SlideShare a Scribd company logo
1 of 21
IT ACT
Submitted to – Dr. Neelkamal
Submitted to- Dr. Neelkamal
Submitted by- Nitesh Bhatiya
Roll.no-1323
Class-M.sc Forensic Science
INTRODUCTION
• IT Act based on UNICITRAL Model
• United Nation Model Law On Electronic Commerce,1996
• Passed on 30 june 1997 in UN General Assembly
• President K.R Narayana signed on IT act on 9 May 2000
• IT Act 2000 implemented in India on 17oct 2000
• IT Act(Amendment)2008-Pass out on oct 2009
• Administration-CERTin(Indian computer Emergency
Response Team)
• Cyber crime investigation cell,Mumbai on 18Dec,2000
• India`s first Cyber Crime Police Station in Bengaluru on 30
Aug 2001.
OBJECTIVES OF IT ACT
• To provide legal recognition for transaction:-
• Carried out by means of electronic data interchange ,
and other means of electronic communication
,commonly referred to as Electronic Commerce.
• To facilitate electronic filling of documents with
Government agencies and E-payments
• To amend the Indian Penal Code , Indian Evidence Act
1872,the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act,1934
• Aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other
activities carried out by electronic means.
AMENDMENTS
CYBER CRIME
• Any criminal activity that uses a computer either
as an instrumentality, target or a means for
perpetuating further crimes comes within the
ambit of cyber crime.
• Cybercrime can be against individuals, individual
properties, organisation and society.
• Types:-
• Via computers:- Cyber terrorism , credit card
frauds
• Computers as target:- Hacking, virus attack
CLASSIFICATION
Against Individuals:-
• Harassment via e-mails
• Cyber-stalking
• Unauthorized control/access over computer
system.
• Email spoofing
• Cheating and fraud
Against Individual Property:-
• Computer vandalism
• Transmitting virus
• Netrespass
• Unauthorized control/access over computer
system.
• Internet thefts
Against Organization:-
 Unauthorized control/access over
computer system
 Possession of unauthorized
information.
 Cyber terrorism against the
government organisation.
 Distribution of pirated software etc.
SIM Swap Fraud
• In August 2018, two men from Navi Mumbai
were arrested for cybercrime . They were
involved in fraudulent activities concerning
money transfers from the bank accounts of
numerous individuals by getting their SIM card
information through illegal means.
• These fraudsters were getting the details of
people and were later blocking their SIM cards
with the help of fake documents post which they
were carrying out transactions through online
banking.
• They were accused of transferring 4 crore
Indian Rupees effectively from various
accounts . They even dared to hack the
accounts of a couple of companies.
CYBER ATTACK ON COSMOS
BANK
• A daring cyber attack was carried in August 2018
on Cosmos Bank’s Pune branch which saw nearly
94 crores rupees being siphoned off.
• Hackers wiped out money and transferred it to a
Hong Kong situated bank by hacking the server of
Cosmos Bank.
• A case was filed by cosmos bank with pune cyber
cell for the cyber attack. Hackers hacked into the
ATM server of the bank and stole details of many
visa and rupee debit card owners.
Cyber crimes under the IT Act
• Tampering with computer source documents –
Sec.65
• Hacking with computer systems,Data
alteration-Sec.66
• Publishing obscene information-Sec67
• Publishing false digital signature certificate –
Sec.73
NASSCOM
• National Association of Software And Services
Companies
• Trade association of Indian information Technology and
BPO (Business Process Outsourcing) industry.
• Premier trade body and the chamber of commerce of
the IT-BPO industries in India.
• More than 1200 members.
• Setup in 1988 to facilitate business and trade in
software services.
• Non profit organisation.
OBJECTIVES
• Formulating National IT Policies with specific
focus on IT software and service.
• Maintaining a state of the art information
database of IT software and service related
activities.
• Forum to explore vast potentials.
• Work actively with overseas Government ,
Embassies.
Our suggestion
• A broad and inclusive focus is necessary to protect the
IT services.
• Strategies and Alert mechanism against cyber attacks
• Creating a global culture of cyber security.
• International co operation at all levels should be
developed further.
• New recruitment to ensure a sizeable team to combat
cyber crime
• Law enforcement officials need to be trained for
effective enforcement.
Thank you

More Related Content

What's hot

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 

What's hot (20)

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
It act 2000
It act 2000It act 2000
It act 2000
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
it act
it actit act
it act
 

Similar to IT Act

138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxHetaDesai13
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final79850
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRajeswari Anand
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaajRudroju
 

Similar to IT Act (20)

IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Pre itact
Pre itactPre itact
Pre itact
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 

More from Nitesh Bhatia

Phenolphthalein in trap cases
Phenolphthalein in trap casesPhenolphthalein in trap cases
Phenolphthalein in trap casesNitesh Bhatia
 
Human decomposition and insect succession
Human decomposition and insect successionHuman decomposition and insect succession
Human decomposition and insect successionNitesh Bhatia
 
Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Nitesh Bhatia
 

More from Nitesh Bhatia (7)

Phenolphthalein in trap cases
Phenolphthalein in trap casesPhenolphthalein in trap cases
Phenolphthalein in trap cases
 
Human decomposition and insect succession
Human decomposition and insect successionHuman decomposition and insect succession
Human decomposition and insect succession
 
Polarography[1]
Polarography[1]Polarography[1]
Polarography[1]
 
Drug of Abuse
Drug of AbuseDrug of Abuse
Drug of Abuse
 
Compound microscope
Compound microscopeCompound microscope
Compound microscope
 
Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)
 
Asphyxial deaths
Asphyxial deathsAsphyxial deaths
Asphyxial deaths
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

IT Act

  • 1. IT ACT Submitted to – Dr. Neelkamal Submitted to- Dr. Neelkamal Submitted by- Nitesh Bhatiya Roll.no-1323 Class-M.sc Forensic Science
  • 2. INTRODUCTION • IT Act based on UNICITRAL Model • United Nation Model Law On Electronic Commerce,1996 • Passed on 30 june 1997 in UN General Assembly • President K.R Narayana signed on IT act on 9 May 2000 • IT Act 2000 implemented in India on 17oct 2000 • IT Act(Amendment)2008-Pass out on oct 2009 • Administration-CERTin(Indian computer Emergency Response Team) • Cyber crime investigation cell,Mumbai on 18Dec,2000 • India`s first Cyber Crime Police Station in Bengaluru on 30 Aug 2001.
  • 3. OBJECTIVES OF IT ACT • To provide legal recognition for transaction:- • Carried out by means of electronic data interchange , and other means of electronic communication ,commonly referred to as Electronic Commerce. • To facilitate electronic filling of documents with Government agencies and E-payments • To amend the Indian Penal Code , Indian Evidence Act 1872,the Banker’s Books Evidence Act 1891,Reserve Bank of India Act,1934 • Aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.
  • 5.
  • 6.
  • 7. CYBER CRIME • Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime. • Cybercrime can be against individuals, individual properties, organisation and society. • Types:- • Via computers:- Cyber terrorism , credit card frauds • Computers as target:- Hacking, virus attack
  • 8. CLASSIFICATION Against Individuals:- • Harassment via e-mails • Cyber-stalking • Unauthorized control/access over computer system. • Email spoofing • Cheating and fraud
  • 9. Against Individual Property:- • Computer vandalism • Transmitting virus • Netrespass • Unauthorized control/access over computer system. • Internet thefts
  • 10. Against Organization:-  Unauthorized control/access over computer system  Possession of unauthorized information.  Cyber terrorism against the government organisation.  Distribution of pirated software etc.
  • 11.
  • 12. SIM Swap Fraud • In August 2018, two men from Navi Mumbai were arrested for cybercrime . They were involved in fraudulent activities concerning money transfers from the bank accounts of numerous individuals by getting their SIM card information through illegal means. • These fraudsters were getting the details of people and were later blocking their SIM cards with the help of fake documents post which they were carrying out transactions through online banking.
  • 13. • They were accused of transferring 4 crore Indian Rupees effectively from various accounts . They even dared to hack the accounts of a couple of companies.
  • 14.
  • 15. CYBER ATTACK ON COSMOS BANK • A daring cyber attack was carried in August 2018 on Cosmos Bank’s Pune branch which saw nearly 94 crores rupees being siphoned off. • Hackers wiped out money and transferred it to a Hong Kong situated bank by hacking the server of Cosmos Bank. • A case was filed by cosmos bank with pune cyber cell for the cyber attack. Hackers hacked into the ATM server of the bank and stole details of many visa and rupee debit card owners.
  • 16.
  • 17. Cyber crimes under the IT Act • Tampering with computer source documents – Sec.65 • Hacking with computer systems,Data alteration-Sec.66 • Publishing obscene information-Sec67 • Publishing false digital signature certificate – Sec.73
  • 18. NASSCOM • National Association of Software And Services Companies • Trade association of Indian information Technology and BPO (Business Process Outsourcing) industry. • Premier trade body and the chamber of commerce of the IT-BPO industries in India. • More than 1200 members. • Setup in 1988 to facilitate business and trade in software services. • Non profit organisation.
  • 19. OBJECTIVES • Formulating National IT Policies with specific focus on IT software and service. • Maintaining a state of the art information database of IT software and service related activities. • Forum to explore vast potentials. • Work actively with overseas Government , Embassies.
  • 20. Our suggestion • A broad and inclusive focus is necessary to protect the IT services. • Strategies and Alert mechanism against cyber attacks • Creating a global culture of cyber security. • International co operation at all levels should be developed further. • New recruitment to ensure a sizeable team to combat cyber crime • Law enforcement officials need to be trained for effective enforcement.