SlideShare a Scribd company logo
1 of 15
Information Technology Act,
2000.
PREPARE BY:-
PARTH PATEL 190617200231
YAKSH PATEL 190617200232
PRESENTED TO:-
MRS.PRANALI LOLIYANA
LAB :- Legal Aspects of Business
Operations Management
INTRODUCTION
The Information Technology Act, 2000 (IT Act) was passed which
is based on the UNCITRAL Model Law on Electronic Commerce.
The IT Act deals with the following subjects:
(i) Secure electronic transactions to facilitate e-commerce
(ii) attribution of electronic messages
(iii) legal status to electronic signature and electronic records by
providing for the appointment of a Controller of Certifying Authority.
 INFORMATION TECHNOLOGY ACT 2000, IS BASED ON UNCITRAL (united
nations commission on international trade law) model law.
IT act 2000, has 13 chapters, 94 sections and 4 schedules.
First 14 section deals with some legal aspects concerning digital signature.
Further other section deal with certifying authorities who are licensed to issue digital
signature certificate.
Sections 43 to 47 provide for penalties and compensation.
Section 48 to 64 deals with tribunal appeal to high court.
Section 65 to 79 deals with offences,
Section 80 to 94 deals with miscellaneous of the act.
INTRODUCTION
Objective Of the Act
 Protection of Critical Information Infrastructure is pivotal to national security,
economy, public health and safety, so it has become necessary to declare such
infrastructure as a protected system so as to restrict its access.
 A rapid increase in the use of computer and internet has given rise to new
forms of crimes like publishing sexually explicit materials in electronic form,
leakage of confidentiality data, e-commerce frauds, identity theft, offensive
messages and many more. So, penal provisions are required.
The service providers may be authorized by the Central Government or the
State Government to set up, maintain and upgrade the computerized facilities.
Scope of the act
 To provide legal recognition for transactions carried out by means
of electronic data interchange and other means of electronic
communication, commonly referred to as “electronic commerce”
To facilitate electronic filing of documents with the government
agencies;
 To facilitate electronic storage of data in place of paper-based
methods of storage of data.
Section 66 : Hacking with computer system
If a person knowingly or intentionally conceals or destroys any computer source code used for
a computer, computer system or computer network, when the computer source code is required
to be kept or maintained by law for the time being in force.
Penalty :- Imprisonment up to three years, or/and with fine up to RS2,00,000
Section 65 : Tampering with computer source documents
 If a person with the intent to cause or knowing that he is likely to cause wrongful loss or
damage by destroys or deletes any information residing in a computer by any means, commits
hack.
Penalty :- Imprisonment up to three years, or/and with fine up to 500,000.
Cyber crimes and remedies Cover under the ACT
Any person who sends any information that is grossly offensive or has a menacing character.
Penalty :- Imprisonment up to three years, with fine.
Section 66A : Publishing offensive, false or threatening information
Section 66C : Using password of another person
A person fraudulently uses the password, digital signature or other
unique identification of another person.
Penalty :- Imprisonment up to three years, or/and with fine up to 100,000
Section 66D: Cheating using computer resource
If a person cheats someone.
Penalty :- Imprisonment up to three years, or/and with fine up to 100,000
Cyber crimes and remedies Cover under the ACT
Penalty :- Imprisonment up to five years, or/and with fine up
to 1,000,000.
Section 67 : Publishing information which is obscene in electronic form.
Section 67A : Publishing images containing
sexual acts
Penalty :- Imprisonment up to seven years, or/and with
fine up to 10,00,000.
Section 67B : Publishing child porn or predating children online
Penalty :- Imprisonment up to five years, or/and with fine up to 1,000,000 on first conviction.
Imprisonment up to seven years, or/and with fine up to 1,000,000 on second conviction.
Cyber crimes and remedies Cover under the ACT
Other Section:
 68 Failure/refusal to comply with orders
 69 Failure/refusal to decrypt data
 70 Securing access or attempting to secure access to a protected system
 71 Misrepresentation
Many more…
Penalty:- Imprisonment up to seven to
ten years and possible fine.
Cyber crimes and remedies Cover under the ACT
DIGITAL SIGNATURE
1. Any subscriber may authenticate an electronic record by affixing his digital
signature.
2. The authentication of the electronic record shall be effected by the use of
asymmetric crypto system and hash function which envelop and transform the
initial electronic record into another electronic record.
3. Any person by the use of a public key of the subscriber can verify the electronic
record.
4. The private key and the public key are unique to the subscriber and constitute a
functioning key pair.
ELECTRONIC GOVERNANCE
 Legal Recognition of Electronic Records (section: 4).
 Legal Recognition of Digital Signatures (Section: 5).
 Use of Electronic Record and Digital Signatures in Government and its Agencies
(section: 6).
 Retention of Electronic Records (section: 7).
 Publication of Rule, Regulation, etc., in Electronic Gazette (section: 8).
 No Right Conferred to Insist that Document should be Accepted in Electronic form
(Section: 9).
 Power to make Rules by Central Government in Respect of Digital Signature
(section: 10).
Controlling and CERTIFYING AUTHORITIES
Appointment of Controller and other officers (s.
17).
 Functions of Controller (s.18).
 Recognition of Foreign Certifying Authorities
(s.19).
 Controller to act as Repository (s.20).
 License to Issue Digital Signature Certificates
(s.21).
 Application for License (s.22).
 Renewal of License (s.23).
 Procedure for Grant or Rejection of License (s.24).
 Suspension of License (s.25).
 Notice of Suspension of Revocation of License
(s.26).
 Power to Delegate (s.27).
 Power to Investigate Contravention (s.28).
 Access to Computers and Data (s.29).
 Certifying Authority to follow Certain Procedures
(s.30).
 Certifying Authority to Ensure Compliance of the
Act, etc. (s.31).
 Display of License (s.32).
Cyber Regulations Appellate
Tribunal
Establishment of Cyber Appellate
Tribunal (s. 48).
Composition of Cyber Appellate
Tribunal (s. 49).
Qualifications for Appointment as
Presiding Officer of the Tribunal (s.50).
Term Office (s.51).
Salary, Allowances and other Terms
and Conditions of Service of Presiding
Officer (s.52).
Filling up of Vacancies (s.53).
Resignation and Removal (s.54).
Orders Constituting Appellate Tribunal
to be Final and not to invalidate its
proceedings (s.55).
Staff of the Cyber Appellate Tribunal
(s.56).
 Many More.
REFERENCES
Legal Aspects of Business author Prof. Akhilesh Pathak & published by Tata Mc Graw Hill latest
Edition.
http://kanoon.nearlaw.com/2017/10/28/information-technology-act-2000/
https://www.wipo.int/edocs/lexdocs/laws/en/in/in024en.pdf
https://www.slideshare.net/akashvaraiya7/information-technology-act-2000-15204037

More Related Content

What's hot

Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 

What's hot (20)

Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 

Similar to Information technology ACT - 2000 (Legal Aspect of Business)

IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdfnithyam40
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information technology act
Information technology actInformation technology act
Information technology actDeepthiPrabhu9
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Ashish Karan
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 

Similar to Information technology ACT - 2000 (Legal Aspect of Business) (20)

IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Information technology ACT - 2000 (Legal Aspect of Business)

  • 1. Information Technology Act, 2000. PREPARE BY:- PARTH PATEL 190617200231 YAKSH PATEL 190617200232 PRESENTED TO:- MRS.PRANALI LOLIYANA LAB :- Legal Aspects of Business Operations Management
  • 2. INTRODUCTION The Information Technology Act, 2000 (IT Act) was passed which is based on the UNCITRAL Model Law on Electronic Commerce. The IT Act deals with the following subjects: (i) Secure electronic transactions to facilitate e-commerce (ii) attribution of electronic messages (iii) legal status to electronic signature and electronic records by providing for the appointment of a Controller of Certifying Authority.
  • 3.  INFORMATION TECHNOLOGY ACT 2000, IS BASED ON UNCITRAL (united nations commission on international trade law) model law. IT act 2000, has 13 chapters, 94 sections and 4 schedules. First 14 section deals with some legal aspects concerning digital signature. Further other section deal with certifying authorities who are licensed to issue digital signature certificate. Sections 43 to 47 provide for penalties and compensation. Section 48 to 64 deals with tribunal appeal to high court. Section 65 to 79 deals with offences, Section 80 to 94 deals with miscellaneous of the act. INTRODUCTION
  • 4. Objective Of the Act  Protection of Critical Information Infrastructure is pivotal to national security, economy, public health and safety, so it has become necessary to declare such infrastructure as a protected system so as to restrict its access.  A rapid increase in the use of computer and internet has given rise to new forms of crimes like publishing sexually explicit materials in electronic form, leakage of confidentiality data, e-commerce frauds, identity theft, offensive messages and many more. So, penal provisions are required. The service providers may be authorized by the Central Government or the State Government to set up, maintain and upgrade the computerized facilities.
  • 5. Scope of the act  To provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce” To facilitate electronic filing of documents with the government agencies;  To facilitate electronic storage of data in place of paper-based methods of storage of data.
  • 6. Section 66 : Hacking with computer system If a person knowingly or intentionally conceals or destroys any computer source code used for a computer, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. Penalty :- Imprisonment up to three years, or/and with fine up to RS2,00,000 Section 65 : Tampering with computer source documents  If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage by destroys or deletes any information residing in a computer by any means, commits hack. Penalty :- Imprisonment up to three years, or/and with fine up to 500,000. Cyber crimes and remedies Cover under the ACT
  • 7. Any person who sends any information that is grossly offensive or has a menacing character. Penalty :- Imprisonment up to three years, with fine. Section 66A : Publishing offensive, false or threatening information Section 66C : Using password of another person A person fraudulently uses the password, digital signature or other unique identification of another person. Penalty :- Imprisonment up to three years, or/and with fine up to 100,000 Section 66D: Cheating using computer resource If a person cheats someone. Penalty :- Imprisonment up to three years, or/and with fine up to 100,000 Cyber crimes and remedies Cover under the ACT
  • 8. Penalty :- Imprisonment up to five years, or/and with fine up to 1,000,000. Section 67 : Publishing information which is obscene in electronic form. Section 67A : Publishing images containing sexual acts Penalty :- Imprisonment up to seven years, or/and with fine up to 10,00,000. Section 67B : Publishing child porn or predating children online Penalty :- Imprisonment up to five years, or/and with fine up to 1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to 1,000,000 on second conviction. Cyber crimes and remedies Cover under the ACT
  • 9. Other Section:  68 Failure/refusal to comply with orders  69 Failure/refusal to decrypt data  70 Securing access or attempting to secure access to a protected system  71 Misrepresentation Many more… Penalty:- Imprisonment up to seven to ten years and possible fine. Cyber crimes and remedies Cover under the ACT
  • 10. DIGITAL SIGNATURE 1. Any subscriber may authenticate an electronic record by affixing his digital signature. 2. The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. 3. Any person by the use of a public key of the subscriber can verify the electronic record. 4. The private key and the public key are unique to the subscriber and constitute a functioning key pair.
  • 11. ELECTRONIC GOVERNANCE  Legal Recognition of Electronic Records (section: 4).  Legal Recognition of Digital Signatures (Section: 5).  Use of Electronic Record and Digital Signatures in Government and its Agencies (section: 6).  Retention of Electronic Records (section: 7).  Publication of Rule, Regulation, etc., in Electronic Gazette (section: 8).  No Right Conferred to Insist that Document should be Accepted in Electronic form (Section: 9).  Power to make Rules by Central Government in Respect of Digital Signature (section: 10).
  • 12. Controlling and CERTIFYING AUTHORITIES Appointment of Controller and other officers (s. 17).  Functions of Controller (s.18).  Recognition of Foreign Certifying Authorities (s.19).  Controller to act as Repository (s.20).  License to Issue Digital Signature Certificates (s.21).  Application for License (s.22).  Renewal of License (s.23).  Procedure for Grant or Rejection of License (s.24).  Suspension of License (s.25).  Notice of Suspension of Revocation of License (s.26).  Power to Delegate (s.27).  Power to Investigate Contravention (s.28).  Access to Computers and Data (s.29).  Certifying Authority to follow Certain Procedures (s.30).  Certifying Authority to Ensure Compliance of the Act, etc. (s.31).  Display of License (s.32).
  • 13. Cyber Regulations Appellate Tribunal Establishment of Cyber Appellate Tribunal (s. 48). Composition of Cyber Appellate Tribunal (s. 49). Qualifications for Appointment as Presiding Officer of the Tribunal (s.50). Term Office (s.51). Salary, Allowances and other Terms and Conditions of Service of Presiding Officer (s.52). Filling up of Vacancies (s.53). Resignation and Removal (s.54). Orders Constituting Appellate Tribunal to be Final and not to invalidate its proceedings (s.55). Staff of the Cyber Appellate Tribunal (s.56).  Many More.
  • 14.
  • 15. REFERENCES Legal Aspects of Business author Prof. Akhilesh Pathak & published by Tata Mc Graw Hill latest Edition. http://kanoon.nearlaw.com/2017/10/28/information-technology-act-2000/ https://www.wipo.int/edocs/lexdocs/laws/en/in/in024en.pdf https://www.slideshare.net/akashvaraiya7/information-technology-act-2000-15204037