SlideShare a Scribd company logo
1 of 14
Chartered Institute of Technology
Abu Road
Provision of Amended IT Act.
(section 66)
Presented by:
Akash
Maheshwari
Aim :
Facilitating the use of electronics commerce.
For promoting efficient delivery of government
services by means of reliable electronics records.
What is Cyber Crime ?
Cyber crime refer to any crime that involves a
computer/mobile and a network. The computer may
have been used in the crime, or it may be the target.
Communication by way of electronics
message:
The act identify three parties to the electronics
transmission process:
i) originator(is a sender, the generator of electronics
message).
ii) intermediary(store and transmit or provide any
service with respect to the message.
iii)addressee(is the recipient of the message).
Computer related offence under 66:
dishonestly or fraudulently committing
contraventions under section 43 of the act if by any
person.
punishable with imprisonment for a term which may
extend to three years or with fine which may extend
to five lakh rupees or with both.
Sending offensive message through
communication service, under sec. 66A:
 sending information that is extremely offensive or
has menacing character;
 mailing false information to cause annoyance,
inconvenience, danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred, or ill will
 Sending mail for the purpose of causing annoyance
or inconvenience or to deceive or to mislead the
addressee or recipient about the origin of such
messages
 punishable with imprisonment for a term which may
extend to three years and with fine.
Receiving stolen computer resource or
comm. Device, under sec. 66B :
under section 66B, whoever dishonestly received or
retains any stolen computer resource or
communication device knowing or having reason to
believe the same to be stolen computer resource or
communication device
punished with imprisonment of either description for
a term which may extend to three years or with fine
which may extend to rupees one lakh or with both.
Identity theft, under sec. 66C:
 fraudulently or dishonestly make use of the electronic 
signature, password or any other unique identification 
feature of any other person.
 punished with imprisonment for a term which may 
extend to three years and with fine which may extend 
to rupees one lakh.
Cheating by personation by using
computer resource, under sec. 66D :
communication device or computer resource cheats by 
personation.
for a term which may extend to three years and shall 
also be liable to fine which may extend to one lakh
rupees.
Violation of privacy , under
sec.66E :
intentionally or knowingly captures, publishes or 
transmits the image of a private area of any person 
without his or her consent, under circumstances violating 
the privacy of that person.
punished with imprisonment which may extend to three
years or with fine not exceeding two lakh rupees, or 
with both
Cyber terrorism, under sec. 66F :
 attempting to penetrate or access a computer 
resource without authorization or exceeding 
authorized access,
penetrates or accesses a computer resource 
without authorization or exceeding authorized 
access, and by means of such conduct obtains 
access to information, data or computer database
punishable with imprisonment which may extend to
imprisonment for life.
Thank You

More Related Content

What's hot (8)

Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Shreya Singhal vs Union Of India (Case Study)
Shreya Singhal vs Union Of India (Case Study)Shreya Singhal vs Union Of India (Case Study)
Shreya Singhal vs Union Of India (Case Study)
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhi
 
19 21
19 2119 21
19 21
 
Cyber law ipc
Cyber law ipcCyber law ipc
Cyber law ipc
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber defamation and cyber smearing
Cyber defamation and cyber smearingCyber defamation and cyber smearing
Cyber defamation and cyber smearing
 

Similar to It act

Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignmentRubina Shaikh
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 

Similar to It act (20)

Indian cyber law & acts
Indian cyber law & actsIndian cyber law & acts
Indian cyber law & acts
 
Indian cyber law
Indian cyber lawIndian cyber law
Indian cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignment
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Shilpa
ShilpaShilpa
Shilpa
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

It act

  • 1. Chartered Institute of Technology Abu Road Provision of Amended IT Act. (section 66) Presented by: Akash Maheshwari
  • 2. Aim : Facilitating the use of electronics commerce. For promoting efficient delivery of government services by means of reliable electronics records.
  • 3. What is Cyber Crime ? Cyber crime refer to any crime that involves a computer/mobile and a network. The computer may have been used in the crime, or it may be the target.
  • 4.
  • 5. Communication by way of electronics message: The act identify three parties to the electronics transmission process: i) originator(is a sender, the generator of electronics message). ii) intermediary(store and transmit or provide any service with respect to the message. iii)addressee(is the recipient of the message).
  • 6. Computer related offence under 66: dishonestly or fraudulently committing contraventions under section 43 of the act if by any person. punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
  • 7. Sending offensive message through communication service, under sec. 66A:  sending information that is extremely offensive or has menacing character;  mailing false information to cause annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will  Sending mail for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages  punishable with imprisonment for a term which may extend to three years and with fine.
  • 8. Receiving stolen computer resource or comm. Device, under sec. 66B : under section 66B, whoever dishonestly received or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.
  • 9. Identity theft, under sec. 66C:  fraudulently or dishonestly make use of the electronic  signature, password or any other unique identification  feature of any other person.  punished with imprisonment for a term which may  extend to three years and with fine which may extend  to rupees one lakh.
  • 10. Cheating by personation by using computer resource, under sec. 66D : communication device or computer resource cheats by  personation. for a term which may extend to three years and shall  also be liable to fine which may extend to one lakh rupees.
  • 11. Violation of privacy , under sec.66E : intentionally or knowingly captures, publishes or  transmits the image of a private area of any person  without his or her consent, under circumstances violating  the privacy of that person. punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or  with both
  • 12. Cyber terrorism, under sec. 66F :  attempting to penetrate or access a computer  resource without authorization or exceeding  authorized access, penetrates or accesses a computer resource  without authorization or exceeding authorized  access, and by means of such conduct obtains  access to information, data or computer database
  • 13. punishable with imprisonment which may extend to imprisonment for life.