4. INTRODUCTION
Bill was passed in the budget session of
2000
And signed by President K.R Narayan on
9th May 2000
The bill was finalized by group of offices
headed by Minister Of Information
Technology Pramod Mahajan
5. IT ACT 66: HACKING WITH COMPUTER
Hacking: It is the practice of
modifying the features of a
system in order to accomplish a
goal outside of the creators
original purpose.
Computer Hacking: It is the
practice of modifying computer
hardware and software to
accomplish a goal outside of
creators original purpose.
Example:
6. EFFECTS OF HACKING
• Damage to information
• Theft of information
• Business secrets could be
stolen sold to competitors
• Compromise/damage of
systems
7. IT ACT 66E: PUBLISHING PRIVATE IMAGES
Intentionally or knowingly
captures, publishes or
transmits the images.
Under circumstances
violating the privacy of that
person
Imprisonment - three
years or with fine not
exceeding two lakh rupees,
or both.
8. For the purpose of this Section:
1. Transmit
2. Capture
3. Private Area
4. Publishes
5. Under Circumstances Violating Privacy
I. He or she could disrobe in privacy,
without being concerned that an image
of his private area was being captured.
II. Any part of his or her private area would
not be visible to the public.
9. SECTION 66C
PUNISHMENT FOR IDENTITY THEFT
Phishing email – Disguises - as the real banker and
uses the unique identifying feature of the bank or
organization , say Logo, trademark etc.
Fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification
feature
Imprisonment - 3 years
Rupees one lakh!
10. CASE STUDY
* 2007-The CEO - Identity theft protection
company, Lifelock, Todd Davis’s
* Social security number was exposed by Matt
Lauer on NBC’s Today Show.
* $500 cash advance loan.
* 4 months later-Albany,Georgia
11. 67 C: PRESERVATION & RETENTION OF
INFORMATION BY INTERMEDIARIES
Preserve information .
Duration .
Central government prescribe .
5 year .
10 lakh rupee .