SlideShare a Scribd company logo
1 of 51
CYBER LAW
Why Cyber Law
 GREATEST CULTURAL, ECONOMIC, POLITICAL AND SOCIAL
TRANSFORMATION IN THE HISTORY OF HUMAN SOCIETY
 DIFFERENT APPROACHES FOR CONTROLLING, REGULATING
AND FACILITATING ELECTRONIC COMMUNICATION AND
COMMERCE
 IT ACT 2000 – INDIA’S FIRST CYBER LAW
IT ACT 2000,
CYBER LAW
AND
RELATED LEGAL ISSUES
OBJECTIVES OF THE ACT
 LEGAL RECOGNITION FOR E-COMMERCE
- DIGITAL SIGNATURES AND REGULATORY REGIME
- ELECTRONIC DOCUMENTS AT PAR WITH PAPER DOCUMENTS
 E-GOVERNANCE
- ELECTRONIC FILING OF DOCUMENTS
 IT AMENDS
- INDIAN PENAL CODE
- INDIAN EVIDENCE ACT
- BANKERS EVIDENCE ACT
- RESERVE BANK OF INDIA ACT
IT ACT 2000
 LEGAL RECOGNITION FOR TRANSACTIONS:- CARRIED OUT BY
MEANS OF ELECTRONIC DATA INTERCHANGE, AND OTHER
MEANS OF ELECTRONIC COMMUNICATION
 FACILITATE ELECTRONIC FILING OF DOCUMENTS WITH THE
GOVERNMENT AGENCIES
 AIMS TO PROVIDE FOR THE LEGAL FRAMEWORK SO THAT
LEGAL SANCTITY IS ACCORDED TO ALL ELECTRONIC RECORDS
AND OTHER ACTIVITIES CARRIED OUT BY ELECTRONIC MEANS
 CAME INTO FORCE ON 17 OCTOBER 2000. CONSISTS OF 94
SECTIONS SEGREGATED INTO 13 CHAPTERS. FOUR SCHEDULES
FORM PART OF THE ACT.
 EXTENDS TO WHOLE OF INDIA AND ALSO APPLIES TO ANY
OFFENCE OR CONTRAVENTION THERE UNDER COMMITTED
OUTSIDE INDIA BY ANY PERSON {SECTION 1 (2)} READ WITH
SECTION 75- ACT APPLIES TO OFFENCE OR CONTRAVENTION
COMMITTED OUTSIDE INDIA BY ANY PERSON IRRESPECTIVE OF
HIS NATIONALITY, IF SUCH ACT INVOLVES A COMPUTER,
COMPUTER SYSTEM OR NETWORK LOCATED IN INDIA
 SECTION 2 (1) (A) –”ACCESS” MEANS GAINING ENTRY INTO,
INSTRUCTING OR COMMUNICATING WITH THE LOGICAL,
ARITHMETIC OR MEMORY FUNCTION RESOURCES OF A
COMPUTER, COMPUTER RESOURCE OR NETWORK
 IT ACT CONFERS LEGAL RECOGNITION TO ELECTRONIC
RECORDS AND DIGITAL SIGNATURES (SECTION 4,5 OF THE IT
ACT,2000)
IT ACT
 ACCEPTANCE OF CONTRACT MAY BE EXPRESSED BY
ELECTRONIC MEANS OF COMMUNICATION.
 THE SAME SHALL HAVE LEGAL VALIDITY AND ENFORCEABILITY
CIVIL WRONGS UNDER IT ACT
 CHAPTER IX OF IT ACT, SECTION 43
 WHOEVER WITHOUT PERMISSION OF OWNER OF THE
COMPUTER
– Secures access (mere U/A access)
• Not necessarily through a network
– Downloads, copies, extracts any data
– Introduces or causes to be introduced any viruses or
contaminant
– Damages or causes to be damaged any computer resource
• Destroy, alter, delete, add, modify or rearrange
• Change the format of a file
– Disrupts or causes disruption of any computer resource
• Preventing normal continuance of computer
– Denies or causes denial of access by any means
• Denial of service attacks
– Assists any person to do any thing above
• Rogue Websites, Search Engines, Insiders providing
vulnerabilities
– Charges the services availed by a person to the account of
another person by tampering or manipulating any computer
resource
• Credit card frauds, Internet time thefts
– Liable to pay damages not exceeding Rs. One crore to the
affected party
– Investigation by
– ADJUDICATING OFFICER
– Powers of a civil court
AUTHENTICATION OF ELECTRONIC
RECORDS
 ANY SUBSCRIBER MAY AUTHENTICATE AN ELECTRONIC
RECORD
 AUTHENTICATION BY AFFIXING HIS DIGITAL SIGNATURE
 ANY PERSON BY THE USE OF A PUBLIC KEY OF THE
SUBSCRIBER CAN VERIFY THE ELECTRONIC RECORD
DIGITAL SIGNATURES & ELECTRONIC
RECORDS
 LEGAL RECOGNITION OF DIGITAL SIGNATURES
 USE OF ELECTRONIC RECORDS AND DIGITAL SIGNATURES IN
GOVERNMENT AGENCIES
 PUBLICATIONS OF RULES AND REGULATIONS IN THE
ELECTRONIC GAZETTE
ELECTRONIC SIGNATURES
 DATA WHICH IS IN ELECTRONIC FORM AND WHICH CAN BE
USED TO IDENTIFY THE SIGNATURE HOLDER WITH RESPECT
TO THE ELECTRONIC RECORD TO WHICH IT IS RELATED, AND
SERVES TO SIGNIFY APPROVAL OF THAT ELECTRONIC RECORD.
 EXAMPLES
– PIN/ PASSWORD
– IMAGE OF HANDWRITTEN SIGNATURES
– CRYPTOGRAPHIC CHECKSUMS
– BIOMETRIC TECHNOLOGY: PHYSIOLOGICAL/ BEHAVIOURAL
– DIGITAL SIGNATURES BASED ON ASYMMETRIC CRYPTO SYSTEM
DIGITAL SIGNATURE AS PER IT ACT
 TO VERIFY AUTHENTICITY AND INTEGRITY OF THE SIGNER
AND THE DOCUMENT
 TECHNOLOGY
– ASYMMETRIC CRYPTOSYSTEM AND HASH FUNCTION
– PRIVATE AND PUBLIC KEY
 REGULATORY MECHANISM
– CONTROLLER OF CERTIFYING AUTHORITIES
– CERTIFYING AUTHORITIES
CERTIFYING AUTHORITY
 THE CONTROLLER OF CA SUPERVISES THE ACTIVITIES OF ALL
CAS
 EVEN THE FOREIGN CAS ARE RECOGNIZED BY THIS ACT
CERTIFICATION AUTHORITIES
 TRUSTWORTHY ENTITY
- DEFINED POLICIES, REGULATION BY CCA
 CERTIFIES AUTHENTICITY OF THE SUBSCRIBER BY APPROPRIATE
MEANS
 ISSUES DIGITAL CERTIFICATE
- FUNCTIONING KEY PAIR
- PUBLIC KEY
- NAME, ADDRESS
CCA WEBSITE
CONTROLLER OF CAS AND CAS
 ALL PUBLIC / PRIVATE KEYS SHALL BE ISSUED BY CERTIFYING AUTHORITIES
WHO SHALL BE SO LICENSED TO DO SO BY THE OFFICE OF THE
“CONTROLLER OF CERTIFYING AUTHORITIES”
 CERTIFYING AUTHORITIES TO FOLLOW PROCEDURES LAID DOWN
- USE SECURE COMPUTERS
- ENSURE SECRECY AND PRIVACY OF DIGITAL SIGNATURES
 THE APPOINTMENT OF A “CONTROLLER OF CERTIFYING AUTHORITIES”
AND “DEPUTY CONTROLLERS” AND ‘ASSTT CONTROLLERS”
- THERE SHALL BE A SEAL FOR THIS OFFICE
- BE THE REPOSITORY OF ALL DIGITAL SIGNATURE CERTIFICATES
- POWERS TO GRANT RECOGNITION TO FOREIGN CERTIFYING
AUTHORITIES, POWERS TO TAKE UP INVESTIGATIONS FOR ANY
CONTRAVENTIONS OF THE ACT AS APPLICABLE FOR CERTIFYING
AUTHORITIES AND SUSPEND LICENSE
DATA DIDDLING: changing data
prior or during input into a
computer
 Section 66 and 43(d) of the I.T. Act covers the offence of
data diddling
 Penalty: Not exceeding Rs. 1 crore
NDMC Electricity Billing Fraud Case: A private contractor
who was to deal with receipt and accounting of electricity
bills by the NDMC, Delhi. Collection of money, computerized
accounting, record maintenance and remittance in his bank
who misappropriated huge amount of funds by
manipulating data files to show less receipt and bank
remittance.
OFFENCES UNDER THE IT ACT
OFFENCES & PENALTIES
 PENALTIES FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM
ETC. HAVE BEEN FIXED AS DAMAGES BY WAY OF
COMPENSATION NOT EXCEEDING RS. 1,00,00,000/- TO
AFFECTED PERSONS.
 ADJUDICATING OFFICER HAVING THE POWER OF A CIVIL
COURT SHALL ADJUDICATE
 CYBER REGULATIONS APPELLATE TRIBUNAL WILL DEAL WITH
THE APPEALS AGAINST THE ORDERS PASSED BY THE ABOVE
 THE NEXT LEVEL OF APPEAL IS HIGH COURT
COGNIZABILITY AND BAILABILITY
 NOT MENTIONED IN THE ACT
– RELY ON PART II OF SCHEDULE I OF CRPC
• if punishable with death, imprisonment for life or
imprisonment for more than 7 tears: cognizable, non-
bailable, court of session
• if punishable with imprisonment for 3 years and upwards
but not more than 7 years: cognizable, non-bailable,
magistrate of first class
• if punishable with imprisonment of less than 3 years: non-
cognizable, bailable, any magistrate (or controller of cas)
SECTION 46 IT ACT
• Section 46 of the IT Act states that an adjudicating officer
shall be adjudging whether a person has committed a
contravention of any of the provisions of the said Act, by holding
an inquiry. Principles of Audi alterum partum and natural justice
are enshrined in the said section which stipulates that a
reasonable opportunity of making a representation shall be
granted to the concerned person who is alleged to have
violated the provisions of the IT Act. The said Act stipulates that
the inquiry will be carried out in the manner as prescribed by
the Central Government
• All proceedings before him are deemed to be judicial
proceedings, every Adjudicating Officer has all powers conferred
on civil courts
• Appeal to cyber Appellate Tribunal- from decision of Controller,
Adjudicating Officer {section 57 IT act}
SECTION 47, IT ACT
Section 47 of the Act lays down that while adjudging the
quantum of compensation under this Act, the adjudicating
officer shall have due regard to the following factors, namely-
(a) the amount of gain of unfair advantage, wherever
quantifiable, made as a result of the default;
(b) the amount of loss caused to any person as a result of the
default;
(c) the repetitive nature of the default
CYBERCRIME PROVISIONS
OFFENCE RELEVANT SECTION UNDER IT ACT
TAMPERING WITH COMPUTER SOURCE
DOCUMENTS
SEC 65
HACKING WITH COMPUTER SYSTEMS, DATA
ALTERATION
SEC 66
PUBLISHING OBSCENE INFORMATION SEC 67
UN-AUTHORIZED ACCESS TO PROTECTED
SYSTEM
SEC 70
BREACH OF CONFIDENTIALITY AND PRIVACY SEC 72
PUBLISHING FALSE DIGITAL SIGNATURE
CERTIFICATES
SEC 73
SECTION 65: SOURCE CODE
 MOST IMPORTANT ASSET OF SOFTWARE COMPANIES
 “COMPUTER SOURCE CODE" MEANS THE LISTING OF
PROGRAMMES, COMPUTER COMMANDS, DESIGN AND LAYOUT
 INGREDIENTS
- knowledge or intention
- concealment, destruction, alteration
- computer source code required to be kept or maintained by law
 PUNISHMENT
- imprisonment up to three years, and / or
- fine up to Rs 2 lakh
 COGNIZABLE, NON BAILABLE, JMIC
SECTION 66: HACKING
 INGREDIENTS
– intention or knowledge to cause wrongful loss or damage to the public
or any person
– destruction, deletion, alteration, diminishing value or utility or
injuriously affecting information residing in a computer resource
 PUNISHMENT
– imprisonment up to three years, and / or
– fine up to Rs 2 lakh
 COGNIZABLE, NON BAILABLE, JMIC
 COVERS CRIMES LIKE
– trojan, virus, worm, logic bombs etc
– internet time theft, analysis of electromagnetic waves generated by
computers
SEC. 67. PORNOGRAPHY
 INGREDIENTS
– publishing or transmitting or causing to be published
– in the electronic form,
– obscene material
 PUNISHMENT
– ON FIRST CONVICTION
• imprisonment of either description up to five years and
• fine up to Rs 1 lakh
– ON SUBSEQUENT CONVICTION
• imprisonment of either description up to ten years and
• fine up to Rs 2 lakh
 SECTION COVERS
– internet service providers,
– search engines,
– pornographic websites
 COGNIZABLE, NON-BAILABLE, JMIC/ COURT OF SESSIONS
SEC 68 CONTROLLER’S DIRECTIONS
 INGREDIENTS
– Failure to comply with order of Controller
– Order directing a Certifying Authority or its employee to
take measures or cease carrying on activities as specified
 PUNISHMENT
– imprisonment up to three years, and / or
– fine up to Rs 2 lakh
 COGNIZABLE, NON-BAILABLE, JMIC
SEC 69: DECRYPTION OF INFO
 INGREDIENTS
– CONTROLLER ISSUES ORDER TO GOVERNMENT AGENCY TO
INTERCEPT ANY INFORMATION TRANSMITTED THROUGH
ANY COMPUTER RESOURCE.
– ORDER IS ISSUED IN THE INTEREST OF THE
• sovereignty or integrity of India,
• the security of the State,
• friendly relations with foreign States,
• public order or
• preventing incitement for commission of a cognizable
offence
– PERSON IN CHARGE OF THE COMPUTER RESOURCE FAILS
TO EXTEND ALL FACILITIES AND TECHNICAL ASSISTANCE TO
DECRYPT THE INFORMATION.
 APPLICABILITY
– email messages (if encrypted)
– encrypted messages
– steganographic images
– password protected files (?)
 PUNISHMENT
– imprisonment up to 7 years
 COGNIZABLE, NON-BAILABLE, JMIC
SEC 72 BREACH OF PRIVACY
 INGREDIENTS
– Unauthorised disclosure of information obtained in
pursuance of powers conferred by the IT Act or rules
 PUNISHMENT
– Imprisonment up to 2 years and or fine up to Rs. 1 lakh
 NON-COGNIZABLE, BAILABLE, ANY MAGISTRATE
DIGITAL SIGNATURE RELATED CRIME
SEC 73 PUBLISHING FALSE DSC
 INGREDIENTS
– PUBLISHING CERTIFICATE KNOWING THAT:
• CA listed in it has not issued it
• Subscriber listed in it has not accepted it
• Certificate has been revoked / suspended
 PUNISHMENT
• Imprisonment up to 2 years and or fine up to Rs. 1 lakh
 NON-COGNIZABLE, BAILABLE, ANY MAGISTRATE
SEC 74 PUBLICATION FOR
FRAUDULENT PURPOSE
 INGREDIENTS
– Creating, publishing or making available Certificate for
fraudulent or unlawful purpose is made punishable
 PUNISHMENT
– Imprisonment up to 2 years and or fine up to Rs. 1 lakh
 NON-COGNIZABLE, BAILABLE, ANY MAGISTRATE
BUT……..
 ALL CYBER CRIMES DO NOT COME UNDER THE INFORMATION
TECHNOLOGY ACT, 2000.
 MANY CYBER CRIMES COME UNDER THE INDIAN PENAL CODE
COMPUTER RELATED CRIMES UNDER
IPC AND SPECIAL LAWS
SENDING THREATENING MESSAGES BY EMAIL SEC 503 IPC
SENDING DEFAMATORY MESSAGES BY EMAIL SEC 499 IPC
FORGERY OF ELECTRONIC RECORDS SEC 463 IPC
BOGUS WEBSITES, CYBER FRAUDS SEC 420 IPC
EMAIL SPOOFING SEC 463 IPC
ONLINE SALE OF DRUGS NDPS ACT
ONLINE SALE OF ARMS ARMS ACT
PROCEDURAL ASPECTS
 INVESTIGATION POWERS - Officer not below the rank of DySP
(sec 78)
 POWER OF ENTRY, SEARCH AND SEIZURE AND ARREST FROM
PUBLIC PLACES
Officer not below the rank of DySP (sec 80)/ Cyber cafes/
Committed, suspected of committing/about to commit a
crime
 POWER TO ORDER DECRYPTION (SEC. 68), Controller
 LIABILITY OF NSPS (SECTION 79)
– Not liable being intermediaries
– Due care, lack of knowledge
CYBER LAW ADMINISTRATION
 CYBER REGULATIONS ADVISORY COMMITTEE
– Apex advisory agency for policy guidance to the
Government
 CONTROLLER OF CERTIFYING AUTHORITIES
– Regulate and administer the certifying authorities
– Shall investigate cases ( in accordance with the Income Tax
Act) of contravention of the act by the Certifying authorities
– Resolve conflicts of interest between CA and its subscriber
– Power to access any computer
INVESTIGATING OFFICER
ALL THE OFFENCES SHALL BE INVESTIGATED BY AN
OFFICER NOT BELOW THE RANK OF DSP
GREY AREAS
 IT IS NOT CLEAR IF THE CRIME IS COMMITTED OUTSIDE INDIA
AS TO HOW IT WILL BE DEALT
 CA FUNCTION UNDER GOVT. OF INDIA WHICH WILL
BUREAUCRATIZE THE ENTIRE PROCESS
 ALL THE CRIMES ARE NOT EXHAUSTIVELY DEALT, LIKE CYBER
HARASSMENT, DEFAMATION, STALKING ETC.
 TERRITORIAL JURISDICTION OF ADJUDICATING OFFICERS &
TRIBUNAL ARE NOT DEFINED.
 POWER GIVEN TO THE IO
- CAN ENTER ANY PUBLIC PLACE
- SEARCH & ARREST WITHOUT ANY WARRANT
- ANY PERSON WHO IS REASONABLY SUSPECTED TO
HAVE COMMITTED/COMMITTING/ABOUT TO COMMIT ANY
OFFENCE UNDER THIS ACT
EMAIL SPOOFING
• Pranab Mitra , former executive of Gujarat Ambuja
Cement posed as a woman, Rita Basu, and created a fake
e-mail ID through which he contacted one V.R. Ninawe an
Abu Dhabi businessmen . After long cyber relationship
and emotional massages Mitra sent an e-mail that ‘‘she
would commit suicide’’ if Ninawe ended the relationship.
He also gave him ‘‘another friend Ruchira Sengupta’s’’ e-
mail ID which was in fact his second bogus address.
When Ninawe mailed at the other ID he was shocked to
learn that Mitra had died and police is searching Ninawe.
Mitra extorted few lacs Rupees as advocate fees etc.
Mitra even sent e-mails as high court and police officials
to extort more money. Ninawe finally came down to
Mumbai to lodge a police case.
LEGAL PROVISIONS TO COUNTER
IDENTITY THEFT
• THE IT ACT 2000 IN ITS PRESENT FORM DOES NOT HAVE ANY
SPECIFIC PROVISION TO DEAL WITH IDENTITY THEFT.
HOWEVER, THE EXPERT COMMITTEE ON AMENDMENTS TO
THE IT ACT 2000 (WHOSE REPORT IS PRESENTLY UNDER
CONSIDERATION BY THE GOVERNMENT FOR ADOPTION) HAS
RECOMMENDED AMENDING THE INDIAN PENAL CODE (IPC)
BY INSERTING IN IT TWO NEW SECTIONS:
• SECTION 417 A WHICH PRESCRIBES PUNISHMENT OF UP TO 3
YEARS IMPRISONMENT AND FINE FOR 'CHEATING BY USING
ANY UNIQUE IDENTIFICATION FEATURE OF ANY OTHER
PERSON'; AND
• SECTION 419 A THAT PRESCRIBES PUNISHMENT OF UP TO 5
YEARS IMPRISONMENT AND FINE FOR 'CHEATING BY
IMPERSONATION' USING A NETWORK OR COMPUTER
RESOURCE.
FORGERY
• Andhra Pradesh Tax Case
In the explanation of the Rs. 22 Crore which was recovered
from the house of the owner of a plastic firm by the sleuths of
vigilance department, the accused person submitted 6000
vouchers to legitimize the amount recovered, but after careful
scrutiny of vouchers and contents of his computers it revealed
that all of them were made after the raids were conducted .
All vouchers were fake computerized vouchers.
CYBER STALKING
• Ritu Kohli (first lady to register the cyber stalking
case) is a victim of cyber-stalking. A friend of her
husband gave her phone number and name on a
chat site for immoral purposes. A computer expert,
Kohli was able to trace the culprit. Now, the latter is
being tried for "outraging the modesty of a woman",
under Section 509 of IPC.
CYBER DEFAMATION
• SMC Pneumatics (India) Pvt. Ltd. v. Jogesh Kwatra:
India’s first case of cyber defamation was reported
when a company’s employee (defendant) started
sending derogatory, defamatory and obscene e-mails
about its Managing Director. The e-mails were
anonymous and frequent, and were sent to many of
their business associates to tarnish the image and
goodwill of the plaintiff company.
The plaintiff was able to identify the defendant with
the help of a private computer expert and moved the
Delhi High Court. The court granted an ad-interim
injunction and restrained the employee from
sending, publishing and transmitting e-mails, which
are defamatory or derogatory to the plaintiffs.
ONLINE GAMBLING: VIRTUAL CASINOS, CASES
OF MONEY LAUNDERING
• Cyber lotto case: In Andhra Pradesh one Kola Mohan
created a website and an email address on the
Internet with the address 'eurolottery@usa.net.'
which shows his own name as beneficiary of 12.5
million pound in Euro lottery. After getting
confirmation with the email address a telgu
newspaper published this as news.
He gathered huge sums from the public as well as
from some banks. The fraud came to light only when
a cheque amounting Rs 1.73 million discounted by
him with Andhra bank got dishonored.
CYBER FORENSIC
SCIENCE OF EFFECTIVELY TRACKING EVIDENCE THAT CAN BE
EFFECTIVELY PRESENTED IN THE COURT AS A PROOF.
PROCEDURE OF SEARCH SAME BUT NEW SKILLS
CLASSIC SEARCH VISUALLY IDENTIFY THE EVIDENCE; NOT SO
IN ELECTRONIC FORM
TURNING RUST INTO EVIDENCE
COMPUTER INSTRUMENT OF CRIME OR REPOSITORY OF
EVIDENCE

More Related Content

Similar to law.pptx

cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxDivyaHinduja2
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
 

Similar to law.pptx (20)

IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Class it act
Class it actClass it act
Class it act
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptx
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
 

Recently uploaded

pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 

Recently uploaded (20)

pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 

law.pptx

  • 2. Why Cyber Law  GREATEST CULTURAL, ECONOMIC, POLITICAL AND SOCIAL TRANSFORMATION IN THE HISTORY OF HUMAN SOCIETY  DIFFERENT APPROACHES FOR CONTROLLING, REGULATING AND FACILITATING ELECTRONIC COMMUNICATION AND COMMERCE  IT ACT 2000 – INDIA’S FIRST CYBER LAW
  • 3. IT ACT 2000, CYBER LAW AND RELATED LEGAL ISSUES
  • 4. OBJECTIVES OF THE ACT  LEGAL RECOGNITION FOR E-COMMERCE - DIGITAL SIGNATURES AND REGULATORY REGIME - ELECTRONIC DOCUMENTS AT PAR WITH PAPER DOCUMENTS  E-GOVERNANCE - ELECTRONIC FILING OF DOCUMENTS  IT AMENDS - INDIAN PENAL CODE - INDIAN EVIDENCE ACT - BANKERS EVIDENCE ACT - RESERVE BANK OF INDIA ACT
  • 5.
  • 6. IT ACT 2000  LEGAL RECOGNITION FOR TRANSACTIONS:- CARRIED OUT BY MEANS OF ELECTRONIC DATA INTERCHANGE, AND OTHER MEANS OF ELECTRONIC COMMUNICATION  FACILITATE ELECTRONIC FILING OF DOCUMENTS WITH THE GOVERNMENT AGENCIES  AIMS TO PROVIDE FOR THE LEGAL FRAMEWORK SO THAT LEGAL SANCTITY IS ACCORDED TO ALL ELECTRONIC RECORDS AND OTHER ACTIVITIES CARRIED OUT BY ELECTRONIC MEANS
  • 7.  CAME INTO FORCE ON 17 OCTOBER 2000. CONSISTS OF 94 SECTIONS SEGREGATED INTO 13 CHAPTERS. FOUR SCHEDULES FORM PART OF THE ACT.  EXTENDS TO WHOLE OF INDIA AND ALSO APPLIES TO ANY OFFENCE OR CONTRAVENTION THERE UNDER COMMITTED OUTSIDE INDIA BY ANY PERSON {SECTION 1 (2)} READ WITH SECTION 75- ACT APPLIES TO OFFENCE OR CONTRAVENTION COMMITTED OUTSIDE INDIA BY ANY PERSON IRRESPECTIVE OF HIS NATIONALITY, IF SUCH ACT INVOLVES A COMPUTER, COMPUTER SYSTEM OR NETWORK LOCATED IN INDIA  SECTION 2 (1) (A) –”ACCESS” MEANS GAINING ENTRY INTO, INSTRUCTING OR COMMUNICATING WITH THE LOGICAL, ARITHMETIC OR MEMORY FUNCTION RESOURCES OF A COMPUTER, COMPUTER RESOURCE OR NETWORK  IT ACT CONFERS LEGAL RECOGNITION TO ELECTRONIC RECORDS AND DIGITAL SIGNATURES (SECTION 4,5 OF THE IT ACT,2000)
  • 8. IT ACT  ACCEPTANCE OF CONTRACT MAY BE EXPRESSED BY ELECTRONIC MEANS OF COMMUNICATION.  THE SAME SHALL HAVE LEGAL VALIDITY AND ENFORCEABILITY
  • 9. CIVIL WRONGS UNDER IT ACT  CHAPTER IX OF IT ACT, SECTION 43  WHOEVER WITHOUT PERMISSION OF OWNER OF THE COMPUTER – Secures access (mere U/A access) • Not necessarily through a network – Downloads, copies, extracts any data – Introduces or causes to be introduced any viruses or contaminant – Damages or causes to be damaged any computer resource • Destroy, alter, delete, add, modify or rearrange • Change the format of a file – Disrupts or causes disruption of any computer resource • Preventing normal continuance of computer
  • 10. – Denies or causes denial of access by any means • Denial of service attacks – Assists any person to do any thing above • Rogue Websites, Search Engines, Insiders providing vulnerabilities – Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource • Credit card frauds, Internet time thefts – Liable to pay damages not exceeding Rs. One crore to the affected party – Investigation by – ADJUDICATING OFFICER – Powers of a civil court
  • 11. AUTHENTICATION OF ELECTRONIC RECORDS  ANY SUBSCRIBER MAY AUTHENTICATE AN ELECTRONIC RECORD  AUTHENTICATION BY AFFIXING HIS DIGITAL SIGNATURE  ANY PERSON BY THE USE OF A PUBLIC KEY OF THE SUBSCRIBER CAN VERIFY THE ELECTRONIC RECORD
  • 12. DIGITAL SIGNATURES & ELECTRONIC RECORDS  LEGAL RECOGNITION OF DIGITAL SIGNATURES  USE OF ELECTRONIC RECORDS AND DIGITAL SIGNATURES IN GOVERNMENT AGENCIES  PUBLICATIONS OF RULES AND REGULATIONS IN THE ELECTRONIC GAZETTE
  • 13. ELECTRONIC SIGNATURES  DATA WHICH IS IN ELECTRONIC FORM AND WHICH CAN BE USED TO IDENTIFY THE SIGNATURE HOLDER WITH RESPECT TO THE ELECTRONIC RECORD TO WHICH IT IS RELATED, AND SERVES TO SIGNIFY APPROVAL OF THAT ELECTRONIC RECORD.  EXAMPLES – PIN/ PASSWORD – IMAGE OF HANDWRITTEN SIGNATURES – CRYPTOGRAPHIC CHECKSUMS – BIOMETRIC TECHNOLOGY: PHYSIOLOGICAL/ BEHAVIOURAL – DIGITAL SIGNATURES BASED ON ASYMMETRIC CRYPTO SYSTEM
  • 14. DIGITAL SIGNATURE AS PER IT ACT  TO VERIFY AUTHENTICITY AND INTEGRITY OF THE SIGNER AND THE DOCUMENT  TECHNOLOGY – ASYMMETRIC CRYPTOSYSTEM AND HASH FUNCTION – PRIVATE AND PUBLIC KEY  REGULATORY MECHANISM – CONTROLLER OF CERTIFYING AUTHORITIES – CERTIFYING AUTHORITIES
  • 15.
  • 16. CERTIFYING AUTHORITY  THE CONTROLLER OF CA SUPERVISES THE ACTIVITIES OF ALL CAS  EVEN THE FOREIGN CAS ARE RECOGNIZED BY THIS ACT
  • 17. CERTIFICATION AUTHORITIES  TRUSTWORTHY ENTITY - DEFINED POLICIES, REGULATION BY CCA  CERTIFIES AUTHENTICITY OF THE SUBSCRIBER BY APPROPRIATE MEANS  ISSUES DIGITAL CERTIFICATE - FUNCTIONING KEY PAIR - PUBLIC KEY - NAME, ADDRESS
  • 19. CONTROLLER OF CAS AND CAS  ALL PUBLIC / PRIVATE KEYS SHALL BE ISSUED BY CERTIFYING AUTHORITIES WHO SHALL BE SO LICENSED TO DO SO BY THE OFFICE OF THE “CONTROLLER OF CERTIFYING AUTHORITIES”  CERTIFYING AUTHORITIES TO FOLLOW PROCEDURES LAID DOWN - USE SECURE COMPUTERS - ENSURE SECRECY AND PRIVACY OF DIGITAL SIGNATURES  THE APPOINTMENT OF A “CONTROLLER OF CERTIFYING AUTHORITIES” AND “DEPUTY CONTROLLERS” AND ‘ASSTT CONTROLLERS” - THERE SHALL BE A SEAL FOR THIS OFFICE - BE THE REPOSITORY OF ALL DIGITAL SIGNATURE CERTIFICATES - POWERS TO GRANT RECOGNITION TO FOREIGN CERTIFYING AUTHORITIES, POWERS TO TAKE UP INVESTIGATIONS FOR ANY CONTRAVENTIONS OF THE ACT AS APPLICABLE FOR CERTIFYING AUTHORITIES AND SUSPEND LICENSE
  • 20. DATA DIDDLING: changing data prior or during input into a computer  Section 66 and 43(d) of the I.T. Act covers the offence of data diddling  Penalty: Not exceeding Rs. 1 crore NDMC Electricity Billing Fraud Case: A private contractor who was to deal with receipt and accounting of electricity bills by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance.
  • 22. OFFENCES & PENALTIES  PENALTIES FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM ETC. HAVE BEEN FIXED AS DAMAGES BY WAY OF COMPENSATION NOT EXCEEDING RS. 1,00,00,000/- TO AFFECTED PERSONS.  ADJUDICATING OFFICER HAVING THE POWER OF A CIVIL COURT SHALL ADJUDICATE  CYBER REGULATIONS APPELLATE TRIBUNAL WILL DEAL WITH THE APPEALS AGAINST THE ORDERS PASSED BY THE ABOVE  THE NEXT LEVEL OF APPEAL IS HIGH COURT
  • 23. COGNIZABILITY AND BAILABILITY  NOT MENTIONED IN THE ACT – RELY ON PART II OF SCHEDULE I OF CRPC • if punishable with death, imprisonment for life or imprisonment for more than 7 tears: cognizable, non- bailable, court of session • if punishable with imprisonment for 3 years and upwards but not more than 7 years: cognizable, non-bailable, magistrate of first class • if punishable with imprisonment of less than 3 years: non- cognizable, bailable, any magistrate (or controller of cas)
  • 24. SECTION 46 IT ACT • Section 46 of the IT Act states that an adjudicating officer shall be adjudging whether a person has committed a contravention of any of the provisions of the said Act, by holding an inquiry. Principles of Audi alterum partum and natural justice are enshrined in the said section which stipulates that a reasonable opportunity of making a representation shall be granted to the concerned person who is alleged to have violated the provisions of the IT Act. The said Act stipulates that the inquiry will be carried out in the manner as prescribed by the Central Government • All proceedings before him are deemed to be judicial proceedings, every Adjudicating Officer has all powers conferred on civil courts • Appeal to cyber Appellate Tribunal- from decision of Controller, Adjudicating Officer {section 57 IT act}
  • 25. SECTION 47, IT ACT Section 47 of the Act lays down that while adjudging the quantum of compensation under this Act, the adjudicating officer shall have due regard to the following factors, namely- (a) the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; (b) the amount of loss caused to any person as a result of the default; (c) the repetitive nature of the default
  • 26. CYBERCRIME PROVISIONS OFFENCE RELEVANT SECTION UNDER IT ACT TAMPERING WITH COMPUTER SOURCE DOCUMENTS SEC 65 HACKING WITH COMPUTER SYSTEMS, DATA ALTERATION SEC 66 PUBLISHING OBSCENE INFORMATION SEC 67 UN-AUTHORIZED ACCESS TO PROTECTED SYSTEM SEC 70 BREACH OF CONFIDENTIALITY AND PRIVACY SEC 72 PUBLISHING FALSE DIGITAL SIGNATURE CERTIFICATES SEC 73
  • 27. SECTION 65: SOURCE CODE  MOST IMPORTANT ASSET OF SOFTWARE COMPANIES  “COMPUTER SOURCE CODE" MEANS THE LISTING OF PROGRAMMES, COMPUTER COMMANDS, DESIGN AND LAYOUT  INGREDIENTS - knowledge or intention - concealment, destruction, alteration - computer source code required to be kept or maintained by law  PUNISHMENT - imprisonment up to three years, and / or - fine up to Rs 2 lakh  COGNIZABLE, NON BAILABLE, JMIC
  • 28. SECTION 66: HACKING  INGREDIENTS – intention or knowledge to cause wrongful loss or damage to the public or any person – destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource  PUNISHMENT – imprisonment up to three years, and / or – fine up to Rs 2 lakh  COGNIZABLE, NON BAILABLE, JMIC  COVERS CRIMES LIKE – trojan, virus, worm, logic bombs etc – internet time theft, analysis of electromagnetic waves generated by computers
  • 29. SEC. 67. PORNOGRAPHY  INGREDIENTS – publishing or transmitting or causing to be published – in the electronic form, – obscene material  PUNISHMENT – ON FIRST CONVICTION • imprisonment of either description up to five years and • fine up to Rs 1 lakh – ON SUBSEQUENT CONVICTION • imprisonment of either description up to ten years and • fine up to Rs 2 lakh  SECTION COVERS – internet service providers, – search engines, – pornographic websites  COGNIZABLE, NON-BAILABLE, JMIC/ COURT OF SESSIONS
  • 30. SEC 68 CONTROLLER’S DIRECTIONS  INGREDIENTS – Failure to comply with order of Controller – Order directing a Certifying Authority or its employee to take measures or cease carrying on activities as specified  PUNISHMENT – imprisonment up to three years, and / or – fine up to Rs 2 lakh  COGNIZABLE, NON-BAILABLE, JMIC
  • 31. SEC 69: DECRYPTION OF INFO  INGREDIENTS – CONTROLLER ISSUES ORDER TO GOVERNMENT AGENCY TO INTERCEPT ANY INFORMATION TRANSMITTED THROUGH ANY COMPUTER RESOURCE. – ORDER IS ISSUED IN THE INTEREST OF THE • sovereignty or integrity of India, • the security of the State, • friendly relations with foreign States, • public order or • preventing incitement for commission of a cognizable offence – PERSON IN CHARGE OF THE COMPUTER RESOURCE FAILS TO EXTEND ALL FACILITIES AND TECHNICAL ASSISTANCE TO DECRYPT THE INFORMATION.
  • 32.  APPLICABILITY – email messages (if encrypted) – encrypted messages – steganographic images – password protected files (?)  PUNISHMENT – imprisonment up to 7 years  COGNIZABLE, NON-BAILABLE, JMIC
  • 33. SEC 72 BREACH OF PRIVACY  INGREDIENTS – Unauthorised disclosure of information obtained in pursuance of powers conferred by the IT Act or rules  PUNISHMENT – Imprisonment up to 2 years and or fine up to Rs. 1 lakh  NON-COGNIZABLE, BAILABLE, ANY MAGISTRATE
  • 35. SEC 73 PUBLISHING FALSE DSC  INGREDIENTS – PUBLISHING CERTIFICATE KNOWING THAT: • CA listed in it has not issued it • Subscriber listed in it has not accepted it • Certificate has been revoked / suspended  PUNISHMENT • Imprisonment up to 2 years and or fine up to Rs. 1 lakh  NON-COGNIZABLE, BAILABLE, ANY MAGISTRATE
  • 36. SEC 74 PUBLICATION FOR FRAUDULENT PURPOSE  INGREDIENTS – Creating, publishing or making available Certificate for fraudulent or unlawful purpose is made punishable  PUNISHMENT – Imprisonment up to 2 years and or fine up to Rs. 1 lakh  NON-COGNIZABLE, BAILABLE, ANY MAGISTRATE
  • 37. BUT……..  ALL CYBER CRIMES DO NOT COME UNDER THE INFORMATION TECHNOLOGY ACT, 2000.  MANY CYBER CRIMES COME UNDER THE INDIAN PENAL CODE
  • 38. COMPUTER RELATED CRIMES UNDER IPC AND SPECIAL LAWS SENDING THREATENING MESSAGES BY EMAIL SEC 503 IPC SENDING DEFAMATORY MESSAGES BY EMAIL SEC 499 IPC FORGERY OF ELECTRONIC RECORDS SEC 463 IPC BOGUS WEBSITES, CYBER FRAUDS SEC 420 IPC EMAIL SPOOFING SEC 463 IPC ONLINE SALE OF DRUGS NDPS ACT ONLINE SALE OF ARMS ARMS ACT
  • 39. PROCEDURAL ASPECTS  INVESTIGATION POWERS - Officer not below the rank of DySP (sec 78)  POWER OF ENTRY, SEARCH AND SEIZURE AND ARREST FROM PUBLIC PLACES Officer not below the rank of DySP (sec 80)/ Cyber cafes/ Committed, suspected of committing/about to commit a crime  POWER TO ORDER DECRYPTION (SEC. 68), Controller  LIABILITY OF NSPS (SECTION 79) – Not liable being intermediaries – Due care, lack of knowledge
  • 40. CYBER LAW ADMINISTRATION  CYBER REGULATIONS ADVISORY COMMITTEE – Apex advisory agency for policy guidance to the Government  CONTROLLER OF CERTIFYING AUTHORITIES – Regulate and administer the certifying authorities – Shall investigate cases ( in accordance with the Income Tax Act) of contravention of the act by the Certifying authorities – Resolve conflicts of interest between CA and its subscriber – Power to access any computer
  • 41.
  • 42. INVESTIGATING OFFICER ALL THE OFFENCES SHALL BE INVESTIGATED BY AN OFFICER NOT BELOW THE RANK OF DSP
  • 43. GREY AREAS  IT IS NOT CLEAR IF THE CRIME IS COMMITTED OUTSIDE INDIA AS TO HOW IT WILL BE DEALT  CA FUNCTION UNDER GOVT. OF INDIA WHICH WILL BUREAUCRATIZE THE ENTIRE PROCESS  ALL THE CRIMES ARE NOT EXHAUSTIVELY DEALT, LIKE CYBER HARASSMENT, DEFAMATION, STALKING ETC.  TERRITORIAL JURISDICTION OF ADJUDICATING OFFICERS & TRIBUNAL ARE NOT DEFINED.
  • 44.  POWER GIVEN TO THE IO - CAN ENTER ANY PUBLIC PLACE - SEARCH & ARREST WITHOUT ANY WARRANT - ANY PERSON WHO IS REASONABLY SUSPECTED TO HAVE COMMITTED/COMMITTING/ABOUT TO COMMIT ANY OFFENCE UNDER THIS ACT
  • 45. EMAIL SPOOFING • Pranab Mitra , former executive of Gujarat Ambuja Cement posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen . After long cyber relationship and emotional massages Mitra sent an e-mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend Ruchira Sengupta’s’’ e- mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case.
  • 46. LEGAL PROVISIONS TO COUNTER IDENTITY THEFT • THE IT ACT 2000 IN ITS PRESENT FORM DOES NOT HAVE ANY SPECIFIC PROVISION TO DEAL WITH IDENTITY THEFT. HOWEVER, THE EXPERT COMMITTEE ON AMENDMENTS TO THE IT ACT 2000 (WHOSE REPORT IS PRESENTLY UNDER CONSIDERATION BY THE GOVERNMENT FOR ADOPTION) HAS RECOMMENDED AMENDING THE INDIAN PENAL CODE (IPC) BY INSERTING IN IT TWO NEW SECTIONS: • SECTION 417 A WHICH PRESCRIBES PUNISHMENT OF UP TO 3 YEARS IMPRISONMENT AND FINE FOR 'CHEATING BY USING ANY UNIQUE IDENTIFICATION FEATURE OF ANY OTHER PERSON'; AND • SECTION 419 A THAT PRESCRIBES PUNISHMENT OF UP TO 5 YEARS IMPRISONMENT AND FINE FOR 'CHEATING BY IMPERSONATION' USING A NETWORK OR COMPUTER RESOURCE.
  • 47. FORGERY • Andhra Pradesh Tax Case In the explanation of the Rs. 22 Crore which was recovered from the house of the owner of a plastic firm by the sleuths of vigilance department, the accused person submitted 6000 vouchers to legitimize the amount recovered, but after careful scrutiny of vouchers and contents of his computers it revealed that all of them were made after the raids were conducted . All vouchers were fake computerized vouchers.
  • 48. CYBER STALKING • Ritu Kohli (first lady to register the cyber stalking case) is a victim of cyber-stalking. A friend of her husband gave her phone number and name on a chat site for immoral purposes. A computer expert, Kohli was able to trace the culprit. Now, the latter is being tried for "outraging the modesty of a woman", under Section 509 of IPC.
  • 49. CYBER DEFAMATION • SMC Pneumatics (India) Pvt. Ltd. v. Jogesh Kwatra: India’s first case of cyber defamation was reported when a company’s employee (defendant) started sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the plaintiff company. The plaintiff was able to identify the defendant with the help of a private computer expert and moved the Delhi High Court. The court granted an ad-interim injunction and restrained the employee from sending, publishing and transmitting e-mails, which are defamatory or derogatory to the plaintiffs.
  • 50. ONLINE GAMBLING: VIRTUAL CASINOS, CASES OF MONEY LAUNDERING • Cyber lotto case: In Andhra Pradesh one Kola Mohan created a website and an email address on the Internet with the address 'eurolottery@usa.net.' which shows his own name as beneficiary of 12.5 million pound in Euro lottery. After getting confirmation with the email address a telgu newspaper published this as news. He gathered huge sums from the public as well as from some banks. The fraud came to light only when a cheque amounting Rs 1.73 million discounted by him with Andhra bank got dishonored.
  • 51. CYBER FORENSIC SCIENCE OF EFFECTIVELY TRACKING EVIDENCE THAT CAN BE EFFECTIVELY PRESENTED IN THE COURT AS A PROOF. PROCEDURE OF SEARCH SAME BUT NEW SKILLS CLASSIC SEARCH VISUALLY IDENTIFY THE EVIDENCE; NOT SO IN ELECTRONIC FORM TURNING RUST INTO EVIDENCE COMPUTER INSTRUMENT OF CRIME OR REPOSITORY OF EVIDENCE