SlideShare a Scribd company logo
1 of 49
L E T ’ S F A C E I T : T H E F U T U R E I S N O W
Cyber Laws
FIRST THOUGHT
What is cyber crime
Cybercrime is a crime that involves a
computer and a network.
The computer may have been used in the
commission of a crime, or it may
be the target. Cybercrime may harm
someone's security and financial health.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
It may use a device to access user’s
Personal information
Confidential business information
Government information and
 disable a device
It also a cyber crime when the above information is being sold.
HISTORY OF CYBER CRIME
The first recorded cyber crime was in year 1820
The 1st case of use of computer theft in 1973. A
teller at local New York bank used a computer
to embezzle over$2 million dollars.
 The first spam email took place in 1978 when
it was sent over the Arpanet.
The first virus was installed on apple computer
in 1982
First person to convicted a cyber crime
In 1981 LAN MURPHY KNOWN AS CAPTAIN ZAP TO
HIS FANS BEEN 1ST to convicted crime
He hacked into the AT&T network and changed
the internal clock to change off the hours rates of
peak times
He received 1000hours of community service and
2.5 years of probation, a mere slap on the wrist
compared to today’s penalties , and was the
inspiration for the movie sneakers.
Categories of cyber crime
The computer as a
target – using a
computer ,e.g.
Hacking,
virus/worms
attacks ,Dos attack
etc.
The computer as
weapon- using a
computer to
commit real world
crime e.g. cyber
terrorism , credit
card fraud and
pornography etc.,
TYPES OF CYBER CRIME
Hacking – Illegal intrusion into a computer system and
network known as CRACKING. Though hackers enjoy the
media coverage.
Motive behind the hackers - Greed, Publicity, revenge ,
adventure to access forbidden information.
OTHER TYPES OF CYBER CRIME
>Dental and service attacks
>Virus dissemination
>Computer vandalism
>Cyber terrorism >Software piracy
Law that uses to protect cyber assets is cyber law or
cyber security.
Cyber security is
to protect system
or cyber assets
Cyber law is to
protect system or
cyber assets in legal
way
Roles of Cyber law in India
FRAUD
COPYRIGHT
HARASSMENT AND
STALKING
FREEDOM OF SPEECH
Trade secrets
s
In India cyber law was
contained in the
information technology
Act, 2000 (“IT Act)” NO21
of 2000 notified notified
on 17 October 2000.
It is the primary law in India dealing with dealing with cyber
crime and electronic commerce
ETHICAL HACKING
Citation Information
Technology Act, 2000
Enacted by Parliament of India
Enacted 9 June 2000
Assented to 9 June 2000
Signed 9 May 2000
 Commenced 17 October 2000
Introduced by Pramod Mahajan Minister
of Communications and Information Technology
What are the key points of IT Act 2000?
The Act provides a legal framework for electronic
governance by giving recognition to electronic
records and digital signatures. It also defines cyber
crimes and prescribes penalties for them. The Act
directed the formation of a Controller of Certify
Authorities to regulate the issuance of digital
signatures.
Information Technology Amendment Act 2008 (IT 2008)
The Information Technology Amendment Act, 2008
(IT Act 2008) is a substantial addition to India's
Information Technology Act (ITA- 2000). The IT
Amendment Act was passed by the Indian
Parliament in October 2008 and came into force a
year later.
WHY WAS IT Act, 2000 amended in 2008?
• The IT Amendment Act was passed by the Indian Parliament in
October 2008 and came into force a year later.
• The Amendment was created to address issues that the original
bill failed to cover and to accommodate further development of
IT and related security concerns
since the original law was passed.
What are the major changes made in the amendment of
IT Act in 2008?
Section 66A - Sending of offensive or false
messages
Section 66B - receiving
stolen computer resource
S
Section 66C - Identity theft
Section 66D - Cheating by personation
Section 66E - violation of privacy
Monitor
any
DISCREEPANCY
ssssssssss
Facility in E-Filing of
Document
For restricting electronic crime where power in
hands of RBI,IPO and Indiance evidence act
Provisions of information
technology act 2000
Provisions of Information Technology
Act 2000
Section
65 Destroy of
computer
source code
Section 67,67A,67B Publishing obscene
Section 67C Failure
to maintain records
Punishment
(Imprisonment up
to 3 years or with
fine or both)
Section 69
Decrypt of
data
Section 72 and 72A Breach of Confidentiality
and Privacy
Final Thoughts
Final Thoughts
Understanding Cyber Laws and Crimes
Understanding Cyber Laws and Crimes

More Related Content

Similar to Understanding Cyber Laws and Crimes

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
 
Introduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsToño Herrera
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 

Similar to Understanding Cyber Laws and Crimes (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
It legislation
It legislationIt legislation
It legislation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Introduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) Fundamentals
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 

Recently uploaded

如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 

Recently uploaded (20)

如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 

Understanding Cyber Laws and Crimes

  • 1. L E T ’ S F A C E I T : T H E F U T U R E I S N O W Cyber Laws
  • 3. What is cyber crime Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.
  • 4. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. It may use a device to access user’s Personal information Confidential business information Government information and  disable a device It also a cyber crime when the above information is being sold.
  • 5. HISTORY OF CYBER CRIME The first recorded cyber crime was in year 1820 The 1st case of use of computer theft in 1973. A teller at local New York bank used a computer to embezzle over$2 million dollars.  The first spam email took place in 1978 when it was sent over the Arpanet. The first virus was installed on apple computer in 1982
  • 6. First person to convicted a cyber crime In 1981 LAN MURPHY KNOWN AS CAPTAIN ZAP TO HIS FANS BEEN 1ST to convicted crime He hacked into the AT&T network and changed the internal clock to change off the hours rates of peak times He received 1000hours of community service and 2.5 years of probation, a mere slap on the wrist compared to today’s penalties , and was the inspiration for the movie sneakers.
  • 7. Categories of cyber crime The computer as a target – using a computer ,e.g. Hacking, virus/worms attacks ,Dos attack etc.
  • 8. The computer as weapon- using a computer to commit real world crime e.g. cyber terrorism , credit card fraud and pornography etc.,
  • 9. TYPES OF CYBER CRIME Hacking – Illegal intrusion into a computer system and network known as CRACKING. Though hackers enjoy the media coverage. Motive behind the hackers - Greed, Publicity, revenge , adventure to access forbidden information.
  • 10. OTHER TYPES OF CYBER CRIME >Dental and service attacks >Virus dissemination >Computer vandalism >Cyber terrorism >Software piracy
  • 11. Law that uses to protect cyber assets is cyber law or cyber security.
  • 12. Cyber security is to protect system or cyber assets Cyber law is to protect system or cyber assets in legal way
  • 13. Roles of Cyber law in India FRAUD
  • 14.
  • 16.
  • 20. s In India cyber law was contained in the information technology Act, 2000 (“IT Act)” NO21 of 2000 notified notified on 17 October 2000. It is the primary law in India dealing with dealing with cyber crime and electronic commerce ETHICAL HACKING
  • 21. Citation Information Technology Act, 2000 Enacted by Parliament of India Enacted 9 June 2000 Assented to 9 June 2000 Signed 9 May 2000  Commenced 17 October 2000 Introduced by Pramod Mahajan Minister of Communications and Information Technology
  • 22. What are the key points of IT Act 2000? The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certify Authorities to regulate the issuance of digital signatures.
  • 23. Information Technology Amendment Act 2008 (IT 2008) The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA- 2000). The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later.
  • 24. WHY WAS IT Act, 2000 amended in 2008? • The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. • The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed.
  • 25. What are the major changes made in the amendment of IT Act in 2008? Section 66A - Sending of offensive or false messages Section 66B - receiving stolen computer resource
  • 26. S Section 66C - Identity theft Section 66D - Cheating by personation Section 66E - violation of privacy
  • 27.
  • 28.
  • 29.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Facility in E-Filing of Document
  • 39. For restricting electronic crime where power in hands of RBI,IPO and Indiance evidence act
  • 40. Provisions of information technology act 2000 Provisions of Information Technology Act 2000
  • 43. Section 67C Failure to maintain records Punishment (Imprisonment up to 3 years or with fine or both)
  • 45. Section 72 and 72A Breach of Confidentiality and Privacy
  • 46.