SlideShare a Scribd company logo
1 of 18
PRESENTATION
ON
THE INFORMATION TECHNOLOGY
ACT,2000
MADE BY:-
SAHIL SHARMA
VIDHU ARORA
SUBMITTED TO:-
SALONI DEVI
CONTENT
1. INTRODUCTION
2. OBJECTIVE OF THE IT ACT
3. SCOPE AND APPLICATIONS
4. AMENDMENTS
5. DIGITAL SIGNATURE
 The Information Technology Act, 2000 is an Act of
the Indian Parliament notified on 17 October 2000.
 It is the primary law in India dealing with cybercrime
and electronic commerce.
 It is based on the United Nations Model Law on
Electronic Commerce 1996 (UNCITRAL Model)
recommended by the General Assembly of United
Nations by a resolution dated 30 January 1997.
Objectives of the IT Act
To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as “electronic commerce”
 To facilitate electronic filing of documents with
Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act ,1934
SCOPE AND APPLICATIONS
 (a) a negotiable instrument (Other than a cheque) as defined in
section 13 of the Negotiable Instruments Act, 1881;
 (b) a power-of-attorney as defined in section 1A of the Powers-of-
Attorney Act, 1882;
 (c) a trust as defined in section 3 of the Indian Trusts Act, 1882;
 (d) a will as defined in clause (h) of section 2 of the Indian
Succession Act, 1925 including any other testamentary disposition
 (e) any contract for the sale or conveyance of immovable property
or any interest in such property;
 (f) any such class of documents or transactions as may be notified
by the Central Government
AMENDMENTS
 A major amendment was made in 2008
 It introduced the Section 66A which penalised sending of
"offensive messages“
 It also introduced the Section 69, which gave authorities the
power of "interception or monitoring or decryption of any
information through any computer resource“
 It also introduced penalties for child porn, cyber terrorism
and voyeurism.
Digital Signatures
 The authentication to be affected by use of asymmetric
crypto system and hash function
 The private key and the public key are unique to the
subscriber and constitute functioning key pair
 Verification of electronic record possible
ELECTRONIC GOVERNANCE
 LEGAL RECOGNITION OF ELECTRONIC
RECORDS(SEC4)
 LEGAL RECOGNITION OF DIGITAL SIGNATURE(SEC 5)
 USE OF ELECTRONIC RECODS AND DIGITAL
SIGNATURE (SEC 6)
 RETNTION OF ELECTRONIC RECORDS(SEC 7)
 PUBLICATION OF RULES AND REGULATION (SEC 8)
 POWER TO MAKE RULES BY CENTRAL
GOVERNMENT(SEC10)
ATTRIBUTION, ACKNOWLEDGMENT
AND DISPATCH OF ELECTRONIC
RECORDS
 ATTRIBUTION OF ELECTRONIC RECORDS(SEC 11)
 ACKNOWLEDGEMENT OF RECEIPT(SEC 12)
 TIME AND PLACE OF DESPATCH AND RECEIPT OF
ELECTRONIC RECORD(SEC 13)
SECURE ELECTRONIC RECORDS AND
SECURE ELECTRONIC SIGNATURES
 SECURE ELECTRONIC RECORD(SEC 14)
 SPECIFIC ELECTRONIC SIGNATURE (SEC 15)
 SECURITY PROCEDURE AND PRACTICES (SEC 16)
REGULATION OF CERTIFYING AUTHORITIES
 APPOINTMENT OF CONTROLLER AND OTHER
OFFICERS (SEC 17)
 FUNCTIONS OF CONTROLLER(SEC 18)
 RECOGNITION OF FOREIGN CERTIFYING AUTHORITIES
(SEC 19)
 POWER TO DELEGATE(SEC27)
 POWER TO INVSTIGATE CONTRAVENTIONS(SEC28)
GRANTING LICENCE
 LICENCE TO ISSUE DIGITAL SIGNATURE CERTIFICATE(SEC 21)
 APPLICATION FOR LICENCE(SEC22)
 RENEWAL OF LICENCE(SEC23)
 PROCEDURE FOR GRANT OR REJECTION OF LICENSE(SEC 24)
 SUSPENSION OF LICENCE(SEC25)
 NOTICE OF SUSPENSION OR REVOCATION OF LICENCE(SEC 26)
 CERTIFYING AUTHORITY TO FOLLOW CERTAIN PROCEDURES(SEC30)
 CERTIFYING AUTHORITY TO ENSURE COMPLIANCE OF THE ACT (SEC31)
 DISPLAY OF LICENCE(SEC 32)
 SURRENDER OF LICENCE(SEC33)
 DISCLOSURE (SEC 34)
ELECTRONIC SIGNATURE
CERTIFICATES
 CERTIFYING TO ISSUE ELECTRONIC SIGNATURE
CERTIFICATE(SEC35)
 REPRESENTATIONS UPON ISSUANCE OF DIGITAL
SIGNATURE CERTIFICATE(SEC 36)
 SUSPENSION OF DIGITAL SIGNATURE CERTIFICATE (SEC
37)
 REVOCATION OF ELECTRONIC SIGNATURE
CERTIFICATE(SEC 38)
 NOTICE OF SUSPENSION OR REVOCATION(SEC 39)
DUTIES OF SUBSCRIBERS
 GENERATING KEY PAIRS (SEC 40)
 ACCEPTANCE OF DIGITAL SIGNATURE CERTIFICATE
(SEC41)
 CONTROL OF PRIVATE KEY(SEC 42)
PENALITIES COMPENSATION AND
ADJUDICATION
 PENALITY AND COMPENSATION FOR DAMAGE TO
COMPUTER, COMPUTER SYSTEM(SEC 43)
 PENALITY FOR FAILURE TO FURNISH
INFORMATION,RETURN(SEC 44)
 RESIDUARY PENALITY(SEC45)
 POWER TO ADJUDICATE(SEC 46)
 FACTORS TO BE TAKEN INTO ACCOUNT BY THE
ADJUDICATING OFFICER
OFFENCES
It act 2000
It act 2000

More Related Content

What's hot

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 

What's hot (20)

Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
E contract
E  contractE  contract
E contract
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 

Similar to It act 2000

It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 

Similar to It act 2000 (20)

The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
It act 2000
It act 2000It act 2000
It act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 

More from Vidhu Arora

More from Vidhu Arora (20)

Strategic control
Strategic controlStrategic control
Strategic control
 
hrd systems, processes, outcomes and organizational effectiveness
hrd systems, processes, outcomes and organizational effectiveness hrd systems, processes, outcomes and organizational effectiveness
hrd systems, processes, outcomes and organizational effectiveness
 
Machinery to resolve industrial dispute
Machinery to resolve industrial dispute Machinery to resolve industrial dispute
Machinery to resolve industrial dispute
 
Crm in retail industry
Crm in retail industryCrm in retail industry
Crm in retail industry
 
Confrontation meeting
Confrontation meetingConfrontation meeting
Confrontation meeting
 
MEDco pharmaceuticals manufacturing firm
MEDco pharmaceuticals manufacturing firm MEDco pharmaceuticals manufacturing firm
MEDco pharmaceuticals manufacturing firm
 
setting of price
setting of price setting of price
setting of price
 
Working capital financing
Working capital financingWorking capital financing
Working capital financing
 
Life position
Life positionLife position
Life position
 
Transactional analysis
Transactional analysis Transactional analysis
Transactional analysis
 
Johari window model
Johari window modelJohari window model
Johari window model
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Types of plans
Types of plansTypes of plans
Types of plans
 
Shop clues
Shop cluesShop clues
Shop clues
 
Organization culture
Organization cultureOrganization culture
Organization culture
 
advertisement report on nerolac - "Ghar ki suraksha yaani izzat ki suraksha"
advertisement report on nerolac - "Ghar ki suraksha yaani izzat ki suraksha"advertisement report on nerolac - "Ghar ki suraksha yaani izzat ki suraksha"
advertisement report on nerolac - "Ghar ki suraksha yaani izzat ki suraksha"
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 
Forms of business
Forms of businessForms of business
Forms of business
 
Debenture
DebentureDebenture
Debenture
 
Individual differences
Individual differencesIndividual differences
Individual differences
 

Recently uploaded

一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
ZurliaSoop
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
ss
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
e9733fc35af6
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
yogita9398
 
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxJudgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
SuneelSONU1
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
trryfxkn
 

Recently uploaded (20)

一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Common Legal Risks in Hiring and Firing Practices.pdf
Common Legal Risks in Hiring and Firing Practices.pdfCommon Legal Risks in Hiring and Firing Practices.pdf
Common Legal Risks in Hiring and Firing Practices.pdf
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxJudgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
 

It act 2000

  • 1. PRESENTATION ON THE INFORMATION TECHNOLOGY ACT,2000 MADE BY:- SAHIL SHARMA VIDHU ARORA SUBMITTED TO:- SALONI DEVI
  • 2. CONTENT 1. INTRODUCTION 2. OBJECTIVE OF THE IT ACT 3. SCOPE AND APPLICATIONS 4. AMENDMENTS 5. DIGITAL SIGNATURE
  • 3.  The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October 2000.  It is the primary law in India dealing with cybercrime and electronic commerce.  It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
  • 4. Objectives of the IT Act To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as “electronic commerce”  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 5. SCOPE AND APPLICATIONS  (a) a negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881;  (b) a power-of-attorney as defined in section 1A of the Powers-of- Attorney Act, 1882;  (c) a trust as defined in section 3 of the Indian Trusts Act, 1882;  (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition  (e) any contract for the sale or conveyance of immovable property or any interest in such property;  (f) any such class of documents or transactions as may be notified by the Central Government
  • 6. AMENDMENTS  A major amendment was made in 2008  It introduced the Section 66A which penalised sending of "offensive messages“  It also introduced the Section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource“  It also introduced penalties for child porn, cyber terrorism and voyeurism.
  • 7. Digital Signatures  The authentication to be affected by use of asymmetric crypto system and hash function  The private key and the public key are unique to the subscriber and constitute functioning key pair  Verification of electronic record possible
  • 8. ELECTRONIC GOVERNANCE  LEGAL RECOGNITION OF ELECTRONIC RECORDS(SEC4)  LEGAL RECOGNITION OF DIGITAL SIGNATURE(SEC 5)  USE OF ELECTRONIC RECODS AND DIGITAL SIGNATURE (SEC 6)  RETNTION OF ELECTRONIC RECORDS(SEC 7)  PUBLICATION OF RULES AND REGULATION (SEC 8)  POWER TO MAKE RULES BY CENTRAL GOVERNMENT(SEC10)
  • 9. ATTRIBUTION, ACKNOWLEDGMENT AND DISPATCH OF ELECTRONIC RECORDS  ATTRIBUTION OF ELECTRONIC RECORDS(SEC 11)  ACKNOWLEDGEMENT OF RECEIPT(SEC 12)  TIME AND PLACE OF DESPATCH AND RECEIPT OF ELECTRONIC RECORD(SEC 13)
  • 10. SECURE ELECTRONIC RECORDS AND SECURE ELECTRONIC SIGNATURES  SECURE ELECTRONIC RECORD(SEC 14)  SPECIFIC ELECTRONIC SIGNATURE (SEC 15)  SECURITY PROCEDURE AND PRACTICES (SEC 16)
  • 11. REGULATION OF CERTIFYING AUTHORITIES  APPOINTMENT OF CONTROLLER AND OTHER OFFICERS (SEC 17)  FUNCTIONS OF CONTROLLER(SEC 18)  RECOGNITION OF FOREIGN CERTIFYING AUTHORITIES (SEC 19)  POWER TO DELEGATE(SEC27)  POWER TO INVSTIGATE CONTRAVENTIONS(SEC28)
  • 12. GRANTING LICENCE  LICENCE TO ISSUE DIGITAL SIGNATURE CERTIFICATE(SEC 21)  APPLICATION FOR LICENCE(SEC22)  RENEWAL OF LICENCE(SEC23)  PROCEDURE FOR GRANT OR REJECTION OF LICENSE(SEC 24)  SUSPENSION OF LICENCE(SEC25)  NOTICE OF SUSPENSION OR REVOCATION OF LICENCE(SEC 26)  CERTIFYING AUTHORITY TO FOLLOW CERTAIN PROCEDURES(SEC30)  CERTIFYING AUTHORITY TO ENSURE COMPLIANCE OF THE ACT (SEC31)  DISPLAY OF LICENCE(SEC 32)  SURRENDER OF LICENCE(SEC33)  DISCLOSURE (SEC 34)
  • 13. ELECTRONIC SIGNATURE CERTIFICATES  CERTIFYING TO ISSUE ELECTRONIC SIGNATURE CERTIFICATE(SEC35)  REPRESENTATIONS UPON ISSUANCE OF DIGITAL SIGNATURE CERTIFICATE(SEC 36)  SUSPENSION OF DIGITAL SIGNATURE CERTIFICATE (SEC 37)  REVOCATION OF ELECTRONIC SIGNATURE CERTIFICATE(SEC 38)  NOTICE OF SUSPENSION OR REVOCATION(SEC 39)
  • 14. DUTIES OF SUBSCRIBERS  GENERATING KEY PAIRS (SEC 40)  ACCEPTANCE OF DIGITAL SIGNATURE CERTIFICATE (SEC41)  CONTROL OF PRIVATE KEY(SEC 42)
  • 15. PENALITIES COMPENSATION AND ADJUDICATION  PENALITY AND COMPENSATION FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM(SEC 43)  PENALITY FOR FAILURE TO FURNISH INFORMATION,RETURN(SEC 44)  RESIDUARY PENALITY(SEC45)  POWER TO ADJUDICATE(SEC 46)  FACTORS TO BE TAKEN INTO ACCOUNT BY THE ADJUDICATING OFFICER