SlideShare a Scribd company logo
1 of 21
Information Technology Act 2000 “  Rather than giving Information and technology Gives rise to cyber crime.”
IT Scenario  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Technology Act 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Definitions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Impact on Banking Sector ,[object Object],[object Object],[object Object],[object Object],[object Object]
Flip side  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber crime ,[object Object],[object Object],[object Object]
Classification of cyber crime  ,[object Object],[object Object]
Contd ,[object Object],[object Object],[object Object]
Famous Cyber Crime Cases in India   Three customer service agents of call centre contractor MphasiS BFL, working on the Citibank account, gained the confidence of four US customers and obtained their PIN numbers and other classified account information. They then used these to transfer money out of those customers' accounts and into the accounts of members of their gang .  An Indian court has granted bail to a schoolboy who allegedly recorded a sexual act between himself and a 16-year-old girl on his mobile phone.  The clip was later sold on video CDs via auction site Baazee.com, sparking the arrest of its manager for India.
Cyber crime Evolution
Statistics on Cybercrime...2007
NASSCOM and its Role in IT ,[object Object],[object Object],[object Object],[object Object],[object Object]
Objective of Nasscom ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NASSCOM Initiative – 4E Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amendment of IT Act 2000 Section Change 66 "Dishonesty" and "Fraudulent" intention made necessary, "Without permission of the owner of the computer" has also become a condition precedent to application of Section 66. The imprisonment term remains the same but fine has been increased. 66A Provides cover for Cyber stalking, Spam, threat mails, Phishing mails, SMS, etc.  66C Covers Identity theft which was not specifically covered earlier. Earlier such offences were to be covered under Section 66 as "Diminishing of the value of information" 66E This is a new section which covers Video Voyeurism which was not covered at all earlier.  66F  Covers "Cyber Terrorism" and makes it punishable with imprisonment upto life term. This may cover hacking, denial of access attacks, Port Scanning, spreading viruses etc. if it can be linked to the object of terrorizing people. Conspiracy is also covered under the section. The offence would not be bailable or compoundable. 67A Covers obscenity which involves "Sexually explicit content". The punishment is 5 years as in the earlier act. Fine is higher.
Ammendments Contd.. 67B This addresses child pornography and makes searching and browsing also as offences. 67C Requires specified data to be retained for specified periods by Intermediaries failure of which becomes punishable with three years imprisonment. The "Intermediaries" here would include cyber cafes, ISPs, MSPs, e-auction sites etc.  69 Powers being made available to any officer designated by either the Central or State Government to "Intercept" information whether in transit or storage.  Imprisonment for 7 years and it is non bailable and non compoundable. 69A Provides powers to a designated officer of the Central Government to "Block websites". Imprisonment for 7 years and it is non bailable and non compoundable. 69B Provides powers to a designated officer of the Central Government to "collect traffic data" from any computer resource  imprisonment for 3 years and it is  bailable and  compoundable.
Global Initiatives  Five countries from three continents banding together to fight cyber crime in a synergistic way by sharing intelligence, swapping tools and best practices, and strengthening and even synchronizing their respective laws
Our suggestions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 

What's hot (20)

The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 

Viewers also liked

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Competition act 2002
Competition act 2002 Competition act 2002
Competition act 2002 Vijay Mehta
 
Companies act, 2013
Companies act, 2013Companies act, 2013
Companies act, 2013jackysethia
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 

Viewers also liked (20)

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Competition act 2002
Competition act 2002 Competition act 2002
Competition act 2002
 
Companies act, 2013
Companies act, 2013Companies act, 2013
Companies act, 2013
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 

Similar to Information Technology Act

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 

Similar to Information Technology Act (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Information Technology Act

  • 1. Information Technology Act 2000 “ Rather than giving Information and technology Gives rise to cyber crime.”
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Famous Cyber Crime Cases in India Three customer service agents of call centre contractor MphasiS BFL, working on the Citibank account, gained the confidence of four US customers and obtained their PIN numbers and other classified account information. They then used these to transfer money out of those customers' accounts and into the accounts of members of their gang . An Indian court has granted bail to a schoolboy who allegedly recorded a sexual act between himself and a 16-year-old girl on his mobile phone. The clip was later sold on video CDs via auction site Baazee.com, sparking the arrest of its manager for India.
  • 13.
  • 14.
  • 15.
  • 16. Amendment of IT Act 2000 Section Change 66 "Dishonesty" and "Fraudulent" intention made necessary, "Without permission of the owner of the computer" has also become a condition precedent to application of Section 66. The imprisonment term remains the same but fine has been increased. 66A Provides cover for Cyber stalking, Spam, threat mails, Phishing mails, SMS, etc. 66C Covers Identity theft which was not specifically covered earlier. Earlier such offences were to be covered under Section 66 as "Diminishing of the value of information" 66E This is a new section which covers Video Voyeurism which was not covered at all earlier. 66F Covers "Cyber Terrorism" and makes it punishable with imprisonment upto life term. This may cover hacking, denial of access attacks, Port Scanning, spreading viruses etc. if it can be linked to the object of terrorizing people. Conspiracy is also covered under the section. The offence would not be bailable or compoundable. 67A Covers obscenity which involves "Sexually explicit content". The punishment is 5 years as in the earlier act. Fine is higher.
  • 17. Ammendments Contd.. 67B This addresses child pornography and makes searching and browsing also as offences. 67C Requires specified data to be retained for specified periods by Intermediaries failure of which becomes punishable with three years imprisonment. The "Intermediaries" here would include cyber cafes, ISPs, MSPs, e-auction sites etc. 69 Powers being made available to any officer designated by either the Central or State Government to "Intercept" information whether in transit or storage. Imprisonment for 7 years and it is non bailable and non compoundable. 69A Provides powers to a designated officer of the Central Government to "Block websites". Imprisonment for 7 years and it is non bailable and non compoundable. 69B Provides powers to a designated officer of the Central Government to "collect traffic data" from any computer resource imprisonment for 3 years and it is  bailable and  compoundable.
  • 18. Global Initiatives Five countries from three continents banding together to fight cyber crime in a synergistic way by sharing intelligence, swapping tools and best practices, and strengthening and even synchronizing their respective laws
  • 19.
  • 20.
  • 21.