SlideShare a Scribd company logo
1 of 34
Cyber Law
IT ACT 2000
• The Information Technology act , 2000 received the assent of
president of India on 9 June 2000 and came into force from
17 October in that same year .The act was enacted to provide
legal recognition for transaction carried out by means of
electronic data interchange and other means of electronic
communication , commonly referred to as “Electronic
Commerce” , to facilitate electronic filling of documents with
governments agencies which involve the use of alternative to
paper based method of communication and storage
information This law applies to any kind of information in the
form of data message used in the context of commercial
activities.
Objective
• to grant legal recognition for transaction carried out by
means of electronic data interchange and other means of
electronic communication;
• To give legal recognition to digital signature / electronic
signature for authentication accepting of any information or
matter which require authentication under any law;
• To facilitate electronic of documents with Government
departments;
• To facilitate electronic storage of data ;
• To facilitate and give legal sanction to electronic fund
transfer between banks and financial institution ;
• To give legal recognition for keeping books of account by
bankers in electronic form.
The Act does not apply to:
• 1.a negotiable instrument as defined in section 13 of the
Negotiable Instruments Act,1881;
• 2.a power-of-attorney as defined in section 1A of the Powers-
of-Attorney Act, 1882;
• 3.a trust as defined in section 3 of the Indian Trusts Act, 1882;
• 4.a will as defined in clause (h) of section 2 of the Indian
Succession Act, 1925 including any other testamentary
disposition by whatever name called;
• 5.any contract for the sale or conveyance of
immovable property or any interest in such property;
• 6.any such class of documents or transactions as may be
notified by the Central Government in the Official Gazette.
Amendment act 2008
• Being the first legislation in the nation on technology,
computers and ecommerce and e-communication, the Act
was the subject of extensive debates, elaborate reviews and
detailed criticisms, with one arm of the industry criticizing
some sections of the Act tobe draconian and other stating it is
too diluted and lenient. There were some conspicuous
omissions too resulting in the investigators relying more and
more on the time-tested (one and half century-old) Indian
Penal Code even in technology based cases with the I.T. Act
also being referred in the process and the reliance more on
IPC rather on the ITA. Thus the need for an amendment – a
detailed one – was felt forthe I.T. Act almost from the year
2003-04 itself. Major industry bodies were consulted and
advisory groups were formed to go into the perceived lacunae
in the I.T. Act and comparing it with similar legislations in
other nations and to suggest recommendations.
Continue……..
• Such recommendations were analyzed and subsequently taken up as a
comprehensive Amendment Act and after considerable administrative
procedures, the consolidated amendment called the Information
Technology Amendment Act 2008was placed in the Parliament and passed
without much debate, towards the end of2008 (by which time the
Mumbai terrorist attack of 26 November 2008 had taken place). This
Amendment Act got the President assent on 5 Feb 2009 and was made
effective from 27 October2009.
• Some of the notable features of the ITAA are as follows:
• Focusing on data privacy
• Focusing on Information Security
• Defining cyber café
• Making digital signature technology neutral
• Defining reasonable security practices to be followed by corporate
Continue….
• Redefining the role of intermediaries
• Recognizing the role of Indian Computer
Emergency Response Team
• Inclusion of some additional cyber crimes like
child pornography and cyber terrorism
• authorizing an Inspector to investigate cyber
offences (as against the DSP earlier)
DIGITAL SIGNATURE
A digital signature is an electronic scheme for
demonstrating the authenticity of a digital
message or document. A valid digital signature
gives recipient a reason to believe that the
message was created by a known sender and
that it was not altered in transit. Digital
signatures are commonly used for software
distribution, financial transactions, and in
other cases where it is important to detect
imitation or tampering.
Authentication of Digital Signature
• A digital signature shall –
• be created and verified by cryptography that concerns itself
with transforming electronic records.
• use “Public Key Cryptography” which employs an algorithm
using two different mathematical “keys” – one for creating a
digital signature or transforming it and another key for
verifying the signature or returning the electronic record to
original form. Hash function shall be used to create this
signature. Software utilizing such keys are termed as
“asymmetric cryptography” [Rule 3 of IT Rules, 2000].
Continued……
• Digital signatures can be used to authenticate the source of
messages. When ownership of a digital signature secret key is
bound to a specific user, a valid signature shows that the
message was sent by that user. The importance of high
confidence in sender authenticity is obvious in a financial
context.
• For example, suppose a bank's branch office sends
instructions to the central office requesting a change in the
balance of an account. If the central office is not convinced
that such a message is truly sent from an authorized source,
acting on such a request could be a grave mistake.
Verification of Digital Signature
• Verification means to determine whether –
• the initial record was affixed with the digital
signature by using the “keys” of the
subscriber.
• the original record is retained intact or has
been altered since such electronic record was
bounded with the digital signature
[Sec.2(1)(zh)].
DIGITAL SIGNATURE CERTIFICATE
• A digital signature certificate is an electronic
document which uses a digital signature to bind an
identity — information such as the name of a person
or an organization, their address, and so forth. The
certificate can be used to verify that it belongs to an
individual.
• Any person can make an application to the
Certifying Authority for the issue of this digital
certificate. The Authority charges fees (as prescribed
by the Central Government) for the issue of “digital
signature certificate”.
Generation of Digital Certificate
• The generation of digital signature certificate
shall involve –
• receipt of an approved and verified certificate
request.
• creating a new digital signature certificate.
• a distinguished name associated with the
digital certificate owner.
• a recognized and relevant policy as defined in
certification practice statement [Rule 24 of the
IT rules].
Compromise of Digital Certificate
• Digital signature certificate shall be deemed to be
compromised where the integrity of –
• the key associated with the certificate is in doubt.
• the certificate owner is in doubt, as to the
attempted use of his key pairs, or otherwise for
malicious or unlawful purposes.
• The digital certificate shall remain in the
compromise state for only such time as it takes to
arrange for revocation.
Expiry of Digital Signature
Certificate
• A digital signature certificate shall be issued
with a designated expiry date. It will expire
automatically and on expiry, it shall not be re-
used. The period for which a digital certificate
has been issued shall not be extended, but a
new digital signature certificate may be issued
after the expiry of such period [Rules 26 of IT
Act, 2000].
Cyber crime and Cyber law
• What is a cyber crime?
Cyber crime is a generic term that refers to all criminal activities done
using the medium of computers, the Internet, cyber space and the world
wide web . There isn’t really a fixed definition for cyber crime. The Indian
Law has not given any definition to the term ‘cyber crime’. In fact, the
Indian Penal Code does not use the term ‘cyber crime’ at any point even
after its amendment by the Information Technology (amendment) Act
2008, the Indian Cyber law. But “Cyber Security” is defined under Section
(2) (b) meansprotecting information, equipment, devices computer,
computer resource, communication device and informationstored therein
from unauthorized access,use, disclosure, disruption, modification or
destruction.
United Nations’ Definition of Cybercrime
• At theTenth United Nations Congress on the Prevention of
Crime and Treatment of Offenders, in a workshop devoted to the
issues of crimes related to computer networks, cyber crime was
broken into two categories and defined thus:
• a. Cybercrime in a narrow sense (computer crime):
Any illegal behavior directed by means of electronic operations
that targets the security of computer systems and the data
processed by them.
• b. Cybercrime in a broader sense (computer-related
crime): Any illegal behavior committed by means of, or in relation
to, a computer system or network, including such crimes as illegal
possession [and] offering or distributing information by means of
a computer systemor network.
• What is Cyber law…?
Cyber law is a term used to describe the legal issues related to
use of communications technology, particularly“cyberspace”,
i.e. the Internet. It is less of a distinct field of law in the way
that property or contract are, as it is an intersection of many
legal fields including intellectual property, privacy, freedom of
expression, and jurisdiction. In essence, cyber law is an
attempt to apply laws designed for the physical world, to
human activity on the Internet. In India, The IT Act, 2000 as
amended by The IT (Amendment) Act, 2008 is known as the
Cyber law. It has a separate chapter XI entitled “Offences” in
which various cyber crimes have been declared as penal
offences punishable with imprisonment and fine.
OFFENCES, COMPENSATION AND PENALTIES
• Penalty and compensation for damage computer, computer
system etc: If any person, without permission of the owner or
any other person who is in charge of a computer, computer
system or computer network-
• Accesses or secures access to such computer . Computer system or
computer network or computer resource;
• Downloads, copies or extracts any data ,computer database or
information from such computer, computer system or computer network
including information data held or stored in any removable storage
medium.
• Introduces or causes to be introduced any computer contaminant or
computer virus into any computer , computer system or computer
network.
• Damages or cause to be damage to any computer , computer system or
computer network , data, computer database or any other programmes
residing in such computer , computer system or computer network .
• Disrupts or cause of disruption of any computer , computer system or
computer network .
Continue….
• f. denies or causes the denial of access to any person authorized to
access any computer , computer system or computer network by any
means;
• g. provides any assistance to any computer to facilitate access to a
computer , computer system or computer network in contravention of
the provision of the Act , rules or regulations made there under;
• h. Charges the service availed of by a person to the account of any
other person by tampering or manipulating with or manipulating any
computer , computer system or computer network ;
• i. destroy, delete or alters any information residing in a computer
resource or diminishes its value or utility or affects it injuriously by nay
means;
• j. steals , conceals , destroys or alters or cause any person to steel ,
conceal, destroy or alter any computer source code used for computer
resource with an intention to cause damage,
• he shall be liable to pay damage by way of compensation to the
person so affected.
Continued…
• Compensation for failure to protect data[Sec. 43-A] : where a body
corporate , possessing, dealing or handling any sensitive personal data or
information in a computer resource which it owns , control or operates , is
negligent in implementing and maintaining reasonable security practices
and produces and thereby causes wrongful loss and wrongful gain to any
person , such body corporate shall be liable to pay damage s by way of
compensation to the person so affected.
• Penalty to failure to furnish information , return etc.[Sec. 44] :If any
person is required to
• a. furnish any document , return or report to the controler
or the Certifying Authority, fails to furnish the same , he shall be liable to
penalty not exceeding rupees one lac and fifty thousand for each such
failure.
• b. maintain books of account or records , fails to maintain
the same, he shall be a liable to a penalty not exceeding rupees ten
thousand for every day during which the failure continues;
Continue..
• 4. Penalty for securing access to a protected system[Sec 70]: The
appropriate government may declare that any computer resource which
directly or indirectly affects the facility of critical Information
Infrastructure to be protected system and may , by in order in writing ,
authorize the person who are to access protected notified system. Any
person who secure access or attempts to secure to such a protected
system unauthorisely shall be punished with imprisonment
• of a term which may extend to 10 years and shall also be liable to
fine. The central Government has prescribed the Information Technology
(Security Procedure) Rules, 2004.
• 5 Tampering with computer source documents [sec.65] :Whoever
knowingly or intentionally conceal , destroy or alters any computer source
code used for computer , computer programmed , computer system is
required to be maintained by law, shall be punishable with imprisonment
up to three years or with fine which may extend up to rupees two lacs or
with both .
Continued….
• Punishment for sending offensive message through communication
service , etc[Sec.66-A] : Any person who sends . by means of a computer
resource or a communication device –
a. any information that is grossly offensive or have menacing
character ; or
b. any information which he knows to be false , but for the purpose
of annoyance , inconvenience, danger, obstruction , insult, injury ,
criminal intimidation, hatred, persistently by making use of such
computer resource or a communication device;
c. any electronic mail or electronic mail message for the purpose of
causing annoyance or inconvenience or to device or to mislead the
address or recipient about the origin of such message, shall be punishable
with imprisonment for a term which may extend to three years with fine.
PUNISHMENT FOR VIOLATION OF PRIVACY
7. PUNISHMENT FOR VIOLATION OF PRIVACY
Whoever, intentionally or knowingly capture,
publishes or transmit the image of a private area of
any person without his or her consent, under
circumstances violating the privacy of that person,
shall be punished with imprisonment of at least
three years or with a fine no exceeding Rs 2 lacks,
or with both.
PUNISHMENT FOR CYBER TERRORISM
• An offence of cyber terrorism is committed when
whoever –
• (a)With intent to threaten the unity, integrity, security or
sovereignty of India or to strike terror in the people by –
• (1)Denying or cause the denial of access to any person
authorised to access computer resource; or
• (2) Attempting to penetrate or access a computer
resource without authorisation or exceeding authorised
access.
CONTINUE...
(b) Knowingly or intentionally penetrates or access a
computer resource without authorisation or exceeding
authorised access and by means of such conduct obtains
access to information, data or computer database that is
restricted for reasons for the security of the State of
foreign relations; or any restricted information, data or
computer database, with reasons to believe that such
information, data or computer database so obtained may
be used to cause injury to the interests of the sovereignty
& integrity of India.
Whoever commits cyber terrorism shall be punishable
with imprisonment which may extend to imprisonment for
life.
PUNISHMENT FOR PUBLISHING OR TRANMITTING OF MATERIAL CONTAINING
SEXUALLY EXPLICIT ACT, ETC. IN ELECTRONIC FORM
• Whoever publishes or transmits or causes to be
published or transmitted in the electronic form, any
material which contains sexually explicit act or conduct
shall be punished on first conviction with imprisonment
of either description for a term which may extend to five
years and with fine which may extend to Rs 10 lacks. In
the event of second or subsequent conviction with
imprisonment of either description for a term which may
extend to seven years and also with fine which may
extend to Rs 10 lacks.
Typical Cyber Crime Cases
• State of Tamil Nadu Vs Suhas Katti
• This case related to posting of obscene, defamatory and annoying
message about a divorcee woman in the yahoo message group. E-Mails were
also forwarded to the victim for information by the accused through a false e-
mail account opened by him in the name of the victim. The posting of the
message resulted in annoying phone calls to the lady in the belief that she was
soliciting. Based on a complaint made by the victim in February 2004, the Police
traced the accused to Mumbai and arrested him within the next few days. The
accused was a known family friend of the victim and was reportedly interested
in marrying her. She however married another person. This marriage later
ended in divorce and the accused started contacting her once again. On her
reluctance to marry him, the accused took up the harassment through the
Internet.
Continue….
• On 24-3-2004 Charge Sheet was filed u/s 67 of IT Act 2000, 469
and 509 IPC before The Hon’ble Addl. CMM Egmore by citing 18
witnesses and 34 documents and material objects. The same was
taken on file in C.C.NO.4680/2004. On the prosecution side 12
witnesses were examined and entire documents were marked as
Exhibits. The Defence argued that the offending mails would have
been given either by ex-husband of the complainant or the
complainant her self to implicate the accused as accused alleged
to have turned down the request of the complainant to marry
her. Further the Defence counsel argued that some of the
documentary evidence was not sustainable under Section 65 B of
the Indian Evidence Act. However, the court relied upon the
expert witnesses and other evidence produced before it,
including the witnesses of the Cyber Cafe owners and came to the
conclusion that the crime was conclusively proved.
Continue…
• Ld. Additional Chief Metropolitan Magistrate, Egmore,
delivered the judgement on 5-11-04 as follows:
" The accused is found guilty of offences under section 469, 509
IPC and 67 of IT Act 2000 and the accused is convicted and is
sentenced for the offence to undergo RI for 2 years under 469 IPC
and to pay fine of Rs.500/-and for the offence u/s 509 IPC
sentenced to undergo 1 year Simple imprisonment and to pay fine
of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI
for 2 years and to pay fine of Rs.4000/- All sentences to run
concurrently."
• The accused paid fine amount and he was lodged at
Central Prison, Chennai. This is considered as the first case
convicted under section 67 of Information Technology Act 2000 in
India
Bazee.com case
• CEO of Bazee.com was arrested in December 2004
because a CD with objectionable material was being sold
on the website. The CD was also being sold in the
markets in Delhi. The Mumbai city police and the Delhi
Police got into action. The CEO was later released on
bail. This opened up the question as to what kind of
distinction do we draw between Internet Service
Provider and Content Provider. The burden rests on the
accused that he was the Service Provider and not the
Content Provider.
Campus Overview
907/A Uvarshad,
Gandhinagar
Highway, Ahmedabad –
382422.
Ahmedabad Kolkata
Infinity Benchmark, 10th
Floor, Plot G1,
Block EP & GP,
Sector V, Salt-Lake,
Kolkata – 700091.
Mumbai
Goldline Business Centre
Linkway Estate,
Next to Chincholi Fire
Brigade, Malad (West),
Mumbai – 400 064.
Thank You

More Related Content

What's hot

Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technologyDr. Trilok Kumar Jain
 
It act law ppt
It act law pptIt act law ppt
It act law pptVishesh Dalal
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000 PAYAL SINHA
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaRodney D. Ryder
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docxDr. Arun Verma
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 

What's hot (20)

Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technology
 
it act 2000
it act 2000it act 2000
it act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
it act
it act it act
it act
 
It act 2000
It act 2000It act 2000
It act 2000
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Information technology act
Information technology actInformation technology act
Information technology act
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 

Viewers also liked (9)

New technology
New technology  New technology
New technology
 
New media literacy
New media literacy New media literacy
New media literacy
 
Correlation & regression (3)
Correlation & regression (3)Correlation & regression (3)
Correlation & regression (3)
 
Sage advance case
Sage advance case Sage advance case
Sage advance case
 
Ethics
Ethics Ethics
Ethics
 
Bloemenveiling aalmeer case
Bloemenveiling aalmeer case Bloemenveiling aalmeer case
Bloemenveiling aalmeer case
 
Life insurance
Life insurance  Life insurance
Life insurance
 
Marketing
Marketing Marketing
Marketing
 
Business proposal
Business proposal Business proposal
Business proposal
 

Similar to Cyber

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000Mayuresh Patil
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Cyber Security
Cyber Security Cyber Security
Cyber Security Gururaj H L
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptxAnimeshTripathi33
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptxsambaba17
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Electronic transaction law no 2
Electronic transaction law no 2Electronic transaction law no 2
Electronic transaction law no 2Abbassi Law Office
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber LawsSajan Janardanan
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 

Similar to Cyber (20)

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Electronic transaction law no 2
Electronic transaction law no 2Electronic transaction law no 2
Electronic transaction law no 2
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 

More from Unitedworld School Of Business

PGDM Colleges in GUJARAT, Unitedworld School of Business
PGDM Colleges in GUJARAT, Unitedworld School of BusinessPGDM Colleges in GUJARAT, Unitedworld School of Business
PGDM Colleges in GUJARAT, Unitedworld School of BusinessUnitedworld School Of Business
 
bba institutes in ahmedabad, Unitedworld school of business
bba institutes in ahmedabad, Unitedworld school of business bba institutes in ahmedabad, Unitedworld school of business
bba institutes in ahmedabad, Unitedworld school of business Unitedworld School Of Business
 
bba course gujarat , Unitedworld school of business
bba course gujarat , Unitedworld school of business bba course gujarat , Unitedworld school of business
bba course gujarat , Unitedworld school of business Unitedworld School Of Business
 
bba college gujarat, Unitedworld school of business
bba college gujarat, Unitedworld school of business bba college gujarat, Unitedworld school of business
bba college gujarat, Unitedworld school of business Unitedworld School Of Business
 
top 10 bba colleges in india, Unitedworld School of Business
top 10 bba colleges in india, Unitedworld School of Businesstop 10 bba colleges in india, Unitedworld School of Business
top 10 bba colleges in india, Unitedworld School of BusinessUnitedworld School Of Business
 
best bba colleges in india, Unitedworld school of business
best bba colleges in india, Unitedworld school of business best bba colleges in india, Unitedworld school of business
best bba colleges in india, Unitedworld school of business Unitedworld School Of Business
 
MBA in Marketing, Unitedworld School of Business
MBA in Marketing, Unitedworld School of BusinessMBA in Marketing, Unitedworld School of Business
MBA in Marketing, Unitedworld School of BusinessUnitedworld School Of Business
 
mba human resources, Unitedworld school of business
mba human resources, Unitedworld school of business mba human resources, Unitedworld school of business
mba human resources, Unitedworld school of business Unitedworld School Of Business
 
mba in international business, Unitedworld School of Business
mba in international business, Unitedworld School of Businessmba in international business, Unitedworld School of Business
mba in international business, Unitedworld School of BusinessUnitedworld School Of Business
 
mba in information system, Unitedworld School of Business
mba in information system, Unitedworld School of Businessmba in information system, Unitedworld School of Business
mba in information system, Unitedworld School of BusinessUnitedworld School Of Business
 
mba in human resources, Unitedworld School of Business
mba in human resources, Unitedworld School of Businessmba in human resources, Unitedworld School of Business
mba in human resources, Unitedworld School of BusinessUnitedworld School Of Business
 
top business school of India, unitedworld school of business
top business school of India, unitedworld school of businesstop business school of India, unitedworld school of business
top business school of India, unitedworld school of businessUnitedworld School Of Business
 
top mba college West Bengal, Unitedworld School of Business
top mba college West Bengal, Unitedworld School of Businesstop mba college West Bengal, Unitedworld School of Business
top mba college West Bengal, Unitedworld School of BusinessUnitedworld School Of Business
 
top business management college in india, Unitedworld School of Business
top business management college in india,  Unitedworld School of Businesstop business management college in india,  Unitedworld School of Business
top business management college in india, Unitedworld School of BusinessUnitedworld School Of Business
 
top mba placements in india, Unitedworld School of Business
top mba placements in india, Unitedworld School of Businesstop mba placements in india, Unitedworld School of Business
top mba placements in india, Unitedworld School of BusinessUnitedworld School Of Business
 
top mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of Businesstop mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of BusinessUnitedworld School Of Business
 
top mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of Businesstop mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of BusinessUnitedworld School Of Business
 

More from Unitedworld School Of Business (20)

PGDM Colleges in GUJARAT, Unitedworld School of Business
PGDM Colleges in GUJARAT, Unitedworld School of BusinessPGDM Colleges in GUJARAT, Unitedworld School of Business
PGDM Colleges in GUJARAT, Unitedworld School of Business
 
bba institutes in ahmedabad, Unitedworld school of business
bba institutes in ahmedabad, Unitedworld school of business bba institutes in ahmedabad, Unitedworld school of business
bba institutes in ahmedabad, Unitedworld school of business
 
bba course gujarat , Unitedworld school of business
bba course gujarat , Unitedworld school of business bba course gujarat , Unitedworld school of business
bba course gujarat , Unitedworld school of business
 
bba college gujarat, Unitedworld school of business
bba college gujarat, Unitedworld school of business bba college gujarat, Unitedworld school of business
bba college gujarat, Unitedworld school of business
 
top 10 bba colleges in india, Unitedworld School of Business
top 10 bba colleges in india, Unitedworld School of Businesstop 10 bba colleges in india, Unitedworld School of Business
top 10 bba colleges in india, Unitedworld School of Business
 
best bba colleges in india, Unitedworld school of business
best bba colleges in india, Unitedworld school of business best bba colleges in india, Unitedworld school of business
best bba colleges in india, Unitedworld school of business
 
MBA in Marketing, Unitedworld School of Business
MBA in Marketing, Unitedworld School of BusinessMBA in Marketing, Unitedworld School of Business
MBA in Marketing, Unitedworld School of Business
 
MBA in HR, Unitedworld School of Business
MBA in HR, Unitedworld School of BusinessMBA in HR, Unitedworld School of Business
MBA in HR, Unitedworld School of Business
 
MBA in Finance, Unitedworld School of Business
MBA in Finance, Unitedworld School of BusinessMBA in Finance, Unitedworld School of Business
MBA in Finance, Unitedworld School of Business
 
mba human resources, Unitedworld school of business
mba human resources, Unitedworld school of business mba human resources, Unitedworld school of business
mba human resources, Unitedworld school of business
 
mba in it, Unitedworld School of Business
mba in it, Unitedworld School of Businessmba in it, Unitedworld School of Business
mba in it, Unitedworld School of Business
 
mba in international business, Unitedworld School of Business
mba in international business, Unitedworld School of Businessmba in international business, Unitedworld School of Business
mba in international business, Unitedworld School of Business
 
mba in information system, Unitedworld School of Business
mba in information system, Unitedworld School of Businessmba in information system, Unitedworld School of Business
mba in information system, Unitedworld School of Business
 
mba in human resources, Unitedworld School of Business
mba in human resources, Unitedworld School of Businessmba in human resources, Unitedworld School of Business
mba in human resources, Unitedworld School of Business
 
top business school of India, unitedworld school of business
top business school of India, unitedworld school of businesstop business school of India, unitedworld school of business
top business school of India, unitedworld school of business
 
top mba college West Bengal, Unitedworld School of Business
top mba college West Bengal, Unitedworld School of Businesstop mba college West Bengal, Unitedworld School of Business
top mba college West Bengal, Unitedworld School of Business
 
top business management college in india, Unitedworld School of Business
top business management college in india,  Unitedworld School of Businesstop business management college in india,  Unitedworld School of Business
top business management college in india, Unitedworld School of Business
 
top mba placements in india, Unitedworld School of Business
top mba placements in india, Unitedworld School of Businesstop mba placements in india, Unitedworld School of Business
top mba placements in india, Unitedworld School of Business
 
top mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of Businesstop mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of Business
 
top mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of Businesstop mba college India, Unitedworld School of Business
top mba college India, Unitedworld School of Business
 

Recently uploaded

Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A BeĂąa
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Recently uploaded (20)

Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Cyber

  • 1.
  • 3. IT ACT 2000 • The Information Technology act , 2000 received the assent of president of India on 9 June 2000 and came into force from 17 October in that same year .The act was enacted to provide legal recognition for transaction carried out by means of electronic data interchange and other means of electronic communication , commonly referred to as “Electronic Commerce” , to facilitate electronic filling of documents with governments agencies which involve the use of alternative to paper based method of communication and storage information This law applies to any kind of information in the form of data message used in the context of commercial activities.
  • 4. Objective • to grant legal recognition for transaction carried out by means of electronic data interchange and other means of electronic communication; • To give legal recognition to digital signature / electronic signature for authentication accepting of any information or matter which require authentication under any law; • To facilitate electronic of documents with Government departments; • To facilitate electronic storage of data ; • To facilitate and give legal sanction to electronic fund transfer between banks and financial institution ; • To give legal recognition for keeping books of account by bankers in electronic form.
  • 5. The Act does not apply to: • 1.a negotiable instrument as defined in section 13 of the Negotiable Instruments Act,1881; • 2.a power-of-attorney as defined in section 1A of the Powers- of-Attorney Act, 1882; • 3.a trust as defined in section 3 of the Indian Trusts Act, 1882; • 4.a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called; • 5.any contract for the sale or conveyance of immovable property or any interest in such property; • 6.any such class of documents or transactions as may be notified by the Central Government in the Official Gazette.
  • 6. Amendment act 2008 • Being the first legislation in the nation on technology, computers and ecommerce and e-communication, the Act was the subject of extensive debates, elaborate reviews and detailed criticisms, with one arm of the industry criticizing some sections of the Act tobe draconian and other stating it is too diluted and lenient. There were some conspicuous omissions too resulting in the investigators relying more and more on the time-tested (one and half century-old) Indian Penal Code even in technology based cases with the I.T. Act also being referred in the process and the reliance more on IPC rather on the ITA. Thus the need for an amendment – a detailed one – was felt forthe I.T. Act almost from the year 2003-04 itself. Major industry bodies were consulted and advisory groups were formed to go into the perceived lacunae in the I.T. Act and comparing it with similar legislations in other nations and to suggest recommendations.
  • 7. Continue…….. • Such recommendations were analyzed and subsequently taken up as a comprehensive Amendment Act and after considerable administrative procedures, the consolidated amendment called the Information Technology Amendment Act 2008was placed in the Parliament and passed without much debate, towards the end of2008 (by which time the Mumbai terrorist attack of 26 November 2008 had taken place). This Amendment Act got the President assent on 5 Feb 2009 and was made effective from 27 October2009. • Some of the notable features of the ITAA are as follows: • Focusing on data privacy • Focusing on Information Security • Defining cyber cafĂŠ • Making digital signature technology neutral • Defining reasonable security practices to be followed by corporate
  • 8. Continue…. • Redefining the role of intermediaries • Recognizing the role of Indian Computer Emergency Response Team • Inclusion of some additional cyber crimes like child pornography and cyber terrorism • authorizing an Inspector to investigate cyber offences (as against the DSP earlier)
  • 9. DIGITAL SIGNATURE A digital signature is an electronic scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives recipient a reason to believe that the message was created by a known sender and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect imitation or tampering.
  • 10. Authentication of Digital Signature • A digital signature shall – • be created and verified by cryptography that concerns itself with transforming electronic records. • use “Public Key Cryptography” which employs an algorithm using two different mathematical “keys” – one for creating a digital signature or transforming it and another key for verifying the signature or returning the electronic record to original form. Hash function shall be used to create this signature. Software utilizing such keys are termed as “asymmetric cryptography” [Rule 3 of IT Rules, 2000].
  • 11. Continued…… • Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is obvious in a financial context. • For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake.
  • 12. Verification of Digital Signature • Verification means to determine whether – • the initial record was affixed with the digital signature by using the “keys” of the subscriber. • the original record is retained intact or has been altered since such electronic record was bounded with the digital signature [Sec.2(1)(zh)].
  • 13. DIGITAL SIGNATURE CERTIFICATE • A digital signature certificate is an electronic document which uses a digital signature to bind an identity — information such as the name of a person or an organization, their address, and so forth. The certificate can be used to verify that it belongs to an individual. • Any person can make an application to the Certifying Authority for the issue of this digital certificate. The Authority charges fees (as prescribed by the Central Government) for the issue of “digital signature certificate”.
  • 14. Generation of Digital Certificate • The generation of digital signature certificate shall involve – • receipt of an approved and verified certificate request. • creating a new digital signature certificate. • a distinguished name associated with the digital certificate owner. • a recognized and relevant policy as defined in certification practice statement [Rule 24 of the IT rules].
  • 15. Compromise of Digital Certificate • Digital signature certificate shall be deemed to be compromised where the integrity of – • the key associated with the certificate is in doubt. • the certificate owner is in doubt, as to the attempted use of his key pairs, or otherwise for malicious or unlawful purposes. • The digital certificate shall remain in the compromise state for only such time as it takes to arrange for revocation.
  • 16. Expiry of Digital Signature Certificate • A digital signature certificate shall be issued with a designated expiry date. It will expire automatically and on expiry, it shall not be re- used. The period for which a digital certificate has been issued shall not be extended, but a new digital signature certificate may be issued after the expiry of such period [Rules 26 of IT Act, 2000].
  • 17. Cyber crime and Cyber law • What is a cyber crime? Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the world wide web . There isn’t really a fixed definition for cyber crime. The Indian Law has not given any definition to the term ‘cyber crime’. In fact, the Indian Penal Code does not use the term ‘cyber crime’ at any point even after its amendment by the Information Technology (amendment) Act 2008, the Indian Cyber law. But “Cyber Security” is defined under Section (2) (b) meansprotecting information, equipment, devices computer, computer resource, communication device and informationstored therein from unauthorized access,use, disclosure, disruption, modification or destruction.
  • 18. United Nations’ Definition of Cybercrime • At theTenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cyber crime was broken into two categories and defined thus: • a. Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. • b. Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer systemor network.
  • 19. • What is Cyber law…? Cyber law is a term used to describe the legal issues related to use of communications technology, particularly“cyberspace”, i.e. the Internet. It is less of a distinct field of law in the way that property or contract are, as it is an intersection of many legal fields including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet. In India, The IT Act, 2000 as amended by The IT (Amendment) Act, 2008 is known as the Cyber law. It has a separate chapter XI entitled “Offences” in which various cyber crimes have been declared as penal offences punishable with imprisonment and fine.
  • 20. OFFENCES, COMPENSATION AND PENALTIES • Penalty and compensation for damage computer, computer system etc: If any person, without permission of the owner or any other person who is in charge of a computer, computer system or computer network- • Accesses or secures access to such computer . Computer system or computer network or computer resource; • Downloads, copies or extracts any data ,computer database or information from such computer, computer system or computer network including information data held or stored in any removable storage medium. • Introduces or causes to be introduced any computer contaminant or computer virus into any computer , computer system or computer network. • Damages or cause to be damage to any computer , computer system or computer network , data, computer database or any other programmes residing in such computer , computer system or computer network . • Disrupts or cause of disruption of any computer , computer system or computer network .
  • 21. Continue…. • f. denies or causes the denial of access to any person authorized to access any computer , computer system or computer network by any means; • g. provides any assistance to any computer to facilitate access to a computer , computer system or computer network in contravention of the provision of the Act , rules or regulations made there under; • h. Charges the service availed of by a person to the account of any other person by tampering or manipulating with or manipulating any computer , computer system or computer network ; • i. destroy, delete or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by nay means; • j. steals , conceals , destroys or alters or cause any person to steel , conceal, destroy or alter any computer source code used for computer resource with an intention to cause damage, • he shall be liable to pay damage by way of compensation to the person so affected.
  • 22. Continued… • Compensation for failure to protect data[Sec. 43-A] : where a body corporate , possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns , control or operates , is negligent in implementing and maintaining reasonable security practices and produces and thereby causes wrongful loss and wrongful gain to any person , such body corporate shall be liable to pay damage s by way of compensation to the person so affected. • Penalty to failure to furnish information , return etc.[Sec. 44] :If any person is required to • a. furnish any document , return or report to the controler or the Certifying Authority, fails to furnish the same , he shall be liable to penalty not exceeding rupees one lac and fifty thousand for each such failure. • b. maintain books of account or records , fails to maintain the same, he shall be a liable to a penalty not exceeding rupees ten thousand for every day during which the failure continues;
  • 23. Continue.. • 4. Penalty for securing access to a protected system[Sec 70]: The appropriate government may declare that any computer resource which directly or indirectly affects the facility of critical Information Infrastructure to be protected system and may , by in order in writing , authorize the person who are to access protected notified system. Any person who secure access or attempts to secure to such a protected system unauthorisely shall be punished with imprisonment • of a term which may extend to 10 years and shall also be liable to fine. The central Government has prescribed the Information Technology (Security Procedure) Rules, 2004. • 5 Tampering with computer source documents [sec.65] :Whoever knowingly or intentionally conceal , destroy or alters any computer source code used for computer , computer programmed , computer system is required to be maintained by law, shall be punishable with imprisonment up to three years or with fine which may extend up to rupees two lacs or with both .
  • 24. Continued…. • Punishment for sending offensive message through communication service , etc[Sec.66-A] : Any person who sends . by means of a computer resource or a communication device – a. any information that is grossly offensive or have menacing character ; or b. any information which he knows to be false , but for the purpose of annoyance , inconvenience, danger, obstruction , insult, injury , criminal intimidation, hatred, persistently by making use of such computer resource or a communication device; c. any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to device or to mislead the address or recipient about the origin of such message, shall be punishable with imprisonment for a term which may extend to three years with fine.
  • 25. PUNISHMENT FOR VIOLATION OF PRIVACY 7. PUNISHMENT FOR VIOLATION OF PRIVACY Whoever, intentionally or knowingly capture, publishes or transmit the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment of at least three years or with a fine no exceeding Rs 2 lacks, or with both.
  • 26. PUNISHMENT FOR CYBER TERRORISM • An offence of cyber terrorism is committed when whoever – • (a)With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people by – • (1)Denying or cause the denial of access to any person authorised to access computer resource; or • (2) Attempting to penetrate or access a computer resource without authorisation or exceeding authorised access.
  • 27. CONTINUE... (b) Knowingly or intentionally penetrates or access a computer resource without authorisation or exceeding authorised access and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State of foreign relations; or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause injury to the interests of the sovereignty & integrity of India. Whoever commits cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.
  • 28. PUNISHMENT FOR PUBLISHING OR TRANMITTING OF MATERIAL CONTAINING SEXUALLY EXPLICIT ACT, ETC. IN ELECTRONIC FORM • Whoever publishes or transmits or causes to be published or transmitted in the electronic form, any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to Rs 10 lacks. In the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to Rs 10 lacks.
  • 29. Typical Cyber Crime Cases • State of Tamil Nadu Vs Suhas Katti • This case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e- mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. Based on a complaint made by the victim in February 2004, the Police traced the accused to Mumbai and arrested him within the next few days. The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet.
  • 30. Continue…. • On 24-3-2004 Charge Sheet was filed u/s 67 of IT Act 2000, 469 and 509 IPC before The Hon’ble Addl. CMM Egmore by citing 18 witnesses and 34 documents and material objects. The same was taken on file in C.C.NO.4680/2004. On the prosecution side 12 witnesses were examined and entire documents were marked as Exhibits. The Defence argued that the offending mails would have been given either by ex-husband of the complainant or the complainant her self to implicate the accused as accused alleged to have turned down the request of the complainant to marry her. Further the Defence counsel argued that some of the documentary evidence was not sustainable under Section 65 B of the Indian Evidence Act. However, the court relied upon the expert witnesses and other evidence produced before it, including the witnesses of the Cyber Cafe owners and came to the conclusion that the crime was conclusively proved.
  • 31. Continue… • Ld. Additional Chief Metropolitan Magistrate, Egmore, delivered the judgement on 5-11-04 as follows: " The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently." • The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India
  • 32. Bazee.com case • CEO of Bazee.com was arrested in December 2004 because a CD with objectionable material was being sold on the website. The CD was also being sold in the markets in Delhi. The Mumbai city police and the Delhi Police got into action. The CEO was later released on bail. This opened up the question as to what kind of distinction do we draw between Internet Service Provider and Content Provider. The burden rests on the accused that he was the Service Provider and not the Content Provider.
  • 33. Campus Overview 907/A Uvarshad, Gandhinagar Highway, Ahmedabad – 382422. Ahmedabad Kolkata Infinity Benchmark, 10th Floor, Plot G1, Block EP & GP, Sector V, Salt-Lake, Kolkata – 700091. Mumbai Goldline Business Centre Linkway Estate, Next to Chincholi Fire Brigade, Malad (West), Mumbai – 400 064.