In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Indian cyber law expert firm helps for all types of cyber related laws and crime. Cyberjure is cyber lawyer expert firms in india located in Mumbai as cyber law expert Mumbai
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
The Digital Vivekanand for you - When the CIA director cannot hide his activities online, what hope is there for the rest of us - Hacking - IT Act 2000 - Cyber Forensics - Cyber Crime and Cyber Laws - How to make and remember cryptic password - Encryption - Digital evidence - PowerPoint Presentation by Jyotindra Zaveri - Internet Consultant - Big Brother is watching You
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Indian cyber law expert firm helps for all types of cyber related laws and crime. Cyberjure is cyber lawyer expert firms in india located in Mumbai as cyber law expert Mumbai
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
The Digital Vivekanand for you - When the CIA director cannot hide his activities online, what hope is there for the rest of us - Hacking - IT Act 2000 - Cyber Forensics - Cyber Crime and Cyber Laws - How to make and remember cryptic password - Encryption - Digital evidence - PowerPoint Presentation by Jyotindra Zaveri - Internet Consultant - Big Brother is watching You
Social Media and Cyber Law in India By Prashant MaliAdv Prashant Mali
Social Media and Cyber Law for DSCI Infosec event - Prashant Mali
Section 66A of the IT Act,2000 and freedom of expression on internet and social networking websites
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
With the changing times, the mode of producing evidence before Court has also changed. Most of the evidence presented before Courts is going to be Digital Evidence, so it is necessary to understand nature and methods to capture such evidence and present the same before Court.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
Cyber law expert Karnika Seth delivered a lecdture on rising Cybercrimes and the Information Technology Act,2000 applicable in India to combat Cybercrime. It discusses thye latest trends in Cyberlaw in India, case studies, IT Act,2000 and strategies to combat cybercrimes.
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joymanumelwin
For more interesting case studies and updates about Gamification, visit my website
https://www.youtube.com/channel/UCm_r2ZYJJBwGJ2rAaRNTNBA/videos
Volkswagen was in need of skilled mechanics. So clearly, they should just jumped on the web and started advertising for open positions, right? Wrong. The best candidates may already be working somewhere else. Volkswagen chose a no less unusual place for their vacancy ads.
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...manumelwin
For more interesting case studies and updates about Gamification, visit my website
https://www.youtube.com/channel/UCm_r2ZYJJBwGJ2rAaRNTNBA/videos
The Swedish Armed Forces are recruiting. They need young men and women for an occupation that in many ways is about giving up your own safety in order to help others. They wanted to activate the target group while simultaneously raising the question. Would people sacrifice their own freedom for someone they have no relation to? Are people prepared to show that they care in ways that don’t include sharing something on Facebook or tweeting a specific hash-tag?
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joymanumelwin
For more interesting case studies and updates about Gamification, visit my website
https://www.youtube.com/channel/UCm_r2ZYJJBwGJ2rAaRNTNBA/videos
In an attempt to recruit a large number of workers for their new megastore in Australia, IKEA amusingly decided to include what they called ‘Career Instructions’ into each of their flat packs. Based on their traditional furniture instructions, all customers took home the witty application forms without realising. The clever initiative not only minimised the costs on advertising, but it also ensured IKEA fans were targeted.
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joymanumelwin
For more interesting case studies and updates about Gamification, visit my website
https://www.youtube.com/channel/UCm_r2ZYJJBwGJ2rAaRNTNBA/videos
One great historical example of gamification is the Daily Telegraph’s crossword, which British Intelligence agents created along with Alan Turing, to help them recruit new code breakers from the public.
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...manumelwin
In statistics, a Yates analysis is an approach to analyzing data obtained from a designed experiment, where a factorial design has been used. This algorithm was named after the English statistician Frank Yates and is called Yates' algorithm.
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...manumelwin
In statistics, a full factorial experiment is an experiment whose design consists of two or more factors, each with discrete possible values or "levels", and whose experimental units take on all possible combinations of these levels across all such factors.
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...manumelwin
In 1955, Duncan devised a method to compare each treatment mean with every other treatment mean. The procedure is simple and powerful and has become very popular among researchers, especially in the plant science area.
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...manumelwin
The Latin square design is used where the researcher desires to control the variation in an experiment that is related to rows and columns in the field.
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...manumelwin
A completely randomized design (CRD) is one where the treatments are assigned completely at random so that each experimental unit has the same chance of receiving any one treatment.
For the CRD, any difference among experimental units receiving the same treatment is considered as experimental error.
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...manumelwin
Analysis of Variance technique is used to test whether the mean of several samples differ significantly. An agronomist may like to know whether yield per acre will be the same if four different varieties of wheat are sown in different identical plots. A diary farm may like to test whether there is significant difference between the quality and quantity of milk obtained from different classes of cattle. A business manager may like to find out whether there is any difference in the average sales by four salesmen.
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...manumelwin
Planning an experiment to obtain appropriate data and drawing inference out of the data with respect to any problem under investigation is known as design and analysis of experiments.
This might range anywhere from the formulations of the objectives of the experiment in clear terms to the final stage of the drafting reports incorporating the important findings of the enquiry
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...manumelwin
In 2010, American businesses will spend over $562 billion on information systems hardware, software, and telecommunications equipment. In addition, they will spend another $800 billion on business and management consulting and services—much of which involves redesigning firms’ business operations to take advantage of these new technologies.
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...manumelwin
The computer networking revolution began in the early 1960s and has led us to today s technology. The Internet was first invented for military purposes, and then expanded to the purpose of communication among scientists. The invention also came about in part by the increasing need for computers in the 1960s. The Internet is bringing a revolution along with it. Access to information combined with global supply and demand is reshaping established conventions and destroying old world definitions.
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...manumelwin
A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most if not all smartphones also support Wi-Fi. Smartphones are typically pocket-sized, as opposed to tablets, which are much larger.Smartphones became widespread in the late 2000s. In the third quarter of 2012, one billion smartphones were in use worldwide. Global smartphone sales surpassed the sales figures for feature phones in early 2013.
Definition of information system - Dr. Manu Melwin Joy - School of Management...manumelwin
An information system is a set of interrelated components that collect, process, store, and distribute information to support decision making and control in an organization.
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...manumelwin
Image result for pestel analysis
A PESTEL analysis is a framework or tool used by marketers to analyse and monitor the macro-environmental (external marketing environment) factors that have an impact on an organisation. The result of which is used to identify threats and weaknesses which is used in a SWOT analysis.
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joymanumelwin
Neuro human resource management is a new field of human resource management which uses medical technologies such as functional Magnetic Resonance Imaging (fMRI) to study the brain's responses to enhance employee experience. The term Neuro Human Resource Management (NHRM) was coined by noted HR expert Dr. Manu Melwin Joy in April 2017.
Industrial marketing (B2B) is the marketing of goods and services by one business to another. Industrial goods are those an industry uses to produce an end product from one or more raw materials.
Industrial marketing (B2B) is the marketing of goods and services by one business to another. Industrial goods are those an industry uses to produce an end product from one or more raw materials.
Green marketing is the of products that are presumed to be environmentally safe. It incorporates a broad range of activities, including product modification, changes to the production process, sustainable packaging, as well as modifying advertising.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2. Prepared By
Manu Melwin Joy
Assistant Professor
Ilahia School of Management Studies
Kerala, India.
Phone – 9744551114
Mail – manu_melwinjoy@yahoo.com
Kindly restrict the use of slides for personal purpose.
Please seek permission to reproduce the same in public forms and presentations.
3. Introduction
• In discharge of its
international responsibility,
the Government of India
enacted a Law in 2000
known as Information
Technology Act 2000.
• The Act extends to the
whole of India and it applies
also to any offence or
contravention thereon
committed outside India by
any person.
4. Objects of the Act
• To grant legal recognition to
electronic records.
• To grant legal recognition to
digital signatures.
• To permit retention of
information, documents and
records in electronic forms.
• To foster use and acceptance of
electronic records and digital
signatures in the Government
offices and its agencies.
• To prevent possible misuse of
electronic medium.
• To prevent and arrest offences as
well as deter the abuse of
information Technology.
5. Digital signature
• Digital signature is
authentication of an
electronic record by a
subscriber by means of an
electronic method or
procedure.
6. Digital signature
• Digital signature is created in two
distinct steps.
– Electronic record is converted into a
message digest by using a
mathematical function known as
‘hash function’ which digitally
freezes the electronic record thus
ensuring the integrity of the content
of the intended communication
contained in the electronic record.
– Identity of the person affixing the
digital signature is authenticated
through the use of a private key
which attaches itself to the message
digest and which can be verified by
any person who has the public key
corresponding to the private key.
7. Electronic governance
• Legal recognition of electronic records.
• Legal recognition of digital signature.
• Use of electronic records and digital
signatures in government.
• Retention of electronic records.
• Publication of rules, regulations etc in
Electronic Gazette.
• Power to make rules by Central
government in respect of digital signature.
8. Attribution of electronic records
• An electronic record shall be
attributed to the originator
– If it was sent by the originator
himself.
– By a person who had the
authority to act on behalf of
the originator in respect of that
electronic record.
– By an information system
programmed by or on behalf of
the originator to operate
automatically.
9. Acknowledgment of electronic records
• Where the originator has not
agreed with the addressee that
the acknowledgment of receipt
of electronic record be given in
a particular form or by a
particular method, an
acknowledgement may be
given by
– Any communication by the
addressee, automated or
otherwise.
– Any conduct of addressee,
sufficient to indicate to the
originator that the electronic
record has been received.
10. Dispatch of electronic records
– The dispatch of an electronic record
occurs when it enters a computer
resource outside the control of the
originator.
– The time of receipt of an electronic
record shall be determined as
follows: (a) if the addressee has
designated a computer resource for
the purpose of receiving electronic
records (b) if the addressee has not
designated a computer resource
along with specified timings, receipt
occurs when the electronic record
enters the computing resource and
(3) an electronic record is deemed
to be dispatched from the place of
business of the originator.
11. Security of electronic records and
digital signatures
• Secure electronic record.
• Secure digital signature.
• Security procedure.
12. Regulation of certifying authorities
• Certifying authority is a
person who has granted a
license to issue a digital
signature.
• Appointment of controller
certifying authorities – The
central government by
notification in the official
gazette appoints a controller
of certifying authorities.
13. Regulation of certifying authorities
• Power to investigate
contravention and making
access to computer – The
controller or any officer
authorized by him shall
investigate any contravention
of the provision of this act,
regulates or rules made
thereunder. Those officers in
such cases, shall have access
to any computer system or
data.
14. Regulation of certifying authorities
• Functions of Controller.
– Exercising supervision over the
activities of the certifying
authorities.
– Certifying public keys of the
certifying authorities.
– Laying down the standards to
be maintained by the certifying
authorities.
– Specifying the qualification and
experience which employees of
the certifying authorities
should possess.
15. Digital signature certificates
• Issue of Digital signature certificate
– Any person may make an
application to the certifying
authority for the issue of a digital
signature certificate which is
accompanied by a fee and
certification practice statement. On
receipt of an application, the
certifying authority may, after
consideration of the certification
practice statement and after
making such enquiries it may deem
fit (a) grand the digital signature
certificate or (b) for reasons to be
recorded in writing rejection of
application.
16. Digital signature certificates
• Suspension of Digital
signature certificate – The
certifying authority which has
issued a digital signature
certificate may suspend such
certificate (a) on receipt of a
request to that effect from
the subscriber or any person
authorized by him and (b) if it
is of opinion that the
certificate should be
suspended in the public
interest.
17. Digital signature certificates
• Revocation of Digital
signature certificate - – The
certifying authority may
revoke a digital signature
certificate issued by it (a)
where the subscriber or any
other person authorized by
him makes a request to that
effect or (b) upon the death
of the subscriber or (c) upon
the dissolution of the firm.
18. Penalty
• Penalty for damage of
computer systems – If any
person without permission of
owner or any other person
who is in-charge of the
computer access, download
or disrupt the functions, he
shall be liable to pay damages
by way of compensation not
exceeding one crore rupees
to the person so affected.
19. Penalty
• Penalty for failure to furnish
information – If any person
who is required to under this
act fail to furnish any
document, he shall be liable
to a penalty not exceeding
one lakh and fifty thousand
rupees for each such failure.
20. Adjudication
• Power of adjudication – For the
purpose of adjudication, central
government shall appoint any
officer not below the rank of
director as the adjudicating
officer. If he is satisfied that the
person has committed the
contravention, he may impose
such penalty as he thinks fit.
21. Cyber Regulations Appellate Tribunal
• A cyber appellate tribunal
shall consists of one person
only referred to as the
presiding officer, appointed
by the central government.
22. Cyber Regulations Appellate Tribunal
• Any person aggrieved by an
order made my controller may
prefer an appeal to a cyber
Appellate Tribunal within a
period of 45 days from the date
on which a copy of order made
by the controller is received by
the person aggrieved. On
receipt of an appeal, Tribunal
may after giving the parties an
opportunity of being heard, pas
such order thereon as it thinks
fit.
23. Cyber Regulations Appellate Tribunal
• A penalty imposed under this
act, if it is not paid, shall be
recovered as an arrear of land
revenue and the license or
the digital signature
certificate, as the case may
be, shall be suspended till the
penalty is paid.
24. Offences
• Tampering with computer
source documents – Three
years imprisonment or fine
worth two lakhs.
• Hacking with computer system
- Three years imprisonment or
fine worth two lakhs.
• Publishing of information which
is obscene in electronic form -
Ten years imprisonment or fine
worth two lakhs.
25. Offences
• Securing access to protected
system - Ten years
imprisonment or fine.
• Misrepresentation - Two years
imprisonment or fine of one
lakh.
• Breach of confidentiality and
privacy - Two years
imprisonment or fine of one
lakh.
• Publishing of false digital
signature certificate - Two years
imprisonment or fine of one
lakh.