SlideShare a Scribd company logo
Information Technology
Act 2000- An overview
Presented by,
Kinjal Vaghela(115330)
Usha Chaudhari(115328)
Need of Cyber Law
"The modern thief can steal more with a computer
than with a gun. Tomorrow's terrorist may be able to do
more damage with a keyboard than with a bomb".
National Research Council, U S A "Computers at
Risk”.1991
Need of Cyber Law
➢ Internet has dramatically changed Our life.
➢ Transition from paper to paperless world.
➢ Laws of real world can not be interpreted in the light
of emerging Cyberspace.
➢ Internet requires an enabling and supportive legal
infrastructure to tune with the times
Cyber Law ?
➢ Cyber Law is the law governing cyber space.
➢ Cyber space includes computers, networks, software's,
data storage devices (such as hard disks, USB disks etc),
the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Crime ?
➢ Any crime with the help of computer and
telecommunication technology.
➢ Any crime where either the computer is used
as an object or subject.
Categories of Cyber Crime
➢ Cybercrimes against persons.
➢ Cybercrimes against property.
➢ Cybercrimes against government.
Statistics of Cyber Crimes
IT Act-2000
➢ The Information Technology Act, 2000 (IT Act),
came into force on 17 October 2000.
➢ The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
filing of electronic records with the Government.
➢ Information Technology Act 2000 consisted of
94 sections segregated into 13 chapters.
IT Act-2000 : Objectives
➢ To provide legal recognition for transactions
➢ To facilitate electronic filing of documents with
the Government agencies.
➢ To amend the Indian Penal Code, The Indian
Evidence Act, 1872, The Banker's Book Evidence
Act, 1891 and the Reserve Bank of India
Act, 1934.
➢ Aims to provide the legal framework to all
electronic records.
10
Section 65
• Offence Name - Tampering with computer Source
documents.
• Description - If a person knowingly or intentionally
conceals, destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any computer
source code used for a computer, computer programme,
computer system or computer network, when the
computer source code is required to be kept or maintained
by law for the time being in force.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
11
Section 66
• Offence Name - Hacking with computer system
• Description - If a person with the intent to cause or
knowing that he is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or alters any
information residing in a computer resource or diminishes
its value or utility or affects it injuriously by any means,
commits hack.
• Penalty
Imprisonment up to three years, or/and with fine up
to 500,000
12
Section 66B
• Offence Name - Receiving stolen computer or communication
device
• Description - - A person receives or retains a computer
resource or communication device which is known to be
stolen or the person has reason to believe is stolen.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
13
Section 66C
• Offence Name - Using password of another person
• Description - A person fradulently uses the password, digital
signature or other unique identification of another person.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
14
Section 66D
• Offence Name - Cheating using computer resource
• Description - If a person cheats someone using a computer
resource or communication.
• Penalty
Imprisonment up to three years, or/and with fine up
to 100,000
15
Section 66E
• Offence Name - Publishing private images of others
• Description - If a person captures, transmits or publishes
images of a person's private parts without his/her consent or
knowledge.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
SECTION 67C
• Offence Name - Failure to maintain records
• Description:Persons deemed as
intermediatary (such as an ISP) must maintain
required records for stipulated time. Failure is
an offence.
17
Section 68
• Offence Name - Failure/refusal to comply with orders
• Description - The Controller may, by order, direct a Certifying
Authority or any employee of such Authority to take such
measures or cease carrying on such activities as specified in
the order if those are necessary to ensure compliance with
the provisions of this Act, rules or any regulations made
thereunder. Any person who fails to comply with any such
order shall be guilty of an offence.
• Penalty
Imprisonment up to three years, or/and with fine up
to 200,000
18
Section 70
• Offence Name - Securing access or attempting to secure
access to a protected system
• Description - The appropriate Government may, by
notification in the Official Gazette, declare that any
computer, computer system or computer network to be a
protected system.The appropriate Government may, by order
in writing, authorise the persons who are authorised to
access protected systems. If a person who secures access or
attempts to secure access to a protected system, then he is
committing an offence.
• Penalty
- Imprisonment up to ten years, or/and with fine
19
Section 71
• Offence Name - Misrepresentation
• Description - If anyone makes any misrepresentation
to, or suppresses any material fact from, the
Controller or the Certifying Authority for obtaining
any license or Digital Signature Certificate.
• Penalty
- Imprisonment up to three years, or/and with fine up
to 100,000
IT Act Amendment-2008
➢ The Information Technology Amendment Act, 2008
(IT Act 2008) has been passed by the parliament on
23rd December 2008.
➢ It received the assent of President of India on
5th February, 2009.
➢ The IT Act 2008 has been notified on October 27,
2009.
➢ ITA-2008, is a new version of IT Act 2000.
➢ Provides additional focus on Information
Security.
➢ Added several new sections on offences
including Cyber Terrorism and Data
Protection.
➢ 124 sections and 14 chapters.
➢ Schedule I and II have been replaced &
Schedules III and IV are deleted.
IT Act Amendment-2008
➢ We are living in highly digitalized world.
➢ All companies depend upon their computer
networks and keep their valuable data in electronic
form.
➢ Government forms including income tax returns,
company law forms etc are now filled in electronic
form.
➢ Consumers are increasingly using credit cards for
shopping.
➢ Even in "non-cyber crime" cases, important
Importance of Cyber Law
Thank You

More Related Content

What's hot

Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
User authentication
User authenticationUser authentication
User authentication
CAS
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Information security
Information securityInformation security
Information security
Sina Bagherinezhad
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
Dr.Florence Dayana
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 
Authentication
AuthenticationAuthentication
Authentication
primeteacher32
 
Unit 2
Unit 2Unit 2
Unit 2
Jigarthacker
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
Arpana shree
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto Jacking
APNIC
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
Sam Bowne
 

What's hot (20)

Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
System hacking
System hackingSystem hacking
System hacking
 
User authentication
User authenticationUser authentication
User authentication
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Information security
Information securityInformation security
Information security
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Authentication
AuthenticationAuthentication
Authentication
 
Unit 2
Unit 2Unit 2
Unit 2
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto Jacking
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 

Similar to Cyber securitylaw

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
PrakharPrasoon
 
Cyber
CyberCyber
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
cyberlaw
cyberlawcyberlaw
cyberlaw
divyaanjali8
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Information technology act
Information technology actInformation technology act
Information technology act
bahubali1611
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
Gautam GR
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
RAJ ANAND
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
Hemraj Singh Chouhan
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
Yogendra Wagh
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
Niti Dhruva
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
SOMASUNDARAM T
 
it act
it act it act
it act
9535814851
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
Rahul Bharati
 

Similar to Cyber securitylaw (20)

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber
CyberCyber
Cyber
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
it act
it act it act
it act
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 

Recently uploaded

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

Cyber securitylaw

  • 1. Information Technology Act 2000- An overview Presented by, Kinjal Vaghela(115330) Usha Chaudhari(115328)
  • 2. Need of Cyber Law "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, U S A "Computers at Risk”.1991
  • 3. Need of Cyber Law ➢ Internet has dramatically changed Our life. ➢ Transition from paper to paperless world. ➢ Laws of real world can not be interpreted in the light of emerging Cyberspace. ➢ Internet requires an enabling and supportive legal infrastructure to tune with the times
  • 4. Cyber Law ? ➢ Cyber Law is the law governing cyber space. ➢ Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 5. Cyber Crime ? ➢ Any crime with the help of computer and telecommunication technology. ➢ Any crime where either the computer is used as an object or subject.
  • 6. Categories of Cyber Crime ➢ Cybercrimes against persons. ➢ Cybercrimes against property. ➢ Cybercrimes against government.
  • 8. IT Act-2000 ➢ The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000. ➢ The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. ➢ Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
  • 9. IT Act-2000 : Objectives ➢ To provide legal recognition for transactions ➢ To facilitate electronic filing of documents with the Government agencies. ➢ To amend the Indian Penal Code, The Indian Evidence Act, 1872, The Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934. ➢ Aims to provide the legal framework to all electronic records.
  • 10. 10 Section 65 • Offence Name - Tampering with computer Source documents. • Description - If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 11. 11 Section 66 • Offence Name - Hacking with computer system • Description - If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. • Penalty Imprisonment up to three years, or/and with fine up to 500,000
  • 12. 12 Section 66B • Offence Name - Receiving stolen computer or communication device • Description - - A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 13. 13 Section 66C • Offence Name - Using password of another person • Description - A person fradulently uses the password, digital signature or other unique identification of another person. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 14. 14 Section 66D • Offence Name - Cheating using computer resource • Description - If a person cheats someone using a computer resource or communication. • Penalty Imprisonment up to three years, or/and with fine up to 100,000
  • 15. 15 Section 66E • Offence Name - Publishing private images of others • Description - If a person captures, transmits or publishes images of a person's private parts without his/her consent or knowledge. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 16. SECTION 67C • Offence Name - Failure to maintain records • Description:Persons deemed as intermediatary (such as an ISP) must maintain required records for stipulated time. Failure is an offence.
  • 17. 17 Section 68 • Offence Name - Failure/refusal to comply with orders • Description - The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Any person who fails to comply with any such order shall be guilty of an offence. • Penalty Imprisonment up to three years, or/and with fine up to 200,000
  • 18. 18 Section 70 • Offence Name - Securing access or attempting to secure access to a protected system • Description - The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system.The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. • Penalty - Imprisonment up to ten years, or/and with fine
  • 19. 19 Section 71 • Offence Name - Misrepresentation • Description - If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate. • Penalty - Imprisonment up to three years, or/and with fine up to 100,000
  • 20. IT Act Amendment-2008 ➢ The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008. ➢ It received the assent of President of India on 5th February, 2009. ➢ The IT Act 2008 has been notified on October 27, 2009.
  • 21. ➢ ITA-2008, is a new version of IT Act 2000. ➢ Provides additional focus on Information Security. ➢ Added several new sections on offences including Cyber Terrorism and Data Protection. ➢ 124 sections and 14 chapters. ➢ Schedule I and II have been replaced & Schedules III and IV are deleted. IT Act Amendment-2008
  • 22. ➢ We are living in highly digitalized world. ➢ All companies depend upon their computer networks and keep their valuable data in electronic form. ➢ Government forms including income tax returns, company law forms etc are now filled in electronic form. ➢ Consumers are increasingly using credit cards for shopping. ➢ Even in "non-cyber crime" cases, important Importance of Cyber Law