PRESENTED BY
ABIRAMI. ABEL.
CYBER LAW
CYBER CRIME
crime
computer
CYBER LAW
 a combination of
 crime and computer.
 To put it in simple terms ‘any offence
or crime in which a computer i...
REASONS BEHIND IT ACT
 E-commerce industry
 e-mail
 Digital signatures and digital records
 e-governance.
IT ACT 2000
 The Information Technology Act, 2000, was thus
passed as the Act No.21 of 2000, got President
assent on 9 Ju...
Reasonable Security Practices
 Site certification
 Security initiatives
 Awareness Training
 Conformance to Standards,...
Some of the K ey highlights of the
ITAA are as follows
 Focusing on data privacy
 Focusing on Information Security
 Def...
The Act essentially deals with the
following issues
 Legal Recognition of Electronic
Documents - email
 Legal Recognitio...
Observations on ITA
 Awareness
 Evidences
 Non coverage of many crimes
 Jurisdiction
Cyber law
Upcoming SlideShare
Loading in …5
×

Cyber law

477 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
477
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
26
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber law

  1. 1. PRESENTED BY ABIRAMI. ABEL. CYBER LAW
  2. 2. CYBER CRIME crime computer
  3. 3. CYBER LAW  a combination of  crime and computer.  To put it in simple terms ‘any offence or crime in which a computer is used is called cyber crime
  4. 4. REASONS BEHIND IT ACT  E-commerce industry  e-mail  Digital signatures and digital records  e-governance.
  5. 5. IT ACT 2000  The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000, got President assent on 9 June and was made effective from 17 October 2000.  The Act totally has 13 chapters and 90 sections  four Acts namely  The Indian Penal Code 1860,  The Indian Evidence Act 1872,  The Bankers’ Books Evidence Act 1891 and • The Reserve Bank of India Act 1934).
  6. 6. Reasonable Security Practices  Site certification  Security initiatives  Awareness Training  Conformance to Standards, certification  Policies and adherence to policies  Policies like password policy, Access  Control, email Policy etc  Periodic monitoring and review.
  7. 7. Some of the K ey highlights of the ITAA are as follows  Focusing on data privacy  Focusing on Information Security  Defining cyber café  Making digital signature technology neutral  Defining reasonable security practices to be followed by corporate  Inclusion of some additional cyber crimes like child pornography and cyber terrorism
  8. 8. The Act essentially deals with the following issues  Legal Recognition of Electronic Documents - email  Legal Recognition of Digital Signatures  e-governance  To facilitate EFT between the financial institutions and banks
  9. 9. Observations on ITA  Awareness  Evidences  Non coverage of many crimes  Jurisdiction

×