In order to keep Information Technology safe tool to use the Indian Government passed Information Technology Act and subsequently did necessary amendments in it. The Law efficiently deals with the offences done inside the country. Because of this act many culprits have been convicted. It has given a robust protection to Information Technology within the country but however it still falls short when compared with many other nations to defend its systems aggressively from cyber terrorists.
3. Accord legal sanctity to electronic records
Provide legal recognition of electronic
records, e-transactions, digital signature etc.
Facilitate e-governance
Establish a regulatory body supervising
certifying authorities
Amend IPC, 1860, Indian Evidence Act, 1872 , RBI
Act, 1934 & Banker’s Books Evidence Act, 1891
4. Increasing use of
ICTs in
conducting
business
transactions
Adoption of
model law by
UNICTRAL
WTO likely to
conduct
transactions
only in
electronic
medium
Reasons
for
enactment
of IT act
No legal
protection
under the
existing laws
Growing
international
trade through
electronic
means
6. Functions:
Authentication & verification of electronic records by use of asymmetric
crypto system and hash function
Identify the sender
Make contents of the document binding on person putting digital
signature.
7.
8.
Various methods by which one can sign an electronic record.
Electronic sound, symbol, or process
Example: Typed name or a digitized image of a handwritten signature.
Legalized as valid mode of signature in ITAA 2008
9.
Application of ICTs to the processes of government functioning
Government at your fingertips
4 basic models are G to C, G to E, G to G and G to B.
Example: Railway ticket booking, Gramdoot (Rajasthan)
10.
Trusted body who has been granted a license to issue Digital Signature
Certificates.
Function equivalent to that of the passport issuing office in the
Government
11.
12.
Unlawful acts where computer is either a tool or target or both
It includes pornography, e-mail, spoofing, forgery, cyber defamation, cyber
stalking, e-mail bombing etc.
13. HACKING
• Gaining unauthorized access to a
computer system
• Trespassing any computer
PHISHING
• Fraudulently acquiring sensitive
information by camouflaging as a
trustworthy person
• Example:Congratulations you have
won $100,00,000
14. 1. Number of Cyber Crimes recorded in India in last 5 years:
3500
3000
2500
2000
1500
2876
1000
1791
500
0
966
288
420
2008
2009
965
2010
2011
2012
2013
15. 2. State wise count of the cyber-crime in 2012:
500
400
300
200
100
0
429
471
412
269
205
17. SECTION 43.
Penalty and Compensation for damage to computer, computer system, etc:
Penalty:Pay damages by way of compensation not exceeding 1 crore rupees
to the person so affected.
SECTION 43(A).
Compensation for failure to protect data:
Penalty: Pay damages by way of compensation, not exceeding five crore
rupees, to the person so affected.
Example:
Pune Citibank Mphasis BPO Fraud: 2005
18. SECTION 65.
Tampering with Computer Source Documents
Penalties: Imprisonment up to three years, or with fine which may extend up
to two lakh rupees, or with both
Example:
Syed Asifuddin Vs. The State of Andhra Pradesh
SECTION 66.
Computer Related Offences
Penalties: Imprisonment up to 3 years and/or fine of five lakh rupees
Example:
Kumar v/s Whitley case
19. SECTION66(A)
Punishment for sending offensive messages through communication Service
Penalties: Imprisonment up to 3 years and/or fine
Example:
Bomb Hoax mail
SECTION 66 (D): Punishment for cheating by personation by using computer
resource
Penalties: Imprisonment which may extend to 3 years and fine which may extend to
one lakh rupees.
Example:
Samdeep Varghese v/s State of Kerala
20. SECTION 66 (E):
Punishment for violation of privacy
Penalties: Imprisonment which may extend to 3 years or with fine not exceeding
two lakh rupees, or with both.
Example:
Nagpur Congress leader’s son MMS scandal
SECTION 66 (F):
Punishment for cyber terrorism
Penalties: Imprisonment which may extend to imprisonment for life.
Example:
Parliament attack case
21.
Strengthening and standardizing banks infrastructure
Communication and networking
Inter branch connectivity
‘Cyber Cash’ & ‘cyber books’
E-Banking services:
ATM
Electronic fund Transfer
Electronic clearing service
Credit card/debit card
Sms banking
Internet banking
22.
Trade association of IT and BPO industry
NPO with over 1400 members
Facilitates business and trade in software and services
Encourages advancement of research in software technology.
23. Initiatives taken by NASSCOM:
• Domestic Market Initiative
• Innovation Initiative
• Education Initiative
• Women in Leadership IT Initiative
25. India
1. Freedom of expression is
Brazil
1. Freedom of expression is
wider.
2. Principles of broadcasting not
subject to certain restrictions.
2. Strict principles to be followed
as strict as Brazil.
while broadcasting content in
media.
3. Data protection (DP) rules
3. No data protection law in
– April 2011 enacted
4. Personal data of citizens is
easily accessible
Brazil.
4.
Personal data is accessible
only to citizens and the source
must be safeguarded.