SlideShare a Scribd company logo
PRESENTED BY
ABIRAMI. ABEL.
CYBER LAW
CYBER CRIME
crime
computer
CYBER LAW
 a combination of
 crime and computer.
 To put it in simple terms ‘any offence
or crime in which a computer is used is
called cyber crime
REASONS BEHIND IT ACT
 E-commerce industry
 e-mail
 Digital signatures and digital records
 e-governance.
IT ACT 2000
 The Information Technology Act, 2000, was thus
passed as the Act No.21 of 2000, got President
assent on 9 June and was made effective from 17
October 2000.
 The Act totally has 13 chapters and 90 sections
 four Acts namely
 The Indian Penal Code 1860,
 The Indian Evidence Act 1872,
 The Bankers’ Books Evidence Act 1891 and
• The Reserve Bank of India Act 1934).
Reasonable Security Practices
 Site certification
 Security initiatives
 Awareness Training
 Conformance to Standards, certification
 Policies and adherence to policies
 Policies like password policy, Access
 Control, email Policy etc
 Periodic monitoring and review.
Some of the K ey highlights of the
ITAA are as follows
 Focusing on data privacy
 Focusing on Information Security
 Defining cyber café
 Making digital signature technology neutral
 Defining reasonable security practices to be
followed by corporate
 Inclusion of some additional cyber crimes like
child pornography and cyber terrorism
The Act essentially deals with the
following issues
 Legal Recognition of Electronic
Documents - email
 Legal Recognition of Digital
Signatures
 e-governance
 To facilitate EFT between the financial
institutions and banks
Observations on ITA
 Awareness
 Evidences
 Non coverage of many crimes
 Jurisdiction
Cyber law

More Related Content

What's hot

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Anusha Kadayyanmath
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
Harsh Kumar
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
9945446746
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Cyber law
Cyber law Cyber law
Cyber law
Arshad_A
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
Hamza Khalid
 

What's hot (20)

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 

Similar to Cyber law

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
Monica Thakur
 
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
SheikhFiroz1
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
PallaviThukral2
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
mohdadil02912
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
kumagirl
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
aryan358156
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
roystoncdsouza7
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
roystoncdsouza7
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
Harini Sai
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
PAYAL SINHA
 
IT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptxIT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptx
227Stijisp
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
ATHULYARAJDS
 

Similar to Cyber law (20)

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
It act 2000
It act 2000It act 2000
It act 2000
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
IT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptxIT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Cyber law

  • 3. CYBER LAW  a combination of  crime and computer.  To put it in simple terms ‘any offence or crime in which a computer is used is called cyber crime
  • 4. REASONS BEHIND IT ACT  E-commerce industry  e-mail  Digital signatures and digital records  e-governance.
  • 5. IT ACT 2000  The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000, got President assent on 9 June and was made effective from 17 October 2000.  The Act totally has 13 chapters and 90 sections  four Acts namely  The Indian Penal Code 1860,  The Indian Evidence Act 1872,  The Bankers’ Books Evidence Act 1891 and • The Reserve Bank of India Act 1934).
  • 6. Reasonable Security Practices  Site certification  Security initiatives  Awareness Training  Conformance to Standards, certification  Policies and adherence to policies  Policies like password policy, Access  Control, email Policy etc  Periodic monitoring and review.
  • 7. Some of the K ey highlights of the ITAA are as follows  Focusing on data privacy  Focusing on Information Security  Defining cyber café  Making digital signature technology neutral  Defining reasonable security practices to be followed by corporate  Inclusion of some additional cyber crimes like child pornography and cyber terrorism
  • 8. The Act essentially deals with the following issues  Legal Recognition of Electronic Documents - email  Legal Recognition of Digital Signatures  e-governance  To facilitate EFT between the financial institutions and banks
  • 9. Observations on ITA  Awareness  Evidences  Non coverage of many crimes  Jurisdiction