SlideShare a Scribd company logo
1 of 85
Information Technology Act 2000- An overview Date: 27 th  November 2008 Venue: National Institute of Financial Management  Faridabad Sector-48, Pali Road   Karnika Seth Partner and Cyber Lawyer   SETH ASSOCIATES  ADVOCATES AND CONSULTANTS All rights Reserved © Seth Associates 2008
IT Act, 2000 ,[object Object],[object Object]
Objectives of the IT Act ,[object Object],[object Object],[object Object],[object Object]
Extent of application ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Role of the Government
Section 3 Defines Digital Signatures ,[object Object],[object Object],[object Object]
Secure digital signature-S.15 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Certificate based Key Management ,[object Object],[object Object],[object Object],CA User A User B CA  A  B CA  A CA  B
Essential steps of the digital signature process   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essential steps of the digital signature process ,[object Object],[object Object],[object Object],[object Object]
Section 4- Legal recognition of Electronic Records ,[object Object]
Sections 5, 6 & 7 ,[object Object],[object Object],[object Object],[object Object],[object Object]
CCA has to regulate the    functioning of CAs in the country by- ,[object Object],[object Object],[object Object],[object Object]
The licensing process ,[object Object],[object Object],[object Object]
Audit Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditors Panel  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Size mandated by the CCA ,[object Object],[object Object],[object Object],[object Object]
Licensed Certifying Authorities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
Securing communications… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 15- Secure Digital Signatures ,[object Object],[object Object],[object Object]
Regulation of Certifying Authorities [Chapter IV]  ,[object Object],[object Object]
Digital Signature Certificate [Chapter VII] ,[object Object],[object Object]
IT Act –overview of other relevant provisions ,[object Object],[object Object],[object Object],[object Object]
Section 12- Acknowledgement of Receipt ,[object Object],[object Object],[object Object]
Section 13- Dispatch of Electronic record ,[object Object],[object Object],[object Object],[object Object]
Civil Wrongs under IT Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Civil Wrongs under IT Act (Contd.) © Seth Associates, 2008 All Rights Reserved
Data diddling:   changing data prior or during input into a computer   ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 46 IT Act ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 47, IT Act ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cybercrime provisions under IT Act,2000   Offences & Relevant   Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration  Sec.66 Publishing obscene information  Sec.67 Un-authorized access to protected system  Sec.70  Breach of Confidentiality and Privacy  Sec.72 Publishing false digital signature certificates  Sec.73 © Seth Associates, 2008 All Rights Reserved
TYPES OF CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved Crime against property Crime against Government Crime against persons
TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Cyber crimes Hacking Information  Theft E-mail bombing Salami  attacks Denial of  Service  attacks Trojan  attacks Web jacking
Frequency of reporting Cybercrime in India ,[object Object],© Seth Associates, 2008 All Rights Reserved
Section 65: Source Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss  or   damage to the public or any person – Destruction, deletion, alteration, diminishing   value or utility or injuriously affecting   information residing in a computer resource • Punishment – imprisonment up to three years, and / or   – fine up to Rs. 2 lakh • Cognizable, Non Bailable,   Section 66 covers data theft aswell as data alteration © Seth Associates, 2008 All Rights Reserved
Sec. 67. Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber Pornography Cases ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
State of  Tamil Nadu Vs Suhas Katti  Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting.  The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet.  The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
The verdict extract… “  The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
Sec 69: Decryption of information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Sec 70 Protected System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Sections 71 & 72 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sections 73 & 74 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber crimes punishable under various Indian laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
Some more offences dealt with under IPC… ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],Cognizability and Bailability   ,[object Object],- Rely on Part II of Schedule I of CrPC © Seth Associates, 2008 All Rights Reserved
Power of Police to Investigate ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Power of Police to investigate (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Email spoofing:   ,[object Object],© Seth Associates, 2008 All Rights Reserved
Legal provisions to counter identity theft ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Forgery ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber stalking ,[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber defamation ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Online gambling: virtual casinos, Cases of money laundering ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case Study- BPO Data Theft ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
BPO data theft -Case Study (contd.) ,[object Object],[object Object],© Seth Associates, 2007 All Rights Reserved
BPO data theft -Case Study  (contd.) ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case Study- Case of Extortion of Money Through Internet ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case of Extortion of Money Through Internet -Case Study (contd.) ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
FIR NO 76/02 PS PARLIAMENT STREET   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Other important provisions of the  IT Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amendments- Indian Evidence Act 1872 ,[object Object]
Presumptions in law ,[object Object]
Presumptions in law ,[object Object]
Societe Des products Nestle SA case  2006 (33 ) PTC 469 &  State v Mohd Afzal, 2003 (7) AD (Delhi)1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important issues to ponder..IT Act is incomplete?? ,[object Object],[object Object],[object Object],[object Object]
Is IT Act incomplete? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Report of the Expert Committee Proposed Amendments to  Information Technology Act 2000   SUMMARY  -August  2005  ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Suggestions from Report of the Expert Committee (contd..) ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
POSITIVE INITIATIVES & RECOMMENDATIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],POSITIVE INITIATIVES & RECOMMENDATIONS (Contd.) © Seth Associates, 2008 All Rights Reserved

More Related Content

What's hot

What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]Kamal Thakur
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
5 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 18725 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 1872Jharna Jagtiani
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Legal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONSLegal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONSTejinder Bhatti
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)Dr. Sandeep Kulshrestha
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

What's hot (20)

What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
5 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 18725 Important Supreme Court Judgments on Indian Evidence Act, 1872
5 Important Supreme Court Judgments on Indian Evidence Act, 1872
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Cyber contract
Cyber contractCyber contract
Cyber contract
 
Legal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONSLegal aid & ITS STATUTORY PROVISIONS
Legal aid & ITS STATUTORY PROVISIONS
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
It act 2000
It act 2000It act 2000
It act 2000
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cr.P.C framing of Charges
Cr.P.C framing of Charges Cr.P.C framing of Charges
Cr.P.C framing of Charges
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Viewers also liked

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

Viewers also liked (20)

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
it act 2000
it act 2000it act 2000
it act 2000
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 

Similar to Information technology-act 2000

Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 

Similar to Information technology-act 2000 (20)

Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Class it act
Class it actClass it act
Class it act
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
It act
It actIt act
It act
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
It act 2000
It act 2000It act 2000
It act 2000
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Act2000n
Act2000nAct2000n
Act2000n
 

More from Onkar Sule

More from Onkar Sule (20)

Understanding e commerce
Understanding e commerceUnderstanding e commerce
Understanding e commerce
 
Tisc99keynote
Tisc99keynoteTisc99keynote
Tisc99keynote
 
Part i
Part iPart i
Part i
 
Overview
OverviewOverview
Overview
 
Nordin malaysia
Nordin malaysiaNordin malaysia
Nordin malaysia
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
I walden
I waldenI walden
I walden
 
I walden
I waldenI walden
I walden
 
Introduction to ecommerce
Introduction to ecommerceIntroduction to ecommerce
Introduction to ecommerce
 
Hengesbaugh
HengesbaughHengesbaugh
Hengesbaugh
 
E commerce052503
E commerce052503E commerce052503
E commerce052503
 
Ecommerce2
Ecommerce2Ecommerce2
Ecommerce2
 
E commerce
E commerceE commerce
E commerce
 
Ecommerce overview
Ecommerce overviewEcommerce overview
Ecommerce overview
 
Ecommerce (2)
Ecommerce (2)Ecommerce (2)
Ecommerce (2)
 
E commerce (1)
E commerce (1)E commerce (1)
E commerce (1)
 
Ecommerce (1)
Ecommerce (1)Ecommerce (1)
Ecommerce (1)
 
Ec elim purch
Ec elim purchEc elim purch
Ec elim purch
 
Conklin
ConklinConklin
Conklin
 
Conklin
ConklinConklin
Conklin
 

Recently uploaded

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 

Recently uploaded (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 

Information technology-act 2000

  • 1. Information Technology Act 2000- An overview Date: 27 th November 2008 Venue: National Institute of Financial Management Faridabad Sector-48, Pali Road Karnika Seth Partner and Cyber Lawyer SETH ASSOCIATES ADVOCATES AND CONSULTANTS All rights Reserved © Seth Associates 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Cybercrime provisions under IT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73 © Seth Associates, 2008 All Rights Reserved
  • 44.
  • 45. TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking
  • 46.
  • 47.
  • 48. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration © Seth Associates, 2008 All Rights Reserved
  • 49.
  • 50.
  • 51. State of Tamil Nadu Vs Suhas Katti Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
  • 52. The verdict extract… “ The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.