SlideShare a Scribd company logo
1 of 34
INFORMATION TECHNOLOGY
ACT, RATHER THAN GIVING
INFORMATION AND
TECHNOLOGY GIVE RISE TO
MORE CYBER CRIMES
Introduction
 Information Technology.
 Application in IT.
 E-commerce.
IT in Banking Sector
 Many facilities provided.
 Conversion of currencies to ‘Plastic Money’.
 IT is increasingly moving from a back office function to a
prime assistant.
 Traditional banking loosing its existence.
 E-banking and its benefits.
Information Technology Act,
2000
The Information Technology Act 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament (No
21 of 2000) notified on October 17, 2000.
 Essence of the ACT
 Purpose
 Objective
 Advantages
 Shortcomings
Key Terms
 Digital Signature
 E Governance
 Encryption
 Decryption
 Computer Source Code
 Cyber Terrorism
 Electronic Documents
Important Sections of IT
Act,2000
1) Section 65-
 Tampering with any computer source code used for a
computer, computer programme, computer system or
computer network.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to two lakh rupees.
2) Section 66-
 Hacking with computer system.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to five lakh rupees, or with both.
3) Section 67-
 Publishing transmitting information which is obscene in
electronic form shall be punished.
 Punishment-
o Imprisonment of either three years and with fine which may
extend to five lakh rupees.
o Imprisonment of either five years and also with fine which
may extend to ten lakh rupees.
4) Penalty for Breach of Confidentiality and Privacy
(Section 72)-
 Any person who has secured access to any electronic
record, book, register, correspondence, information,
document or other material without the consent of the
person concerned.
 Punishment-Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
5) Punishment for publishing Digital Signature Certificate
false in certain particulars (Section 73)-
 Punishment- Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
Amendments in Information
Technology Act, 2008
The IT Amendment Bill 2008 has been passed by the Lok
Sabha and the Rajya Sabha in the last week of December,
2008.
 Different Sections-
 Section 66B
 Section 66C
 Section 66E
 Section 67A
 Section 67B
 Section 72A
Case Study
• The Hyderabad case study.
• Section 66D- Punishments for cheating by personation by
using computer resource (Inserted Vide ITA 2008).
• Punishment-Imprisonment of three years and shall also be
liable to fine which may extend to one lakh rupees.
Cyber Crime
Unlawful acts wherein the computer is either a tool or a target or both
What is Cyber Crime ??
 Criminals can operate anonymously over the
computer networks.
 Hackers invade privacy.
 Hackers destroy “property” in the form of
computer files or records.
 Hackers injure other computer users by
destroying information systems.
 Computer pirates steal intellectual property.
Financial Crimes
 It includes cheating, credit card frauds, money laundering.
Cyber Pornography
 It includes pornographic websites; pornographic magazines
produced using computers (to publish and print the
material) and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
Web Jacking
 This occurs when someone forcefully takes control of a
website (by cracking the password and later changing it).
 Sale of illegal articles
 Phishing
 Online gambling
 Email spoofing
Intellectual Property
crimes-
These include software piracy, copyright infringement,
trademarks violations, theft of computer source code etc.
Cyber Criminals
 Kids (age group (9-16 years)
 Organized hacktivitsts
 Disgruntled employees
 Professional hackers
Case Study
 Case study related to bank.
 Case study related to cyber crime.
Cyber Crime in India
4639
1.4
3
India
online fraud
intrusion or hacking
malicious code
harrassment
Reports registered by RBI for
cyber fraud and the amount spent
for the same
Distribution of targets
Global Cyber Crime
NASSCOM INITIATIVES
 Global Trade Development
 National Skills Registry for IT/ITES Professional (NSR-
ITP)
 Sector Skills Councils
NASSCOM FORUMS
 Gaming Forum
 BPO
 Engineering Services
 Remote Infrastructure Management
Conclusion
 The fundamental approach of the Act is towards validating and
legalising electronic and on-line transactions.
 Awareness must be created.
 It leaves various issues untouched
 The Parliament must ensure that it keeps amending the law and
enacting new laws
 That there are no reliable statistics on the problem
 India is amongst few of the countries in the world which have
any legal framework for e-commerce and e-governance
Suggestions
1) Recruitment
2) Red Coding System
3) Training and Development
4) Domain
5) Vague Definations
Bibliography
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
Thank You!!

More Related Content

What's hot (20)

Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 

Similar to IT Act,2000 - Law

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Ashish Karan
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...ijtsrd
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 

Similar to IT Act,2000 - Law (20)

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
It act 2000
It act 2000It act 2000
It act 2000
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

IT Act,2000 - Law

  • 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION AND TECHNOLOGY GIVE RISE TO MORE CYBER CRIMES
  • 2. Introduction  Information Technology.  Application in IT.  E-commerce.
  • 3. IT in Banking Sector  Many facilities provided.  Conversion of currencies to ‘Plastic Money’.  IT is increasingly moving from a back office function to a prime assistant.  Traditional banking loosing its existence.  E-banking and its benefits.
  • 4. Information Technology Act, 2000 The Information Technology Act 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000.  Essence of the ACT  Purpose  Objective  Advantages  Shortcomings
  • 5. Key Terms  Digital Signature  E Governance  Encryption  Decryption  Computer Source Code  Cyber Terrorism  Electronic Documents
  • 6. Important Sections of IT Act,2000 1) Section 65-  Tampering with any computer source code used for a computer, computer programme, computer system or computer network.  Punishment- Imprisonment up to three years, or with fine which may extend up to two lakh rupees.
  • 7. 2) Section 66-  Hacking with computer system.  Punishment- Imprisonment up to three years, or with fine which may extend up to five lakh rupees, or with both.
  • 8. 3) Section 67-  Publishing transmitting information which is obscene in electronic form shall be punished.  Punishment- o Imprisonment of either three years and with fine which may extend to five lakh rupees. o Imprisonment of either five years and also with fine which may extend to ten lakh rupees.
  • 9. 4) Penalty for Breach of Confidentiality and Privacy (Section 72)-  Any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned.  Punishment-Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 10. 5) Punishment for publishing Digital Signature Certificate false in certain particulars (Section 73)-  Punishment- Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 11. Amendments in Information Technology Act, 2008 The IT Amendment Bill 2008 has been passed by the Lok Sabha and the Rajya Sabha in the last week of December, 2008.  Different Sections-  Section 66B  Section 66C  Section 66E  Section 67A  Section 67B  Section 72A
  • 12. Case Study • The Hyderabad case study. • Section 66D- Punishments for cheating by personation by using computer resource (Inserted Vide ITA 2008). • Punishment-Imprisonment of three years and shall also be liable to fine which may extend to one lakh rupees.
  • 13. Cyber Crime Unlawful acts wherein the computer is either a tool or a target or both
  • 14. What is Cyber Crime ??  Criminals can operate anonymously over the computer networks.  Hackers invade privacy.  Hackers destroy “property” in the form of computer files or records.  Hackers injure other computer users by destroying information systems.  Computer pirates steal intellectual property.
  • 15. Financial Crimes  It includes cheating, credit card frauds, money laundering.
  • 16. Cyber Pornography  It includes pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).
  • 17. Web Jacking  This occurs when someone forcefully takes control of a website (by cracking the password and later changing it).
  • 18.  Sale of illegal articles  Phishing  Online gambling  Email spoofing
  • 19. Intellectual Property crimes- These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  • 20. Cyber Criminals  Kids (age group (9-16 years)  Organized hacktivitsts  Disgruntled employees  Professional hackers
  • 21. Case Study  Case study related to bank.  Case study related to cyber crime.
  • 22. Cyber Crime in India
  • 23. 4639 1.4 3 India online fraud intrusion or hacking malicious code harrassment
  • 24. Reports registered by RBI for cyber fraud and the amount spent for the same
  • 27.
  • 28. NASSCOM INITIATIVES  Global Trade Development  National Skills Registry for IT/ITES Professional (NSR- ITP)  Sector Skills Councils
  • 29. NASSCOM FORUMS  Gaming Forum  BPO  Engineering Services  Remote Infrastructure Management
  • 30. Conclusion  The fundamental approach of the Act is towards validating and legalising electronic and on-line transactions.  Awareness must be created.  It leaves various issues untouched  The Parliament must ensure that it keeps amending the law and enacting new laws  That there are no reliable statistics on the problem  India is amongst few of the countries in the world which have any legal framework for e-commerce and e-governance
  • 31. Suggestions 1) Recruitment 2) Red Coding System 3) Training and Development 4) Domain 5) Vague Definations
  • 32. Bibliography  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields
  • 33.  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields