment
    • Punishment –                 upto 3 years and fine upto
      imprisonment upto 3          Rs. 1 lakh
      years or fine upto Rs. 1
      lakh or both
Cont……….
•Section 66(E)                           •Section 66(F)
•Violation of privacy - new provision    •Cyber terrorism - new provision
•Popularly known as Voyeurism            •Whoever uses cyberspace with
                                         intent to threaten the unity, integrity,
•Pune spy cam incident where a 58-
                                         security or sovereignty of India or to
year old man was arrested for            strike terror in the people
installing spy cameras in his house to
‘snoop’ on his young lady tenants        •Punishment - Imprisonment which
                                         may extent to life imprisonment
•Covers acts like hiding cameras in
changing rooms, hotel rooms, etc
•Punishment –imprisonment upto 3
years or fine upto Rs. 2 lakh or both
Cyber Pornography

        • Section 67
        • Publishing or transmitting obscene material in
          electronic form
        • Punishment –
          First instance - imprisonment up to 3 years and fine up to Rs.
          5 lakh.
          Subsequent - imprisonment up to 5 years and fine up to Rs.
          10 lakh.
        • Section 67(A) – new provision
        • Publishing or transmitting sexually explicit acts in the
          electronic form
        • Similarity with Sec. 292 IPC
        • Punishment –
         First instance - imprisonment upto 5 years Subsequent -
         imprisonment up to 7 years Fine up to Rs. 10 lakh.
Cont…….
          • Section 67(B) – new provision
          • Creating, collecting, browsing, downloading, etc of Child
            Pornography
          • Punishment –
            First instance - imprisonment up to 5 years.
            Subsequent – imprisonment up to 7 years
             Fine up to Rs. 10 lakh.


          • Preservation of information by intermediaries
            Section 67(C) – new provision
          • Intermediary shall preserve and retain such
            information as may be specified for such duration and
            in such manner and format as the Central
            Government may prescribe.
Famous BPO Cyber Crime Cases
•   The recently reported case of a Bank
    Fraud in Pune in which some ex
    employees of BPO arm of MPhasis
    Ltd     MsourcE,     defrauded     US
    Customers of Citi Bank to the tune of
    RS 1.5 crores has raised concerns of
    many kinds including the role of "Data
    Protection".


•   The crime was obviously committed
    using "Unauthorized Access" to the
    "Electronic Account Space" of the
    customers. It is therefore firmly within
    the domain of "Cyber Crimes".
Ahmadabad Blast : Haywood
 Five minutes before the blast, an e-mails sent to national TV
  channels warning about blasts in Ahmedabad. The e-mail is traced
  to Kenneth Haywood’s computer, who stayed at Gunina apartment
  in Navi Mumbai. Haywood claimed that his computer was hacked.
  A technician associated with VSNL had asked him not to change
  the password of his wireless Internet network. Haywood’s laptop
  and computer was then sent to the forensic science laboratory at
  Kalina.
 Wi-Fi system used to hack Haywood's account to send the mail.
Parliament Attack Case

The Laptop seized from the gunned down terrorist contained
several evidences of terrorist’s motives. The sticker of the
Ministry of home that they had made on the laptop and pasted
on their ambassador car to gain entry into the parliament house
and the fake ID card that one of the two terrorists was carrying
with the Government of India emblem and seal.
National Association of Software and Services
Companies (NASSCOM):
 •   Premier trade body and the chamber of commerce of the IT-BPO industries in India
 •   Not-for-profit organization, registered under the Indian Societies Act, 1860
 •   NASSCOM is the global trade body with over 1200 members, of which over 250 are
     global companies from the US, UK, EU, Japan and China
 •   NASSCOM's Vision is to maintain India leadership position in the global offshore
     IT-BPO industry, to grow the market by enabling industry to tap into emerging
     opportunity areas and to strengthen the domestic market in India
 •   NASSCOM's Aim to drive the overall growth of the technology and services market
     and maintain India's leadership position, by taking up the role of a strategic advisor
     to the industry.
 •   NASSCOM’S Objective include accelerating trade development efforts, improving
     talent supply, strengthening local infrastructure, building partnerships and driving
     operational excellence. NASSCOM is also helping catalyse the process of
     innovation, IT workforce development and enhancing data security.
NASSCOM Initiative
•   Diversity and Inclusivity Initiative: The initiative focuses on mentoring and
    empowering diversity within the workplace with respect to gender, ifferently-abledand
    multi-cultural workforce.
•   Domestic IT Market Initiative: The focus is to promote and grow the domestic IT
    market by driving IT adoption in newer industry verticals and small and medium
    businesses.
•   eGovernance Initiative: This initiative aims to be catalyst in eGovernance initiatives
    and harness ICT for inclusive growth by facilitating collaboration between the industry
    and government.
•   Education Initiative: The initiative aims to improve the interface between the IT-BPO
    industry and academia to ensure availability of globally employable IT-BPO
    professionals. Specific programmes on enhancing capacity and employment of the
    workforce are being undertaken.
•   Green IT Initiative: This initiative is focused on enabling the IT-BPO industry in
    India to contribute to the environment through technology and adoption of
    environmentally-friendly infrastructure.
Future course of action:
•   A broad & inclusive focus is necessary to protect the IT services,
•   Strategies and Alert mechanism Against cyber attacks,
•    Creating a global culture of cyber security,
•   International cooperation at all levels should be developed further,
•   Establish funding mechanisms to facilitate practical research,
•   Encouraging states to upgrade, update, notify and educate about cyber laws & cyber attacks,
•   Participatory approach involving Governments, the private sector and non-governmental
    organizations,
•   Include comprehensive curricular on computer related in Academics and impress upon ethical
    behaviour of professionals,
•   New recruitment to ensure a sizeable team to combat cyber crime
•    Law enforcement officials, forensic investigators and experts need to be trained for effective
    enforcement.
•   Awareness is important and any incident should be reported at once & Users must try and
    save any electronic information trail on their computers
COCLUSION:
• Indian Laws are well drafted and are capable of handling all kinds of
  challenges as posed by cyber criminals. However, the enforcement agencies
  are required to be well versed with the changing technologies and Laws.
Thank You!

                              Disclaimer
This presentation is prepared for knowledge sharing and awareness. We
  can use the information provided here . We have tried not to hide
  original credits as far as possible, nor we are using this presentation
  for any personal financial gain. Information available in this
  presentation is not enforceable by law; however these are our view
  about the topic which we feel should be shared. Any errors, omissions,
  misstatements, and misunderstandings set forth in the presentation are
  sincerely apologized. Relying on the contents will be sole
  responsibility of the users.

More Related Content

What's hot

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
An overview on laws against spamming in India
An overview on laws against spamming in IndiaAn overview on laws against spamming in India
An overview on laws against spamming in IndiaAltacit Global
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 

What's hot (20)

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
An overview on laws against spamming in India
An overview on laws against spamming in IndiaAn overview on laws against spamming in India
An overview on laws against spamming in India
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to It act ppt ( 1111)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.pptMrVMNair
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

Similar to It act ppt ( 1111) (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
it act
it act it act
it act
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

It act ppt ( 1111)

  • 1. INFORMATION TECHNOLOGY ACT & CYBER CRIME Presented By- Roll No 01:Yogendra Wagh Roll No 03:Sadanand Inamdar Roll No 05:Poonam Gawade Roll No 07:Ravi Konda Roll No 09:Ronald Patrick Roll No 11:Ganesh Sathe Roll No 13:Ritesh Singh Roll No 15:Pravin Sawant
  • 2. Birth of Cyber Laws The United Nations General Assembly have adopted the Model Law on Electronic Commerce on 30th January 1997. It is referred to as the “UNCITRAL Model Law on E-Commerce”. Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws. India passed the Information Technology Act, 2000 on 17th October, 2000. Amended on 27th October 2009. Amended Act is known as - The Information Technology (amendment) Act, 2008.
  • 3. THE IT ACT, 2000 –OBJECTIVES  To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and  Other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information,  To facilitate electronic filing of documents with the Government agencies  To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934
  • 4. Act is not applicable to… (a) a negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881; (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882; (c) a trust as defined in section 3 of the Indian Trusts Act, 1882; (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition (e) any contract for the sale or conveyance of immovable property or any interest in such property; (f) any such class of documents or transactions as may be notified by the Central Government
  • 5. Terms under IT ACT 2000 • "Adjudicating officer“ • "Digital signature" • "Affixing digital signature; • "Appropriate Government“ • "Certifying Authority" • "Cyber Appellate Tribunal" • "Electronic form" • "Secure system“ • "Electronic Gazette"
  • 6. Impact on banking Sector  Pressure from competition and regulatory environment .  Threat of Competition and Retaining Customer Base.  IT used for Communication, Connectivity and Business Process Re- engineering.  Improve efficiency of money, capital and foreign exchange markets.  Lead to convergence of computer and communication technology to enable TBA.
  • 7. Cyber Law: Indian Culture And Government’s Role “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime” Need of Cyber Crime Law: •Cyber space is an intangible and provides an extreme mobility events taking place on the internet are not happening in the locations where participants or servers are physically located, but "in cyberspace". •Cyber space offers great economic efficiency. Billions of dollars worth of software can be traded over the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty. •Cyber space has Complete disrespect for national boundaries. A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone. •Cyber space is absolutely open to participation by all. A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  • 8. TYPES OF CYBER CRIMES • Cyber terrorism • Cyber pornography • Defamation Crime against Government • Cyber stalking (section 509 IPC) • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling Crime against persons • Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code • Email spoofing Crime against property • Forgery • Phising • Credit card frauds
  • 9. CYBER CRIMES : CLASSIFICATION Against Individuals: – Against Organization ( Government / Pvt i. Harassment via e-mails. Firm/ Company): - ii. Cyber-stalking. i. Unauthorized control/access over computer iii. Dissemination of obscene material. system iv. Defamation. ii. Possession of unauthorized information. v. Unauthorized control/access over iii. Cyber terrorism against the government computer system. organization. vi. Indecent exposure iv. Distribution of pirated software etc. vii. Email spoofing  viii. Cheating & Fraud Against Individual Property: -  Against Society at large: - i. Computer vandalism. i.     Pornography (basically child pornography). ii. Transmitting virus. ii.    Polluting the youth through indecent iii. Netrespass exposure. iv. Unauthorized control/access over iii.   Trafficking computer system. iv. Financial crimes v. Intellectual Property crimes v. Sale of illegal articles vi. Internet time thefts vi. Online gambling vii.  Forgery
  • 10. CYBER CRIME CASES REGISTERED & PERSON ARRESTED UNDER IT ACT (2006-2009)
  • 11. Cybercrime provisions under IT Act,2000 Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
  • 12. Amendment of IT Act 2000 • Criminal Provisions : Section 66(A) Section 66 •Sending of offensive or false • Provision has been messages - new provision significantly changed. • Under IT Act, 2008 all the acts referred under section 43, are •Also known as “Cyber also covered u/Sec. 66 if they Stalking” are done “dishonestly” or “fraudulently”. •Covers sending of menacing, • Many cybercrimes on which offensive or false messages via there were no express SMS/EMAIL/MMS provisions made in the IT Act, 2000 are now included in the IT Act, 2008. •Punishment – imprisonment up to 3 years and fine
  • 13. Cont…….. • Section 66(B) • Section 66(C) • Dishonestly receiving stolen • Identity theft - new computer resource or provision communication device - new • Fraudulently or dishonestly provision using someone else’s electronic signature, • Also covers use of password or any other stolen Computers, unique identification mobile phones, SIM feature Cards, etc • Punishment - imprisonment • Punishment – upto 3 years and fine upto imprisonment upto 3 Rs. 1 lakh years or fine upto Rs. 1 lakh or both
  • 14. Cont………. •Section 66(E) •Section 66(F) •Violation of privacy - new provision •Cyber terrorism - new provision •Popularly known as Voyeurism •Whoever uses cyberspace with intent to threaten the unity, integrity, •Pune spy cam incident where a 58- security or sovereignty of India or to year old man was arrested for strike terror in the people installing spy cameras in his house to ‘snoop’ on his young lady tenants •Punishment - Imprisonment which may extent to life imprisonment •Covers acts like hiding cameras in changing rooms, hotel rooms, etc •Punishment –imprisonment upto 3 years or fine upto Rs. 2 lakh or both
  • 15. Cyber Pornography • Section 67 • Publishing or transmitting obscene material in electronic form • Punishment – First instance - imprisonment up to 3 years and fine up to Rs. 5 lakh. Subsequent - imprisonment up to 5 years and fine up to Rs. 10 lakh. • Section 67(A) – new provision • Publishing or transmitting sexually explicit acts in the electronic form • Similarity with Sec. 292 IPC • Punishment – First instance - imprisonment upto 5 years Subsequent - imprisonment up to 7 years Fine up to Rs. 10 lakh.
  • 16. Cont……. • Section 67(B) – new provision • Creating, collecting, browsing, downloading, etc of Child Pornography • Punishment – First instance - imprisonment up to 5 years. Subsequent – imprisonment up to 7 years Fine up to Rs. 10 lakh. • Preservation of information by intermediaries Section 67(C) – new provision • Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.
  • 17. Famous BPO Cyber Crime Cases • The recently reported case of a Bank Fraud in Pune in which some ex employees of BPO arm of MPhasis Ltd MsourcE, defrauded US Customers of Citi Bank to the tune of RS 1.5 crores has raised concerns of many kinds including the role of "Data Protection". • The crime was obviously committed using "Unauthorized Access" to the "Electronic Account Space" of the customers. It is therefore firmly within the domain of "Cyber Crimes".
  • 18. Ahmadabad Blast : Haywood  Five minutes before the blast, an e-mails sent to national TV channels warning about blasts in Ahmedabad. The e-mail is traced to Kenneth Haywood’s computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet network. Haywood’s laptop and computer was then sent to the forensic science laboratory at Kalina.  Wi-Fi system used to hack Haywood's account to send the mail.
  • 19. Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
  • 20. National Association of Software and Services Companies (NASSCOM): • Premier trade body and the chamber of commerce of the IT-BPO industries in India • Not-for-profit organization, registered under the Indian Societies Act, 1860 • NASSCOM is the global trade body with over 1200 members, of which over 250 are global companies from the US, UK, EU, Japan and China • NASSCOM's Vision is to maintain India leadership position in the global offshore IT-BPO industry, to grow the market by enabling industry to tap into emerging opportunity areas and to strengthen the domestic market in India • NASSCOM's Aim to drive the overall growth of the technology and services market and maintain India's leadership position, by taking up the role of a strategic advisor to the industry. • NASSCOM’S Objective include accelerating trade development efforts, improving talent supply, strengthening local infrastructure, building partnerships and driving operational excellence. NASSCOM is also helping catalyse the process of innovation, IT workforce development and enhancing data security.
  • 21. NASSCOM Initiative • Diversity and Inclusivity Initiative: The initiative focuses on mentoring and empowering diversity within the workplace with respect to gender, ifferently-abledand multi-cultural workforce. • Domestic IT Market Initiative: The focus is to promote and grow the domestic IT market by driving IT adoption in newer industry verticals and small and medium businesses. • eGovernance Initiative: This initiative aims to be catalyst in eGovernance initiatives and harness ICT for inclusive growth by facilitating collaboration between the industry and government. • Education Initiative: The initiative aims to improve the interface between the IT-BPO industry and academia to ensure availability of globally employable IT-BPO professionals. Specific programmes on enhancing capacity and employment of the workforce are being undertaken. • Green IT Initiative: This initiative is focused on enabling the IT-BPO industry in India to contribute to the environment through technology and adoption of environmentally-friendly infrastructure.
  • 22. Future course of action: • A broad & inclusive focus is necessary to protect the IT services, • Strategies and Alert mechanism Against cyber attacks, • Creating a global culture of cyber security, • International cooperation at all levels should be developed further, • Establish funding mechanisms to facilitate practical research, • Encouraging states to upgrade, update, notify and educate about cyber laws & cyber attacks, • Participatory approach involving Governments, the private sector and non-governmental organizations, • Include comprehensive curricular on computer related in Academics and impress upon ethical behaviour of professionals, • New recruitment to ensure a sizeable team to combat cyber crime • Law enforcement officials, forensic investigators and experts need to be trained for effective enforcement. • Awareness is important and any incident should be reported at once & Users must try and save any electronic information trail on their computers
  • 23. COCLUSION: • Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.
  • 24. Thank You! Disclaimer This presentation is prepared for knowledge sharing and awareness. We can use the information provided here . We have tried not to hide original credits as far as possible, nor we are using this presentation for any personal financial gain. Information available in this presentation is not enforceable by law; however these are our view about the topic which we feel should be shared. Any errors, omissions, misstatements, and misunderstandings set forth in the presentation are sincerely apologized. Relying on the contents will be sole responsibility of the users.