Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
INFORMATION TECHNOLOGY
ACT, RATHER THAN GIVING
INFORMATION AND
TECHNOLOGY GIVE RISE TO
MORE CYBER CRIMES
Introduction
 Information Technology.
 Application in IT.
 E-commerce.
IT in Banking Sector
 Many facilities provided.
 Conversion of currencies to ‘Plastic Money’.
 IT is increasingly movin...
Information Technology Act,
2000
The Information Technology Act 2000 (also known as ITA-
2000, or the IT Act) is an Act of...
Key Terms
 Digital Signature
 E Governance
 Encryption
 Decryption
 Computer Source Code
 Cyber Terrorism
 Electron...
Important Sections of IT
Act,2000
1) Section 65-
 Tampering with any computer source code used for a
computer, computer p...
2) Section 66-
 Hacking with computer system.
 Punishment- Imprisonment up to three years, or with fine
which may extend...
3) Section 67-
 Publishing transmitting information which is obscene in
electronic form shall be punished.
 Punishment-
...
4) Penalty for Breach of Confidentiality and Privacy
(Section 72)-
 Any person who has secured access to any electronic
r...
5) Punishment for publishing Digital Signature Certificate
false in certain particulars (Section 73)-
 Punishment- Impris...
Amendments in Information
Technology Act, 2008
The IT Amendment Bill 2008 has been passed by the Lok
Sabha and the Rajya S...
Case Study
• The Hyderabad case study.
• Section 66D- Punishments for cheating by personation by
using computer resource (...
Cyber Crime
Unlawful acts wherein the computer is either a tool or a target or both
What is Cyber Crime ??
 Criminals can operate anonymously over the
computer networks.
 Hackers invade privacy.
 Hackers...
Financial Crimes
 It includes cheating, credit card frauds, money laundering.
Cyber Pornography
 It includes pornographic websites; pornographic magazines
produced using computers (to publish and pri...
Web Jacking
 This occurs when someone forcefully takes control of a
website (by cracking the password and later changing ...
 Sale of illegal articles
 Phishing
 Online gambling
 Email spoofing
Intellectual Property
crimes-
These include software piracy, copyright infringement,
trademarks violations, theft of compu...
Cyber Criminals
 Kids (age group (9-16 years)
 Organized hacktivitsts
 Disgruntled employees
 Professional hackers
Case Study
 Case study related to bank.
 Case study related to cyber crime.
Cyber Crime in India
4639
1.4
3
India
online fraud
intrusion or hacking
malicious code
harrassment
Reports registered by RBI for
cyber fraud and the amount spent
for the same
Distribution of targets
Global Cyber Crime
NASSCOM INITIATIVES
 Global Trade Development
 National Skills Registry for IT/ITES Professional (NSR-
ITP)
 Sector Ski...
NASSCOM FORUMS
 Gaming Forum
 BPO
 Engineering Services
 Remote Infrastructure Management
Conclusion
 The fundamental approach of the Act is towards validating and
legalising electronic and on-line transactions....
Suggestions
1) Recruitment
2) Red Coding System
3) Training and Development
4) Domain
5) Vague Definations
Bibliography
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 htt...
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slide...
Thank You!!
IT Act,2000 - Law
Upcoming SlideShare
Loading in …5
×

IT Act,2000 - Law

  • Login to see the comments

IT Act,2000 - Law

  1. 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION AND TECHNOLOGY GIVE RISE TO MORE CYBER CRIMES
  2. 2. Introduction  Information Technology.  Application in IT.  E-commerce.
  3. 3. IT in Banking Sector  Many facilities provided.  Conversion of currencies to ‘Plastic Money’.  IT is increasingly moving from a back office function to a prime assistant.  Traditional banking loosing its existence.  E-banking and its benefits.
  4. 4. Information Technology Act, 2000 The Information Technology Act 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000.  Essence of the ACT  Purpose  Objective  Advantages  Shortcomings
  5. 5. Key Terms  Digital Signature  E Governance  Encryption  Decryption  Computer Source Code  Cyber Terrorism  Electronic Documents
  6. 6. Important Sections of IT Act,2000 1) Section 65-  Tampering with any computer source code used for a computer, computer programme, computer system or computer network.  Punishment- Imprisonment up to three years, or with fine which may extend up to two lakh rupees.
  7. 7. 2) Section 66-  Hacking with computer system.  Punishment- Imprisonment up to three years, or with fine which may extend up to five lakh rupees, or with both.
  8. 8. 3) Section 67-  Publishing transmitting information which is obscene in electronic form shall be punished.  Punishment- o Imprisonment of either three years and with fine which may extend to five lakh rupees. o Imprisonment of either five years and also with fine which may extend to ten lakh rupees.
  9. 9. 4) Penalty for Breach of Confidentiality and Privacy (Section 72)-  Any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned.  Punishment-Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  10. 10. 5) Punishment for publishing Digital Signature Certificate false in certain particulars (Section 73)-  Punishment- Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  11. 11. Amendments in Information Technology Act, 2008 The IT Amendment Bill 2008 has been passed by the Lok Sabha and the Rajya Sabha in the last week of December, 2008.  Different Sections-  Section 66B  Section 66C  Section 66E  Section 67A  Section 67B  Section 72A
  12. 12. Case Study • The Hyderabad case study. • Section 66D- Punishments for cheating by personation by using computer resource (Inserted Vide ITA 2008). • Punishment-Imprisonment of three years and shall also be liable to fine which may extend to one lakh rupees.
  13. 13. Cyber Crime Unlawful acts wherein the computer is either a tool or a target or both
  14. 14. What is Cyber Crime ??  Criminals can operate anonymously over the computer networks.  Hackers invade privacy.  Hackers destroy “property” in the form of computer files or records.  Hackers injure other computer users by destroying information systems.  Computer pirates steal intellectual property.
  15. 15. Financial Crimes  It includes cheating, credit card frauds, money laundering.
  16. 16. Cyber Pornography  It includes pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).
  17. 17. Web Jacking  This occurs when someone forcefully takes control of a website (by cracking the password and later changing it).
  18. 18.  Sale of illegal articles  Phishing  Online gambling  Email spoofing
  19. 19. Intellectual Property crimes- These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  20. 20. Cyber Criminals  Kids (age group (9-16 years)  Organized hacktivitsts  Disgruntled employees  Professional hackers
  21. 21. Case Study  Case study related to bank.  Case study related to cyber crime.
  22. 22. Cyber Crime in India
  23. 23. 4639 1.4 3 India online fraud intrusion or hacking malicious code harrassment
  24. 24. Reports registered by RBI for cyber fraud and the amount spent for the same
  25. 25. Distribution of targets
  26. 26. Global Cyber Crime
  27. 27. NASSCOM INITIATIVES  Global Trade Development  National Skills Registry for IT/ITES Professional (NSR- ITP)  Sector Skills Councils
  28. 28. NASSCOM FORUMS  Gaming Forum  BPO  Engineering Services  Remote Infrastructure Management
  29. 29. Conclusion  The fundamental approach of the Act is towards validating and legalising electronic and on-line transactions.  Awareness must be created.  It leaves various issues untouched  The Parliament must ensure that it keeps amending the law and enacting new laws  That there are no reliable statistics on the problem  India is amongst few of the countries in the world which have any legal framework for e-commerce and e-governance
  30. 30. Suggestions 1) Recruitment 2) Red Coding System 3) Training and Development 4) Domain 5) Vague Definations
  31. 31. Bibliography  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields
  32. 32.  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields
  33. 33. Thank You!!

×