SlideShare a Scribd company logo
1 of 26
CYBER LAWS
INDEX
• Introduction
• Importance
• IT-Act 2000
• Key points
• Sections
Introduction
o Cyber Law took birth in order to take
control over the crimes committed through
the internet or the cyberspace or through
the uses of computer resources.
o This law was introduced by Pramod
Mahajan.
Importance
o Cyber Law plays a very important role in
every aspects or connection to
communicational or transactional
activities carried out by us.
o Whether we are aware or not but each
action and each reaction in Cyber space
has some legal and Cyber legal views.
o It concerns with the Internet, the World
Wide Web and Cyberspace.
IT-Act 2000
o In India the law had been signed on 9th
May 2000, was considered as law from 9th
June 2000 and was begin to use from 17th
October 2000.
o This law was introduced by Pramod
Mahajan.
Key points of IT-act 2000
o E-mail is considered valid and legal way of communication.
o Digital signatures are given legal validity.
o Act has given birth to new business to companies to issue digital certificates by becoming the
Certifying Authorities.
o Act allows the government to issue notices on internet through e-governance.
o The communication between the companies or between the company and the government
can be done through internet.
o It introduced the construct of digital signatures that verifies the identity of an individual on
internet.
o In case of any harm or loss done to the company by criminals, the Act provides a remedy in
the form of money to the company
Digital Signature
Section- 65
o Definition → Temping with the computers source documents.
o Description → Whoever intentionally or knowingly destroy, conceal or change any
computer’s source code that is used for a computer, computer program, and computer
system or computer network.
o Punishment → Up to 3 years imprisonment or with a fine of Rs.2 lakhs or with both.
Section- 66
o Definition → Hacking with computer system, data alteration etc.
o Description → Whoever with the purpose or intention to cause any loss, damage or to
destroy, delete or to alter any information that resides in a public or any person’s
computer. Diminish its utility, values or affects it injuriously by any means, commits
hacking
o Punishment → Up to 3 years imprisonment or with a fine of Rs.2 lakhs or with both.
Section- 66A
o Definition → Sending offensive messages through any communication services.
o Description → Any information that is not true or is not valid and is sent with the end goal
of annoying, inconvenience, danger, insult, obstruction, injury, criminal intention, enmity,
hatred or ill will.
o Any electronic mail or email sent with the end goal of causing anger, difficulty or mislead
or to deceive the address about the origin of the messages.
o Punishment → Up to 3 years imprisonment along with a fine.
Section- 66B
o Definition → Receiving stolen computer’s resources or communication devices
dishonestly
o Description → Receiving or retaining any stolen computer, computer’s resources or any
communication devices knowingly or having the reason to believe the same.
o Punishment → Up to 3 years imprisonment or with a fine of rupee 1 lakh.
Section- 66C
o Definition → Identity Theft
o Description → Using of one’s digital or electronic signature or one’s password or any
other unique identification of any person is a crime
o Punishment → Up to 3 years imprisonment or with a fine of rupee 1 lakh.
Section- 66D
o Definition → Cheating by personation by the use of computer’s resources.
o Description → Using someone’s mobile phones or computer or another digital device
and cheating on other is included in this section.
o Punishment → Up to 3 years imprisonment or with a fine of rupee 1 lakh.
Section- 66E
o Definition → Privacy or violation.
o Description → Whoever knowingly or with an intention of publishing, transmitting or
capturing images of private areas or private parts of any individual without his/her
consent, that violets the privacy of the individual.
o Punishment → Up to 3 years imprisonment or with a fine of rupee 2 lakh.
Section- 66F
o Definition → Cyber Terrorism.
o Description →
o Whoever intentionally threatened the integrity, unity, sovereignty or security or strike terror among
the people or among any group of people
o By intention or by knowingly tries to go through or tries to gain access to computer’s resources
without the authorization or exceeding authorized access and make the country’s or government
data unsecure.
o Punishment → life time imprisonment.
Section- 67
o Definition → Transmitting or publishing obscene materials in electronic form.
o Description → Whoever transmits or publishes or cause to publish any obscene materials
in electronics form.
o Any material that is vulgar or appeal to be lubricious or if its effect is for instance to tends
to corrupt any individual who are likely to have regard to all relevant circumstances to
read or to see or to hear the matter that contained in it.
o Punishment → 5 years imprisonment along with 1 lakh rupee fine for single offence but for
committing relevant circumstances it can be doubled i.e. 10 years and 2 lakh of fine.
Section- 67A
o Definition → Transmitting or publishing of materials that contains sexually explicit contents,
acts etc. in electronics form.
o Description → Whoever transmits or publishes materials that contains sexually explicit
contents or acts.
o Punishment → 5 years imprisonment along with 10 lakh rupee fine for First convict and in
second convict 7 years and 20 lakh of fine.
Section- 67B
o Definition → Transmitting or publishing of materials that depicts children in sexually explicit
act etc. in electronics form
o Description → Whoever transmits or publishes materials that makes children or includes
children in sexually explicit contents or acts.
o Punishment → 5 years imprisonment along with 10 lakh rupee fine for First convict and in
second convict 7 years and 10 lakh of fine.
Section- 67C
o Definition → Retention and preservation of information by intermediaries
o Description → Whoever controls or preserves any of the information that may be helpful
to any governmental activities is not allowed.
o Punishment → 3 years imprisonment along with liable fine.
Explanation of Section- 67
o It’s based on pornographic content.
o Myth: Watching porn is crime.
o Truth Watching Porn isn’t a crime, transmitting pornographic content is a crime.
o This is the act which says that watching porn alone without anyone’s transmission is not a
crime but if you give to someone by an means than it is considered as crime.
o Watching porn in public places, over a public wi-fi, over someone’s wi-fi or organizational
wi-fi is all considered under cyber crime.
Section- 69
o Definition → Power to issue direction for monitor, decryption or interception of any
information through computer’s resources
o Description → Where the Central Government or a State Government or any of its
officers specially authorized by the Central Government or the State Government, as the
case may be, in this behalf may, if satisfied that it is necessary or expedient to do in the
interest of the sovereignty or integrity of India.
o For reasons to be recorded in writing, by order, direct any agency of the appropriate
Government to intercept, monitor or decrypt or cause to be intercepted or monitored or
decrypted any information generated, transmitted, received or stored in any computer
resource.
o Punishment → 7 years imprisonment along with liable fine.
Other important sections
Offences Sec. under IT Act, 2000
Damage to Computer, Computer System etc. Section 43
Power to issue direction for blocking from public access of any
information through any computer’s resources.
Section 69A
Power to authorize to collect traffic information or data and to
monitor through any computer’s resources for cyber security
Section 69B
Un-authorized access to protected system. Section 70
Penalty for misrepresentation. Section 71
Breach of confidentiality and privacy Section 72
Publishing False digital signature certificates. Section 73
Publication for fraudulent purpose. Section 74
Act to apply for contravention or offence that is committed
outside India.
Section 75
Other important sections
Offences Sec. under IT Act, 2000
Compensation, confiscation or penalties for not to interfere with
other punishment.
Section 77
Compounding of Offences. Section 77A
Offences by Companies. Section 85
Sending threatening messages by e-mail. Section 503 IPC
Sending defamatory messages by e-mail. Section 499 IPC
Bogus websites, Cyber Frauds Section 420 IPC
E-mail Spoofing. Section 463 IPC
Web Jacking. Section 383 IPC
E-mail Abuse Section 500 IPC
Criminal intimidation by anonymous communications. Section 507 IPC
NPDS ACT
◦ Online sale of Drugs.
◦ Now NPDS act is in compliance
with IT Act 2000
◦ It ensures that a person doesn’t
sale any illegal drugs online.
Arm ACT
◦ Online sale of Weapons.
◦ It ensures that no one sales weapons online
illegally without any permission.
THANK YOU

More Related Content

Similar to Cyber laws

Similar to Cyber laws (20)

Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
Shilpa
ShilpaShilpa
Shilpa
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

More from Mohit Dholakiya

More from Mohit Dholakiya (6)

Data science
Data scienceData science
Data science
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
How to grow on you tube
How to grow on you tubeHow to grow on you tube
How to grow on you tube
 
Instagram strategies
Instagram strategiesInstagram strategies
Instagram strategies
 
Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilities
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Recently uploaded

KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Dr. Oliver Massmann
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...PsychicRuben LoveSpells
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfNavigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfMilind Agarwal
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 

Recently uploaded (20)

KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfNavigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 

Cyber laws

  • 2. INDEX • Introduction • Importance • IT-Act 2000 • Key points • Sections
  • 3. Introduction o Cyber Law took birth in order to take control over the crimes committed through the internet or the cyberspace or through the uses of computer resources. o This law was introduced by Pramod Mahajan.
  • 4. Importance o Cyber Law plays a very important role in every aspects or connection to communicational or transactional activities carried out by us. o Whether we are aware or not but each action and each reaction in Cyber space has some legal and Cyber legal views. o It concerns with the Internet, the World Wide Web and Cyberspace.
  • 5. IT-Act 2000 o In India the law had been signed on 9th May 2000, was considered as law from 9th June 2000 and was begin to use from 17th October 2000. o This law was introduced by Pramod Mahajan.
  • 6. Key points of IT-act 2000 o E-mail is considered valid and legal way of communication. o Digital signatures are given legal validity. o Act has given birth to new business to companies to issue digital certificates by becoming the Certifying Authorities. o Act allows the government to issue notices on internet through e-governance. o The communication between the companies or between the company and the government can be done through internet. o It introduced the construct of digital signatures that verifies the identity of an individual on internet. o In case of any harm or loss done to the company by criminals, the Act provides a remedy in the form of money to the company
  • 8. Section- 65 o Definition → Temping with the computers source documents. o Description → Whoever intentionally or knowingly destroy, conceal or change any computer’s source code that is used for a computer, computer program, and computer system or computer network. o Punishment → Up to 3 years imprisonment or with a fine of Rs.2 lakhs or with both.
  • 9. Section- 66 o Definition → Hacking with computer system, data alteration etc. o Description → Whoever with the purpose or intention to cause any loss, damage or to destroy, delete or to alter any information that resides in a public or any person’s computer. Diminish its utility, values or affects it injuriously by any means, commits hacking o Punishment → Up to 3 years imprisonment or with a fine of Rs.2 lakhs or with both.
  • 10. Section- 66A o Definition → Sending offensive messages through any communication services. o Description → Any information that is not true or is not valid and is sent with the end goal of annoying, inconvenience, danger, insult, obstruction, injury, criminal intention, enmity, hatred or ill will. o Any electronic mail or email sent with the end goal of causing anger, difficulty or mislead or to deceive the address about the origin of the messages. o Punishment → Up to 3 years imprisonment along with a fine.
  • 11. Section- 66B o Definition → Receiving stolen computer’s resources or communication devices dishonestly o Description → Receiving or retaining any stolen computer, computer’s resources or any communication devices knowingly or having the reason to believe the same. o Punishment → Up to 3 years imprisonment or with a fine of rupee 1 lakh.
  • 12. Section- 66C o Definition → Identity Theft o Description → Using of one’s digital or electronic signature or one’s password or any other unique identification of any person is a crime o Punishment → Up to 3 years imprisonment or with a fine of rupee 1 lakh.
  • 13. Section- 66D o Definition → Cheating by personation by the use of computer’s resources. o Description → Using someone’s mobile phones or computer or another digital device and cheating on other is included in this section. o Punishment → Up to 3 years imprisonment or with a fine of rupee 1 lakh.
  • 14. Section- 66E o Definition → Privacy or violation. o Description → Whoever knowingly or with an intention of publishing, transmitting or capturing images of private areas or private parts of any individual without his/her consent, that violets the privacy of the individual. o Punishment → Up to 3 years imprisonment or with a fine of rupee 2 lakh.
  • 15. Section- 66F o Definition → Cyber Terrorism. o Description → o Whoever intentionally threatened the integrity, unity, sovereignty or security or strike terror among the people or among any group of people o By intention or by knowingly tries to go through or tries to gain access to computer’s resources without the authorization or exceeding authorized access and make the country’s or government data unsecure. o Punishment → life time imprisonment.
  • 16. Section- 67 o Definition → Transmitting or publishing obscene materials in electronic form. o Description → Whoever transmits or publishes or cause to publish any obscene materials in electronics form. o Any material that is vulgar or appeal to be lubricious or if its effect is for instance to tends to corrupt any individual who are likely to have regard to all relevant circumstances to read or to see or to hear the matter that contained in it. o Punishment → 5 years imprisonment along with 1 lakh rupee fine for single offence but for committing relevant circumstances it can be doubled i.e. 10 years and 2 lakh of fine.
  • 17. Section- 67A o Definition → Transmitting or publishing of materials that contains sexually explicit contents, acts etc. in electronics form. o Description → Whoever transmits or publishes materials that contains sexually explicit contents or acts. o Punishment → 5 years imprisonment along with 10 lakh rupee fine for First convict and in second convict 7 years and 20 lakh of fine.
  • 18. Section- 67B o Definition → Transmitting or publishing of materials that depicts children in sexually explicit act etc. in electronics form o Description → Whoever transmits or publishes materials that makes children or includes children in sexually explicit contents or acts. o Punishment → 5 years imprisonment along with 10 lakh rupee fine for First convict and in second convict 7 years and 10 lakh of fine.
  • 19. Section- 67C o Definition → Retention and preservation of information by intermediaries o Description → Whoever controls or preserves any of the information that may be helpful to any governmental activities is not allowed. o Punishment → 3 years imprisonment along with liable fine.
  • 20. Explanation of Section- 67 o It’s based on pornographic content. o Myth: Watching porn is crime. o Truth Watching Porn isn’t a crime, transmitting pornographic content is a crime. o This is the act which says that watching porn alone without anyone’s transmission is not a crime but if you give to someone by an means than it is considered as crime. o Watching porn in public places, over a public wi-fi, over someone’s wi-fi or organizational wi-fi is all considered under cyber crime.
  • 21. Section- 69 o Definition → Power to issue direction for monitor, decryption or interception of any information through computer’s resources o Description → Where the Central Government or a State Government or any of its officers specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India. o For reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource. o Punishment → 7 years imprisonment along with liable fine.
  • 22. Other important sections Offences Sec. under IT Act, 2000 Damage to Computer, Computer System etc. Section 43 Power to issue direction for blocking from public access of any information through any computer’s resources. Section 69A Power to authorize to collect traffic information or data and to monitor through any computer’s resources for cyber security Section 69B Un-authorized access to protected system. Section 70 Penalty for misrepresentation. Section 71 Breach of confidentiality and privacy Section 72 Publishing False digital signature certificates. Section 73 Publication for fraudulent purpose. Section 74 Act to apply for contravention or offence that is committed outside India. Section 75
  • 23. Other important sections Offences Sec. under IT Act, 2000 Compensation, confiscation or penalties for not to interfere with other punishment. Section 77 Compounding of Offences. Section 77A Offences by Companies. Section 85 Sending threatening messages by e-mail. Section 503 IPC Sending defamatory messages by e-mail. Section 499 IPC Bogus websites, Cyber Frauds Section 420 IPC E-mail Spoofing. Section 463 IPC Web Jacking. Section 383 IPC E-mail Abuse Section 500 IPC Criminal intimidation by anonymous communications. Section 507 IPC
  • 24. NPDS ACT ◦ Online sale of Drugs. ◦ Now NPDS act is in compliance with IT Act 2000 ◦ It ensures that a person doesn’t sale any illegal drugs online.
  • 25. Arm ACT ◦ Online sale of Weapons. ◦ It ensures that no one sales weapons online illegally without any permission.