Information Technology Act


Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Information Technology Act

  1. 1. Information Technology Act 2000 “ Rather than giving Information and technology Gives rise to cyber crime.”
  2. 2. IT Scenario <ul><li>IT covers both hardware and software </li></ul><ul><li>Transformed the world into a global village </li></ul><ul><li>Provides Communication and Analytical power to trade </li></ul><ul><li>Indian IT industry fastest growing industry </li></ul><ul><li>Pioneer in software development </li></ul><ul><li>Conducive laws and regulations. </li></ul><ul><li>Building of STPI </li></ul><ul><li>Tremendous growth in Internet </li></ul>
  3. 3. Information Technology Act 2000 <ul><li>Regulates the transactions relating to the computer and the Internet. </li></ul><ul><li>Act to govern cyber space. </li></ul><ul><li>Preamble “ it aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as &quot;electronic commerce” </li></ul><ul><li>Covers the issues relating to electronic transactions, digital signatures, and hacking and network service providers </li></ul><ul><li>Objectives: </li></ul><ul><li>Legal recognition for transaction carried out by electronic methods of communication </li></ul><ul><li>To facilitate electronic filing of documents </li></ul><ul><li>Legal sanctity accorded to all electronic records and other activities carried out by electronic means. </li></ul><ul><li>Acceptance of contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability </li></ul>
  4. 4. Important Definitions <ul><li>&quot; Adjudicating officer “ </li></ul><ul><li>&quot; Digital signature &quot; </li></ul><ul><li>&quot; Affixing digital signature ; </li></ul><ul><li>&quot; Appropriate Government “ </li></ul><ul><li>&quot; Certifying Authority &quot; </li></ul><ul><li>&quot;Cyber Appellate Tribunal&quot; </li></ul><ul><li>&quot; Electronic form &quot; </li></ul><ul><li>&quot; Secure system “ </li></ul><ul><li>&quot; Electronic Gazette &quot; </li></ul>
  5. 5. Impact on Banking Sector <ul><li>Pressure from competition and regulatory environment . </li></ul><ul><li>Threat of Competition and Retaining Customer Base. </li></ul><ul><li>IT used for Communication, Connectivity and Business Process Re-engineering. </li></ul><ul><li>Improve efficiency of money, capital and foreign exchange markets. </li></ul><ul><li>Lead to convergence of computer and communication technology to enable TBA. </li></ul>
  6. 6. Flip side <ul><li>Ambiguity of definitions. </li></ul><ul><li>No provision for consumer redress in case of fraud committed through e-commerce. </li></ul><ul><li>Does not envisage difficulties arising out of Electronic fund transfer. </li></ul><ul><li>Issue of jurisdiction of Courts have not been addressed. </li></ul><ul><li>Limited scope on issue of privacy, viruses, hacking etc. </li></ul><ul><li>Categories like power of Attorney, Trust, Will and Contract For Sale have been excluded </li></ul><ul><li>Does not lays down parameters for implementation </li></ul><ul><li>Biggest fallout due to incapability of implementation is Cybercrime. </li></ul><ul><li>India ranks fourth in commission on Cybercrimes . </li></ul>
  7. 7. Cyber crime <ul><li>“ An y criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime” </li></ul><ul><li>Reasons for increase are easy to access, complex, negligence and loss of evidence. </li></ul><ul><li>Cybercrime can be against individuals, individual properties, organisation and society. </li></ul>
  8. 8. Classification of cyber crime <ul><li>Against Individuals: – i. Harassment via e-mails. ii. Cyber-stalking. iii. Dissemination of obscene material. iv. Defamation. v. Unauthorized control/access over computer system. vi. Indecent exposure vii. Email spoofing  viii. Cheating & Fraud </li></ul><ul><li>Against Individual Property: -  i. Computer vandalism. ii. Transmitting virus. iii. Netrespass iv. Unauthorized control/access over computer system. v. Intellectual Property crimes vi. Internet time thefts </li></ul>
  9. 9. Contd <ul><li>Against Organization: - </li></ul><ul><li>i. Unauthorized control/access over computer system ii. Possession of unauthorized information. iii. Cyber terrorism against the government organization. iv. Distribution of pirated software etc. </li></ul><ul><li>Against Society at large: - i.     Pornography (basically child pornography). ii.    Polluting the youth through indecent exposure. iii.   Trafficking iv. Financial crimes v. Sale of illegal articles vi. Online gambling vii.  Forgery </li></ul>
  10. 10. Famous Cyber Crime Cases in India Three customer service agents of call centre contractor MphasiS BFL, working on the Citibank account, gained the confidence of four US customers and obtained their PIN numbers and other classified account information. They then used these to transfer money out of those customers' accounts and into the accounts of members of their gang . An Indian court has granted bail to a schoolboy who allegedly recorded a sexual act between himself and a 16-year-old girl on his mobile phone. The clip was later sold on video CDs via auction site, sparking the arrest of its manager for India.
  11. 11. Cyber crime Evolution
  12. 12. Statistics on Cybercrime...2007
  13. 13. NASSCOM and its Role in IT <ul><li>Premier trade body and the chamber of commerce of the IT-BPO industries in India </li></ul><ul><li>More than 1200 members </li></ul><ul><li>Setup in 1988 to facilitate business & trade in software services </li></ul><ul><li>Non profit organisation </li></ul><ul><li>Innovative business practices, social initiatives, thrust for foraying into new emerging opportunity areas. </li></ul>
  14. 14. Objective of Nasscom <ul><li>Formulating National IT policies with specific focus on IT software and services. </li></ul><ul><li>Maintaining a state of the art information database of IT software and services related activities. </li></ul><ul><li>Build brand equity for the Indian IT software and services industry . </li></ul><ul><li>Take effective steps in fighting software piracy. </li></ul><ul><li>Forum to explore vast potentials </li></ul><ul><li>Work actively with Overseas Governments, Embassies </li></ul>
  15. 15. NASSCOM Initiative – 4E Framework <ul><li>ENGAGEMENT </li></ul><ul><li>Networking with Global & Domestic agencies involve in curbing cybercrime . </li></ul><ul><li>EDUCATION </li></ul><ul><li>Educating professionals and team of domestic agencies . </li></ul><ul><li>ENACTMENT </li></ul><ul><li>Creating Cybersecurity to protect & increase the flow of offshore business . </li></ul><ul><li>ENFORCEMENT </li></ul><ul><li>Making the law competent to be enforced and acted upon to bring culprits to punishments . </li></ul>
  16. 16. Amendment of IT Act 2000 Section Change 66 &quot;Dishonesty&quot; and &quot;Fraudulent&quot; intention made necessary, &quot;Without permission of the owner of the computer&quot; has also become a condition precedent to application of Section 66. The imprisonment term remains the same but fine has been increased. 66A Provides cover for Cyber stalking, Spam, threat mails, Phishing mails, SMS, etc. 66C Covers Identity theft which was not specifically covered earlier. Earlier such offences were to be covered under Section 66 as &quot;Diminishing of the value of information&quot; 66E This is a new section which covers Video Voyeurism which was not covered at all earlier. 66F Covers &quot;Cyber Terrorism&quot; and makes it punishable with imprisonment upto life term. This may cover hacking, denial of access attacks, Port Scanning, spreading viruses etc. if it can be linked to the object of terrorizing people. Conspiracy is also covered under the section. The offence would not be bailable or compoundable. 67A Covers obscenity which involves &quot;Sexually explicit content&quot;. The punishment is 5 years as in the earlier act. Fine is higher.
  17. 17. Ammendments Contd.. 67B This addresses child pornography and makes searching and browsing also as offences. 67C Requires specified data to be retained for specified periods by Intermediaries failure of which becomes punishable with three years imprisonment. The &quot;Intermediaries&quot; here would include cyber cafes, ISPs, MSPs, e-auction sites etc. 69 Powers being made available to any officer designated by either the Central or State Government to &quot;Intercept&quot; information whether in transit or storage. Imprisonment for 7 years and it is non bailable and non compoundable. 69A Provides powers to a designated officer of the Central Government to &quot;Block websites&quot;. Imprisonment for 7 years and it is non bailable and non compoundable. 69B Provides powers to a designated officer of the Central Government to &quot;collect traffic data&quot; from any computer resource imprisonment for 3 years and it is  bailable and  compoundable.
  18. 18. Global Initiatives Five countries from three continents banding together to fight cyber crime in a synergistic way by sharing intelligence, swapping tools and best practices, and strengthening and even synchronizing their respective laws
  19. 19. Our suggestions <ul><li>A broad &inclusive focus is necessary to protect the IT services </li></ul><ul><li>Strategies and Alert mechanism Against cyber attacks </li></ul><ul><li>Creating a global culture of cyber security </li></ul><ul><li>International cooperation at all levels should be developed further. </li></ul><ul><li>Establish funding mechanisms to facilitate practical research </li></ul><ul><li>Encouraging states to upgrade, update, notify and educate about cyber laws & cyber attacks. </li></ul><ul><li>Participatory approach involving Governments, the private sector and non-governmental organizations. </li></ul><ul><li>Include comprehensive curricular on computer related in Academics and impress upon ethical behaviour of professionals. </li></ul><ul><li>New recruitment to ensure a sizeable team to combat cyber crime </li></ul><ul><li>Law enforcement officials need to be trained for effective enforcement. </li></ul>
  20. 20. Conclusion <ul><li>Cyber crime is borderless and faceless. </li></ul><ul><li>All countries in the sub continent must come together to form a joint agency to combat cyber crime. </li></ul><ul><li>Judicial system and entire mechanism needs an overhaul to deliver justice at quick speed. </li></ul><ul><li>Punishment must be stringent enough to kill the motive of the criminals. </li></ul><ul><li>Ethical Hacking must be utilised to understand the psyche and techniques of the criminals. </li></ul>
  21. 21. <ul><li>Thank You </li></ul>