A Critique of the Proposed National Education Policy Reform
IT Act
1. IT ACT
Submitted to – Dr. Neelkamal
Submitted to- Dr. Neelkamal
Submitted by- Nitesh Bhatiya
Roll.no-1323
Class-M.sc Forensic Science
2. INTRODUCTION
• IT Act based on UNICITRAL Model
• United Nation Model Law On Electronic Commerce,1996
• Passed on 30 june 1997 in UN General Assembly
• President K.R Narayana signed on IT act on 9 May 2000
• IT Act 2000 implemented in India on 17oct 2000
• IT Act(Amendment)2008-Pass out on oct 2009
• Administration-CERTin(Indian computer Emergency
Response Team)
• Cyber crime investigation cell,Mumbai on 18Dec,2000
• India`s first Cyber Crime Police Station in Bengaluru on 30
Aug 2001.
3. OBJECTIVES OF IT ACT
• To provide legal recognition for transaction:-
• Carried out by means of electronic data interchange ,
and other means of electronic communication
,commonly referred to as Electronic Commerce.
• To facilitate electronic filling of documents with
Government agencies and E-payments
• To amend the Indian Penal Code , Indian Evidence Act
1872,the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act,1934
• Aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other
activities carried out by electronic means.
7. CYBER CRIME
• Any criminal activity that uses a computer either
as an instrumentality, target or a means for
perpetuating further crimes comes within the
ambit of cyber crime.
• Cybercrime can be against individuals, individual
properties, organisation and society.
• Types:-
• Via computers:- Cyber terrorism , credit card
frauds
• Computers as target:- Hacking, virus attack
9. Against Individual Property:-
• Computer vandalism
• Transmitting virus
• Netrespass
• Unauthorized control/access over computer
system.
• Internet thefts
10. Against Organization:-
Unauthorized control/access over
computer system
Possession of unauthorized
information.
Cyber terrorism against the
government organisation.
Distribution of pirated software etc.
11.
12. SIM Swap Fraud
• In August 2018, two men from Navi Mumbai
were arrested for cybercrime . They were
involved in fraudulent activities concerning
money transfers from the bank accounts of
numerous individuals by getting their SIM card
information through illegal means.
• These fraudsters were getting the details of
people and were later blocking their SIM cards
with the help of fake documents post which they
were carrying out transactions through online
banking.
13. • They were accused of transferring 4 crore
Indian Rupees effectively from various
accounts . They even dared to hack the
accounts of a couple of companies.
14.
15. CYBER ATTACK ON COSMOS
BANK
• A daring cyber attack was carried in August 2018
on Cosmos Bank’s Pune branch which saw nearly
94 crores rupees being siphoned off.
• Hackers wiped out money and transferred it to a
Hong Kong situated bank by hacking the server of
Cosmos Bank.
• A case was filed by cosmos bank with pune cyber
cell for the cyber attack. Hackers hacked into the
ATM server of the bank and stole details of many
visa and rupee debit card owners.
16.
17. Cyber crimes under the IT Act
• Tampering with computer source documents –
Sec.65
• Hacking with computer systems,Data
alteration-Sec.66
• Publishing obscene information-Sec67
• Publishing false digital signature certificate –
Sec.73
18. NASSCOM
• National Association of Software And Services
Companies
• Trade association of Indian information Technology and
BPO (Business Process Outsourcing) industry.
• Premier trade body and the chamber of commerce of
the IT-BPO industries in India.
• More than 1200 members.
• Setup in 1988 to facilitate business and trade in
software services.
• Non profit organisation.
19. OBJECTIVES
• Formulating National IT Policies with specific
focus on IT software and service.
• Maintaining a state of the art information
database of IT software and service related
activities.
• Forum to explore vast potentials.
• Work actively with overseas Government ,
Embassies.
20. Our suggestion
• A broad and inclusive focus is necessary to protect the
IT services.
• Strategies and Alert mechanism against cyber attacks
• Creating a global culture of cyber security.
• International co operation at all levels should be
developed further.
• New recruitment to ensure a sizeable team to combat
cyber crime
• Law enforcement officials need to be trained for
effective enforcement.