SlideShare a Scribd company logo
1 of 23
Information Technology
Act 2000- An overview
Presented by,
Kinjal Vaghela(115330)
Usha Chaudhari(115328)
Need of Cyber Law
"The modern thief can steal more with a computer
than with a gun. Tomorrow's terrorist may be able to do
more damage with a keyboard than with a bomb".
National Research Council, U S A "Computers at
Risk”.1991
Need of Cyber Law
➢ Internet has dramatically changed Our life.
➢ Transition from paper to paperless world.
➢ Laws of real world can not be interpreted in the light
of emerging Cyberspace.
➢ Internet requires an enabling and supportive legal
infrastructure to tune with the times
Cyber Law ?
➢ Cyber Law is the law governing cyber space.
➢ Cyber space includes computers, networks, software's,
data storage devices (such as hard disks, USB disks etc),
the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Crime ?
➢ Any crime with the help of computer and
telecommunication technology.
➢ Any crime where either the computer is used
as an object or subject.
Categories of Cyber Crime
➢ Cybercrimes against persons.
➢ Cybercrimes against property.
➢ Cybercrimes against government.
Statistics of Cyber Crimes
IT Act-2000
➢ The Information Technology Act, 2000 (IT Act),
came into force on 17 October 2000.
➢ The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
filing of electronic records with the Government.
➢ Information Technology Act 2000 consisted of
94 sections segregated into 13 chapters.
IT Act-2000 : Objectives
➢ To provide legal recognition for transactions
➢ To facilitate electronic filing of documents with
the Government agencies.
➢ To amend the Indian Penal Code, The Indian
Evidence Act, 1872, The Banker's Book Evidence
Act, 1891 and the Reserve Bank of India
Act, 1934.
➢ Aims to provide the legal framework to all
electronic records.
10
Section 65
• Offence Name - Tampering with computer Source
documents.
• Description - If a person knowingly or intentionally
conceals, destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any computer
source code used for a computer, computer programme,
computer system or computer network, when the
computer source code is required to be kept or maintained
by law for the time being in force.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
11
Section 66
• Offence Name - Hacking with computer system
• Description - If a person with the intent to cause or
knowing that he is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or alters any
information residing in a computer resource or diminishes
its value or utility or affects it injuriously by any means,
commits hack.
• Penalty
Imprisonment up to three years, or/and with fine up
to 500,000
12
Section 66B
• Offence Name - Receiving stolen computer or communication
device
• Description - - A person receives or retains a computer
resource or communication device which is known to be
stolen or the person has reason to believe is stolen.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
13
Section 66C
• Offence Name - Using password of another person
• Description - A person fradulently uses the password, digital
signature or other unique identification of another person.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
14
Section 66D
• Offence Name - Cheating using computer resource
• Description - If a person cheats someone using a computer
resource or communication.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
15
Section 66E
• Offence Name - Publishing private images of others
• Description - If a person captures, transmits or publishes
images of a person's private parts without his/her consent or
knowledge.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
SECTION 67C
• Offence Name - Failure to maintain records
• Description:Persons deemed as
intermediatary (such as an ISP) must maintain
required records for stipulated time. Failure is
an offence.
17
Section 68
• Offence Name - Failure/refusal to comply with orders
• Description - The Controller may, by order, direct a Certifying
Authority or any employee of such Authority to take such
measures or cease carrying on such activities as specified in
the order if those are necessary to ensure compliance with
the provisions of this Act, rules or any regulations made
thereunder. Any person who fails to comply with any such
order shall be guilty of an offence.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
18
Section 70
• Offence Name - Securing access or attempting to secure
access to a protected system
• Description - The appropriate Government may, by
notification in the Official Gazette, declare that any
computer, computer system or computer network to be a
protected system.The appropriate Government may, by order
in writing, authorise the persons who are authorised to
access protected systems. If a person who secures access or
attempts to secure access to a protected system, then he is
committing an offence.
• Penalty
- Imprisonment up to ten years, or/and with fine
19
Section 71
• Offence Name - Misrepresentation
• Description - If anyone makes any misrepresentation
to, or suppresses any material fact from, the
Controller or the Certifying Authority for obtaining
any license or Digital Signature Certificate.
• Penalty
- Imprisonment up to three years, or/and with fine up
to 100,000
IT Act Amendment-2008
➢ The Information Technology Amendment Act, 2008
(IT Act 2008) has been passed by the parliament on
23rd December 2008.
➢ It received the assent of President of India on
5th February, 2009.
➢ The IT Act 2008 has been notified on October 27,
2009.
➢ ITA-2008, is a new version of IT Act 2000.
➢ Provides additional focus on Information
Security.
➢ Added several new sections on offences
including Cyber Terrorism and Data
Protection.
➢ 124 sections and 14 chapters.
➢ Schedule I and II have been replaced &
Schedules III and IV are deleted.
IT Act Amendment-2008
➢ We are living in highly digitalized world.
➢ All companies depend upon their computer
networks and keep their valuable data in electronic
form.
➢ Government forms including income tax returns,
company law forms etc are now filled in electronic
form.
➢ Consumers are increasingly using credit cards for
shopping.
➢ Even in "non-cyber crime" cases, important
Importance of Cyber Law
Thank You

More Related Content

What's hot

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Microsoft power point domain and cyber squatting [compatibility mode]
Microsoft power point   domain and cyber squatting [compatibility mode]Microsoft power point   domain and cyber squatting [compatibility mode]
Microsoft power point domain and cyber squatting [compatibility mode]
sanjeev kumar chaswal
 

What's hot (20)

Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Microsoft power point domain and cyber squatting [compatibility mode]
Microsoft power point   domain and cyber squatting [compatibility mode]Microsoft power point   domain and cyber squatting [compatibility mode]
Microsoft power point domain and cyber squatting [compatibility mode]
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 

Similar to Cyber securitylaw

Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 

Similar to Cyber securitylaw (20)

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber
CyberCyber
Cyber
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
it act
it act it act
it act
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Cyber securitylaw

  • 1. Information Technology Act 2000- An overview Presented by, Kinjal Vaghela(115330) Usha Chaudhari(115328)
  • 2. Need of Cyber Law "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, U S A "Computers at Risk”.1991
  • 3. Need of Cyber Law ➢ Internet has dramatically changed Our life. ➢ Transition from paper to paperless world. ➢ Laws of real world can not be interpreted in the light of emerging Cyberspace. ➢ Internet requires an enabling and supportive legal infrastructure to tune with the times
  • 4. Cyber Law ? ➢ Cyber Law is the law governing cyber space. ➢ Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 5. Cyber Crime ? ➢ Any crime with the help of computer and telecommunication technology. ➢ Any crime where either the computer is used as an object or subject.
  • 6. Categories of Cyber Crime ➢ Cybercrimes against persons. ➢ Cybercrimes against property. ➢ Cybercrimes against government.
  • 8. IT Act-2000 ➢ The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000. ➢ The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. ➢ Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
  • 9. IT Act-2000 : Objectives ➢ To provide legal recognition for transactions ➢ To facilitate electronic filing of documents with the Government agencies. ➢ To amend the Indian Penal Code, The Indian Evidence Act, 1872, The Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934. ➢ Aims to provide the legal framework to all electronic records.
  • 10. 10 Section 65 • Offence Name - Tampering with computer Source documents. • Description - If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 11. 11 Section 66 • Offence Name - Hacking with computer system • Description - If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. • Penalty Imprisonment up to three years, or/and with fine up to 500,000
  • 12. 12 Section 66B • Offence Name - Receiving stolen computer or communication device • Description - - A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 13. 13 Section 66C • Offence Name - Using password of another person • Description - A person fradulently uses the password, digital signature or other unique identification of another person. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 14. 14 Section 66D • Offence Name - Cheating using computer resource • Description - If a person cheats someone using a computer resource or communication. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 15. 15 Section 66E • Offence Name - Publishing private images of others • Description - If a person captures, transmits or publishes images of a person's private parts without his/her consent or knowledge. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 16. SECTION 67C • Offence Name - Failure to maintain records • Description:Persons deemed as intermediatary (such as an ISP) must maintain required records for stipulated time. Failure is an offence.
  • 17. 17 Section 68 • Offence Name - Failure/refusal to comply with orders • Description - The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Any person who fails to comply with any such order shall be guilty of an offence. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 18. 18 Section 70 • Offence Name - Securing access or attempting to secure access to a protected system • Description - The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system.The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. • Penalty - Imprisonment up to ten years, or/and with fine
  • 19. 19 Section 71 • Offence Name - Misrepresentation • Description - If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate. • Penalty - Imprisonment up to three years, or/and with fine up to 100,000
  • 20. IT Act Amendment-2008 ➢ The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008. ➢ It received the assent of President of India on 5th February, 2009. ➢ The IT Act 2008 has been notified on October 27, 2009.
  • 21. ➢ ITA-2008, is a new version of IT Act 2000. ➢ Provides additional focus on Information Security. ➢ Added several new sections on offences including Cyber Terrorism and Data Protection. ➢ 124 sections and 14 chapters. ➢ Schedule I and II have been replaced & Schedules III and IV are deleted. IT Act Amendment-2008
  • 22. ➢ We are living in highly digitalized world. ➢ All companies depend upon their computer networks and keep their valuable data in electronic form. ➢ Government forms including income tax returns, company law forms etc are now filled in electronic form. ➢ Consumers are increasingly using credit cards for shopping. ➢ Even in "non-cyber crime" cases, important Importance of Cyber Law