SlideShare a Scribd company logo
Submitted by
ATHULYARAJ D S
Roll No: 30
Physical Science
CYBER LAW
Cyber law also called IT law is the law
regarding information technology including
computers and internet.
It is related to legal informatics and
supervise the digital circulation of
information, software information security
and e-commerce.
Importance of Cyber Law
It covers all transactions over
internet
It keeps eyes on all activities over
internet
It touches every action and every
reaction in cyber space
Advantages of Cyber law
Organisations are now able to carry out e-
commerce
Digital signatures have been given legal
validity and sanction in the act
It allows government to issue modification
on the web, thus heralding e-commerce
It addresses, the important issues of security,
which are so critical to the success of
electronic transactions.
IT ACT 2000
 The primary source of cyber law in India is the
Information technology Act, 2000( IT Act) which is
dealing with cyber crime and electronic commerce
.
 The act of parliament received the assent of the
president on 9th June 2000.
IT act came into force on 17th October 2000.
 IT act 2000 is based on UNCITRAL(United
Nations Commission on International Trade Law)
Model Law.
IT Act 2000 has 13 chapters, 94 sections and 4
schedules.
It is an act to provide legal recognition for
transactions carried out by means of electronic
communication, commonly referred to as “electronic
commerce”.
Electronic commerce can now be carried out by
persons to whom a ‘Digital Certificate’ is issued.
 Any person to whom such certificate is issued can
now authenticate an electronic record by affixing his
digital signature to the document.
Objectives of IT Act 2000
Legal recognition to transactions carried out by
means of electronic data interchange.
Promote e-commerce which is an alternative to the
paper based method of communication and storage of
information.
To facilitate e-filling of documents with the
government departments and agencies.
To bring suitable amendments to the existing laws in
pursuit of the objectives of IT Act.
Important Sections of IT Act 2000
Section 43: Penalty and compensation for damage to
computer, computer system etc.
Section 65 : Cyber tampering
Section 66 : Hacking with computer system
Section66A: Punishment for sending offensive
messages through computers or any other
communication devices such as mobile phone or
tablets.
Section 66B: Punishment for stolen
computers or resources to the identified theft.
Section 66C: Punishment to identity theft
Section 66D: Cyber personation
Section 66E: Punishment for violation of
privacy
Section 66F : Cyber terrorism
Section 67: Punishment for publishing or
transmitting obscene material in electronic form
Section 67A: Cyber pornography
Section 70 :Prevents unauthorized to protected
system
Section 73: Penalty for publishing false digital
signature certificate
On March 24,2015, Supreme court deleted
the section 66A of IT Act
IT ACT 2008
 The IT Amendment Act 2008 is a substantial
addition to IT Act 2000.
 The IT Amendment was passed by the Indian
parliament in October 2008 and came into force on
October 27, 2009.
The act is administered by Indian Computer
Emergency Response team.
 The original act was developed to promote the IT
industry, regulate e-commerce, facilitate e-
governance and prevent cybercrime.
The act also seek to foster security practices within
India that would serve the country in a global context.
 The amendment was created to address issues that the
original bill failed to cover and to accommodate further
development of IT and related security concerns since the
original law was passed.
IT Act 2008 has 14 chapters, 124 sections, and 2
schedules. The electronic document is schedule
1 and electronic signature is schedule 2.
Changes in the amendment include:
•Redefining terms such as “communication device” to
reflect current use
•Validating electronic signatures and contracts
•Making the owner of a given IP address responsible
for content accessed or distributed through it.
•Making corporations responsible for implementing
effective data security practices and liable for
breaches.
•The amendment has been criticized for decreasing
the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of
individuals.
Cyber law – it act 2000,it act 2008

More Related Content

What's hot

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber law
Cyber lawCyber law
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Sonu Mishra
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 

What's hot (20)

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber law
Cyber lawCyber law
Cyber law
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Information technology act
Information technology actInformation technology act
Information technology act
 

Similar to Cyber law – it act 2000,it act 2008

Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
ATHULYARAJDS
 
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
AnimeshTripathi33
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
PAYAL SINHA
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
Nayana Pingle
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
Monica Thakur
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
RAJ ANAND
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
The information technology act
The information technology actThe information technology act
The information technology actDhii Raymond
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 

Similar to Cyber law – it act 2000,it act 2008 (20)

Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
It act 2000
It act 2000It act 2000
It act 2000
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
The information technology act
The information technology actThe information technology act
The information technology act
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 

More from ATHULYARAJDS

Innovative Work .pdf
Innovative Work .pdfInnovative Work .pdf
Innovative Work .pdf
ATHULYARAJDS
 
SOLUTIONS (2).pdf
SOLUTIONS (2).pdfSOLUTIONS (2).pdf
SOLUTIONS (2).pdf
ATHULYARAJDS
 
camp.pdf
camp.pdfcamp.pdf
camp.pdf
ATHULYARAJDS
 
Basic_First_Aid.ppt
Basic_First_Aid.pptBasic_First_Aid.ppt
Basic_First_Aid.ppt
ATHULYARAJDS
 
Scientist LP ppt.pptx
Scientist LP ppt.pptxScientist LP ppt.pptx
Scientist LP ppt.pptx
ATHULYARAJDS
 
MCQ EDU 03
MCQ EDU 03MCQ EDU 03
MCQ EDU 03
ATHULYARAJDS
 
MCQ EDU 01
MCQ EDU 01MCQ EDU 01
MCQ EDU 01
ATHULYARAJDS
 
Assignment edu 01
Assignment edu 01Assignment edu 01
Assignment edu 01
ATHULYARAJDS
 
Major changes occured in indian society
Major changes occured in indian societyMajor changes occured in indian society
Major changes occured in indian society
ATHULYARAJDS
 

More from ATHULYARAJDS (9)

Innovative Work .pdf
Innovative Work .pdfInnovative Work .pdf
Innovative Work .pdf
 
SOLUTIONS (2).pdf
SOLUTIONS (2).pdfSOLUTIONS (2).pdf
SOLUTIONS (2).pdf
 
camp.pdf
camp.pdfcamp.pdf
camp.pdf
 
Basic_First_Aid.ppt
Basic_First_Aid.pptBasic_First_Aid.ppt
Basic_First_Aid.ppt
 
Scientist LP ppt.pptx
Scientist LP ppt.pptxScientist LP ppt.pptx
Scientist LP ppt.pptx
 
MCQ EDU 03
MCQ EDU 03MCQ EDU 03
MCQ EDU 03
 
MCQ EDU 01
MCQ EDU 01MCQ EDU 01
MCQ EDU 01
 
Assignment edu 01
Assignment edu 01Assignment edu 01
Assignment edu 01
 
Major changes occured in indian society
Major changes occured in indian societyMajor changes occured in indian society
Major changes occured in indian society
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Cyber law – it act 2000,it act 2008

  • 1. Submitted by ATHULYARAJ D S Roll No: 30 Physical Science
  • 2.
  • 3. CYBER LAW Cyber law also called IT law is the law regarding information technology including computers and internet. It is related to legal informatics and supervise the digital circulation of information, software information security and e-commerce.
  • 4. Importance of Cyber Law It covers all transactions over internet It keeps eyes on all activities over internet It touches every action and every reaction in cyber space
  • 5. Advantages of Cyber law Organisations are now able to carry out e- commerce Digital signatures have been given legal validity and sanction in the act It allows government to issue modification on the web, thus heralding e-commerce It addresses, the important issues of security, which are so critical to the success of electronic transactions.
  • 6.
  • 7. IT ACT 2000  The primary source of cyber law in India is the Information technology Act, 2000( IT Act) which is dealing with cyber crime and electronic commerce .  The act of parliament received the assent of the president on 9th June 2000. IT act came into force on 17th October 2000.  IT act 2000 is based on UNCITRAL(United Nations Commission on International Trade Law) Model Law.
  • 8. IT Act 2000 has 13 chapters, 94 sections and 4 schedules. It is an act to provide legal recognition for transactions carried out by means of electronic communication, commonly referred to as “electronic commerce”. Electronic commerce can now be carried out by persons to whom a ‘Digital Certificate’ is issued.  Any person to whom such certificate is issued can now authenticate an electronic record by affixing his digital signature to the document.
  • 9. Objectives of IT Act 2000 Legal recognition to transactions carried out by means of electronic data interchange. Promote e-commerce which is an alternative to the paper based method of communication and storage of information. To facilitate e-filling of documents with the government departments and agencies. To bring suitable amendments to the existing laws in pursuit of the objectives of IT Act.
  • 10. Important Sections of IT Act 2000 Section 43: Penalty and compensation for damage to computer, computer system etc. Section 65 : Cyber tampering Section 66 : Hacking with computer system Section66A: Punishment for sending offensive messages through computers or any other communication devices such as mobile phone or tablets.
  • 11. Section 66B: Punishment for stolen computers or resources to the identified theft. Section 66C: Punishment to identity theft Section 66D: Cyber personation Section 66E: Punishment for violation of privacy Section 66F : Cyber terrorism
  • 12. Section 67: Punishment for publishing or transmitting obscene material in electronic form Section 67A: Cyber pornography Section 70 :Prevents unauthorized to protected system Section 73: Penalty for publishing false digital signature certificate On March 24,2015, Supreme court deleted the section 66A of IT Act
  • 14.  The IT Amendment Act 2008 is a substantial addition to IT Act 2000.  The IT Amendment was passed by the Indian parliament in October 2008 and came into force on October 27, 2009. The act is administered by Indian Computer Emergency Response team.  The original act was developed to promote the IT industry, regulate e-commerce, facilitate e- governance and prevent cybercrime.
  • 15. The act also seek to foster security practices within India that would serve the country in a global context.  The amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed. IT Act 2008 has 14 chapters, 124 sections, and 2 schedules. The electronic document is schedule 1 and electronic signature is schedule 2.
  • 16. Changes in the amendment include: •Redefining terms such as “communication device” to reflect current use •Validating electronic signatures and contracts •Making the owner of a given IP address responsible for content accessed or distributed through it. •Making corporations responsible for implementing effective data security practices and liable for breaches. •The amendment has been criticized for decreasing the penalties for some cybercrimes and for lacking sufficient safeguards to protect the civil rights of individuals.