SlideShare a Scribd company logo
1 of 7
Download to read offline
ASSIGNMENT
EDU 03
Cyber Law – IT Act 2000,
IT Act 2008
Submitted by,
ATHULYARAJ D S
Roll No : 30
Physical Science
CYBER LAW
Cyber law also called IT law is the law
regarding information technology including computers
and internet. It is related to legal informatics and
supervise the digital circulation of information,
software information, security and e-commerce.
Importance of Cyber Law
 It covers all transactions over internet
 It keeps eyes on all activities over internet
 It touches every action and every reaction in cyber
space
Advantages of Cyber law
 Organisations are now able to carry out e-
commerce
 Digital signatures have been given legal validity
and sanction in the act
 It allows government to issue modification on the
web, thus heralding e-commerce
 It addresses, the important issues of security, which
are so critical to the success of electronic
transactions.
IT ACT 2000
The primary source of cyber law
in India is the Information technology Act, 2000( IT
Act) which is dealing with cyber crime and electronic
commerce. The act of parliament received the assent of
the president on 9th
June 2000. IT act came into force on
17th
October 2000. IT act 2000 is based on
UNCITRAL(United Nations Commission on
International Trade Law) Model Law. IT Act 2000 has
13 chapters, 94 sections and 4 schedules.
It is an act to provide legal recognition
for transactions carried out by means of electronic
communication, commonly referred to as “electronic
commerce”. Electronic commerce can now be carried
out by persons to whom a ‘Digital Certificate’ is issued.
Any person to whom such certificate is issued can now
authenticate an electronic record by affixing his digital
signature to the document.
Objectives of IT Act 2000
Legal recognition to transactions carried out by
means of electronic data interchange.
Promote e-commerce which is an alternative to the
paper based method of communication and storage
of information.
To facilitate e-filling of documents with the
government departments and agencies.
To bring suitable amendments to the existing laws
in pursuit of the objectives of IT Act.
Important Sections of IT Act 2000
Section 43: Penalty and compensation for damage to
computer, computer system etc.
Section 65 : Cyber tampering
Section 66 : Hacking with computer system
Section66A: Punishment for sending offensive
messages through computers or any other
communication devices such as mobile phone or
tablets.
Section 66B: Punishment for stolen computers or
resources to the identified theft.
Section 66C: Punishment to identity theft
Section 66D: Cyber personation
Section 66E: Punishment for violation of privacy
Section 66F : Cyber terrorism
Section 67: Punishment for publishing or
transmitting obscene material in electronic form
Section 67A: Cyber pornography
Section 70 :Prevents unauthorized to protected
system
Section 73: Penalty for publishing false digital
signature certificate
On March 24,2015, Supreme court deleted the section
66A of IT Act
IT Act 2008
The IT Amendment Act 2008 is a
substantial addition to IT Act 2000. The IT
Amendment was passed by the Indian parliament in
October 2008 and came into force on October 27,
2009. The act is administered by Indian Computer
Emergency Response team. The original act was
developed to promote the IT industry, regulate e-
commerce, facilitate e-governance and prevent
cybercrime. The act also seek to foster security
practices within India that would serve the country in
a global context. The amendment was created to
address issues that the original bill failed to cover and
to accommodate further development of IT and
related ssecurity concerns since the original law was
passed.
IT Act 2008 has 14 chapters, 124 sections, and 2
schedules. The electronic document is schedule 1 and
electronic signature is schedule 2.
Changes in the amendment include:
 Redefining terms such as “communication device”
to reflect current use
 Validating electronic signatures and contracts
 Making the owner of a given IP address
responsible for content accessed or distributed
through it.
 Making corporations responsible for implementing
effective data security practices and liable for
breaches.
The amendment has been criticized for decreasing
the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of
individuals.

More Related Content

What's hot (19)

IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Information technology act
Information technology actInformation technology act
Information technology act
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Class it act
Class it actClass it act
Class it act
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
The information technology act
The information technology actThe information technology act
The information technology act
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 

Similar to Assignment edu 03

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 

Similar to Assignment edu 03 (20)

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
It act 2000
It act 2000It act 2000
It act 2000
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 

More from ATHULYARAJDS

More from ATHULYARAJDS (9)

Innovative Work .pdf
Innovative Work .pdfInnovative Work .pdf
Innovative Work .pdf
 
SOLUTIONS (2).pdf
SOLUTIONS (2).pdfSOLUTIONS (2).pdf
SOLUTIONS (2).pdf
 
camp.pdf
camp.pdfcamp.pdf
camp.pdf
 
Basic_First_Aid.ppt
Basic_First_Aid.pptBasic_First_Aid.ppt
Basic_First_Aid.ppt
 
Scientist LP ppt.pptx
Scientist LP ppt.pptxScientist LP ppt.pptx
Scientist LP ppt.pptx
 
MCQ EDU 03
MCQ EDU 03MCQ EDU 03
MCQ EDU 03
 
MCQ EDU 01
MCQ EDU 01MCQ EDU 01
MCQ EDU 01
 
Assignment edu 01
Assignment edu 01Assignment edu 01
Assignment edu 01
 
Major changes occured in indian society
Major changes occured in indian societyMajor changes occured in indian society
Major changes occured in indian society
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Assignment edu 03

  • 1. ASSIGNMENT EDU 03 Cyber Law – IT Act 2000, IT Act 2008 Submitted by, ATHULYARAJ D S Roll No : 30 Physical Science
  • 2. CYBER LAW Cyber law also called IT law is the law regarding information technology including computers and internet. It is related to legal informatics and supervise the digital circulation of information, software information, security and e-commerce. Importance of Cyber Law  It covers all transactions over internet  It keeps eyes on all activities over internet  It touches every action and every reaction in cyber space Advantages of Cyber law  Organisations are now able to carry out e- commerce  Digital signatures have been given legal validity and sanction in the act  It allows government to issue modification on the web, thus heralding e-commerce  It addresses, the important issues of security, which are so critical to the success of electronic transactions.
  • 3. IT ACT 2000 The primary source of cyber law in India is the Information technology Act, 2000( IT Act) which is dealing with cyber crime and electronic commerce. The act of parliament received the assent of the president on 9th June 2000. IT act came into force on 17th October 2000. IT act 2000 is based on UNCITRAL(United Nations Commission on International Trade Law) Model Law. IT Act 2000 has 13 chapters, 94 sections and 4 schedules. It is an act to provide legal recognition for transactions carried out by means of electronic communication, commonly referred to as “electronic commerce”. Electronic commerce can now be carried out by persons to whom a ‘Digital Certificate’ is issued. Any person to whom such certificate is issued can now authenticate an electronic record by affixing his digital signature to the document.
  • 4. Objectives of IT Act 2000 Legal recognition to transactions carried out by means of electronic data interchange. Promote e-commerce which is an alternative to the paper based method of communication and storage of information. To facilitate e-filling of documents with the government departments and agencies. To bring suitable amendments to the existing laws in pursuit of the objectives of IT Act. Important Sections of IT Act 2000 Section 43: Penalty and compensation for damage to computer, computer system etc. Section 65 : Cyber tampering Section 66 : Hacking with computer system Section66A: Punishment for sending offensive messages through computers or any other communication devices such as mobile phone or tablets.
  • 5. Section 66B: Punishment for stolen computers or resources to the identified theft. Section 66C: Punishment to identity theft Section 66D: Cyber personation Section 66E: Punishment for violation of privacy Section 66F : Cyber terrorism Section 67: Punishment for publishing or transmitting obscene material in electronic form Section 67A: Cyber pornography Section 70 :Prevents unauthorized to protected system Section 73: Penalty for publishing false digital signature certificate On March 24,2015, Supreme court deleted the section 66A of IT Act
  • 6. IT Act 2008 The IT Amendment Act 2008 is a substantial addition to IT Act 2000. The IT Amendment was passed by the Indian parliament in October 2008 and came into force on October 27, 2009. The act is administered by Indian Computer Emergency Response team. The original act was developed to promote the IT industry, regulate e- commerce, facilitate e-governance and prevent cybercrime. The act also seek to foster security practices within India that would serve the country in a global context. The amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related ssecurity concerns since the original law was passed. IT Act 2008 has 14 chapters, 124 sections, and 2 schedules. The electronic document is schedule 1 and electronic signature is schedule 2.
  • 7. Changes in the amendment include:  Redefining terms such as “communication device” to reflect current use  Validating electronic signatures and contracts  Making the owner of a given IP address responsible for content accessed or distributed through it.  Making corporations responsible for implementing effective data security practices and liable for breaches. The amendment has been criticized for decreasing the penalties for some cybercrimes and for lacking sufficient safeguards to protect the civil rights of individuals.