SlideShare a Scribd company logo
INFORMATION TECHNOLOGY
ACT, RATHER THAN GIVING
INFORMATION AND
TECHNOLOGY GIVE RISE TO
MORE CYBER CRIMES
Introduction
 Information Technology.
 Application in IT.
 E-commerce.
IT in Banking Sector
 Many facilities provided.
 Conversion of currencies to ‘Plastic Money’.
 IT is increasingly moving from a back office function to a
prime assistant.
 Traditional banking loosing its existence.
 E-banking and its benefits.
Information Technology Act,
2000
The Information Technology Act 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament (No
21 of 2000) notified on October 17, 2000.
 Essence of the ACT
 Purpose
 Objective
 Advantages
 Shortcomings
Key Terms
 Digital Signature
 E Governance
 Encryption
 Decryption
 Computer Source Code
 Cyber Terrorism
 Electronic Documents
Important Sections of IT
Act,2000
1) Section 65-
 Tampering with any computer source code used for a
computer, computer programme, computer system or
computer network.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to two lakh rupees.
2) Section 66-
 Hacking with computer system.
 Punishment- Imprisonment up to three years, or with fine
which may extend up to five lakh rupees, or with both.
3) Section 67-
 Publishing transmitting information which is obscene in
electronic form shall be punished.
 Punishment-
o Imprisonment of either three years and with fine which may
extend to five lakh rupees.
o Imprisonment of either five years and also with fine which
may extend to ten lakh rupees.
4) Penalty for Breach of Confidentiality and Privacy
(Section 72)-
 Any person who has secured access to any electronic
record, book, register, correspondence, information,
document or other material without the consent of the
person concerned.
 Punishment-Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
5) Punishment for publishing Digital Signature Certificate
false in certain particulars (Section 73)-
 Punishment- Imprisonment for two years, or with fine
which may extend to one lakh rupees, or with both.
Amendments in Information
Technology Act, 2008
The IT Amendment Bill 2008 has been passed by the Lok
Sabha and the Rajya Sabha in the last week of December,
2008.
 Different Sections-
 Section 66B
 Section 66C
 Section 66E
 Section 67A
 Section 67B
 Section 72A
Case Study
• The Hyderabad case study.
• Section 66D- Punishments for cheating by personation by
using computer resource (Inserted Vide ITA 2008).
• Punishment-Imprisonment of three years and shall also be
liable to fine which may extend to one lakh rupees.
Cyber Crime
Unlawful acts wherein the computer is either a tool or a target or both
What is Cyber Crime ??
 Criminals can operate anonymously over the
computer networks.
 Hackers invade privacy.
 Hackers destroy “property” in the form of
computer files or records.
 Hackers injure other computer users by
destroying information systems.
 Computer pirates steal intellectual property.
Financial Crimes
 It includes cheating, credit card frauds, money laundering.
Cyber Pornography
 It includes pornographic websites; pornographic magazines
produced using computers (to publish and print the
material) and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
Web Jacking
 This occurs when someone forcefully takes control of a
website (by cracking the password and later changing it).
 Sale of illegal articles
 Phishing
 Online gambling
 Email spoofing
Intellectual Property
crimes-
These include software piracy, copyright infringement,
trademarks violations, theft of computer source code etc.
Cyber Criminals
 Kids (age group (9-16 years)
 Organized hacktivitsts
 Disgruntled employees
 Professional hackers
Case Study
 Case study related to bank.
 Case study related to cyber crime.
Cyber Crime in India
4639
1.4
3
India
online fraud
intrusion or hacking
malicious code
harrassment
Reports registered by RBI for
cyber fraud and the amount spent
for the same
Distribution of targets
Global Cyber Crime
NASSCOM INITIATIVES
 Global Trade Development
 National Skills Registry for IT/ITES Professional (NSR-
ITP)
 Sector Skills Councils
NASSCOM FORUMS
 Gaming Forum
 BPO
 Engineering Services
 Remote Infrastructure Management
Conclusion
 The fundamental approach of the Act is towards validating and
legalising electronic and on-line transactions.
 Awareness must be created.
 It leaves various issues untouched
 The Parliament must ensure that it keeps amending the law and
enacting new laws
 That there are no reliable statistics on the problem
 India is amongst few of the countries in the world which have
any legal framework for e-commerce and e-governance
Suggestions
1) Recruitment
2) Red Coding System
3) Training and Development
4) Domain
5) Vague Definations
Bibliography
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
 http://www.definitions.net/definition/information
 http://dictionary.reference.com/browse/technology
 http://www.slideshare.net/maruhope/information-technology-act
 http://www.tutor2u.net/business/production/applications-of-IT-
marketing.htm
 http://wiki.answers.com/Q/What_are_applications_of_Informati
on_Technology_in_railwys
 http://www.itsavvy.in/applications-computers-fields
Thank You!!

More Related Content

What's hot

IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Sreelekshmi Mohan
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerce
Prince Sharma
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
Nitya Nand Pandey
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
sujithsunil
 

What's hot (20)

it act 2000
it act 2000it act 2000
it act 2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerce
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 

Similar to IT Act,2000 - Law

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
Rahul Bharati
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Ashish Karan
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
ManoharManu993491
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
Rahul Bharati
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
SOMASUNDARAM T
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
RAJ ANAND
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Rahul Bharati
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
ijtsrd
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 

Similar to IT Act,2000 - Law (20)

Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
It act 2000
It act 2000It act 2000
It act 2000
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

IT Act,2000 - Law

  • 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION AND TECHNOLOGY GIVE RISE TO MORE CYBER CRIMES
  • 2. Introduction  Information Technology.  Application in IT.  E-commerce.
  • 3. IT in Banking Sector  Many facilities provided.  Conversion of currencies to ‘Plastic Money’.  IT is increasingly moving from a back office function to a prime assistant.  Traditional banking loosing its existence.  E-banking and its benefits.
  • 4. Information Technology Act, 2000 The Information Technology Act 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000.  Essence of the ACT  Purpose  Objective  Advantages  Shortcomings
  • 5. Key Terms  Digital Signature  E Governance  Encryption  Decryption  Computer Source Code  Cyber Terrorism  Electronic Documents
  • 6. Important Sections of IT Act,2000 1) Section 65-  Tampering with any computer source code used for a computer, computer programme, computer system or computer network.  Punishment- Imprisonment up to three years, or with fine which may extend up to two lakh rupees.
  • 7. 2) Section 66-  Hacking with computer system.  Punishment- Imprisonment up to three years, or with fine which may extend up to five lakh rupees, or with both.
  • 8. 3) Section 67-  Publishing transmitting information which is obscene in electronic form shall be punished.  Punishment- o Imprisonment of either three years and with fine which may extend to five lakh rupees. o Imprisonment of either five years and also with fine which may extend to ten lakh rupees.
  • 9. 4) Penalty for Breach of Confidentiality and Privacy (Section 72)-  Any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned.  Punishment-Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 10. 5) Punishment for publishing Digital Signature Certificate false in certain particulars (Section 73)-  Punishment- Imprisonment for two years, or with fine which may extend to one lakh rupees, or with both.
  • 11. Amendments in Information Technology Act, 2008 The IT Amendment Bill 2008 has been passed by the Lok Sabha and the Rajya Sabha in the last week of December, 2008.  Different Sections-  Section 66B  Section 66C  Section 66E  Section 67A  Section 67B  Section 72A
  • 12. Case Study • The Hyderabad case study. • Section 66D- Punishments for cheating by personation by using computer resource (Inserted Vide ITA 2008). • Punishment-Imprisonment of three years and shall also be liable to fine which may extend to one lakh rupees.
  • 13. Cyber Crime Unlawful acts wherein the computer is either a tool or a target or both
  • 14. What is Cyber Crime ??  Criminals can operate anonymously over the computer networks.  Hackers invade privacy.  Hackers destroy “property” in the form of computer files or records.  Hackers injure other computer users by destroying information systems.  Computer pirates steal intellectual property.
  • 15. Financial Crimes  It includes cheating, credit card frauds, money laundering.
  • 16. Cyber Pornography  It includes pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).
  • 17. Web Jacking  This occurs when someone forcefully takes control of a website (by cracking the password and later changing it).
  • 18.  Sale of illegal articles  Phishing  Online gambling  Email spoofing
  • 19. Intellectual Property crimes- These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  • 20. Cyber Criminals  Kids (age group (9-16 years)  Organized hacktivitsts  Disgruntled employees  Professional hackers
  • 21. Case Study  Case study related to bank.  Case study related to cyber crime.
  • 22. Cyber Crime in India
  • 23. 4639 1.4 3 India online fraud intrusion or hacking malicious code harrassment
  • 24. Reports registered by RBI for cyber fraud and the amount spent for the same
  • 27.
  • 28. NASSCOM INITIATIVES  Global Trade Development  National Skills Registry for IT/ITES Professional (NSR- ITP)  Sector Skills Councils
  • 29. NASSCOM FORUMS  Gaming Forum  BPO  Engineering Services  Remote Infrastructure Management
  • 30. Conclusion  The fundamental approach of the Act is towards validating and legalising electronic and on-line transactions.  Awareness must be created.  It leaves various issues untouched  The Parliament must ensure that it keeps amending the law and enacting new laws  That there are no reliable statistics on the problem  India is amongst few of the countries in the world which have any legal framework for e-commerce and e-governance
  • 31. Suggestions 1) Recruitment 2) Red Coding System 3) Training and Development 4) Domain 5) Vague Definations
  • 32. Bibliography  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields
  • 33.  http://www.definitions.net/definition/information  http://dictionary.reference.com/browse/technology  http://www.slideshare.net/maruhope/information-technology-act  http://www.tutor2u.net/business/production/applications-of-IT- marketing.htm  http://wiki.answers.com/Q/What_are_applications_of_Informati on_Technology_in_railwys  http://www.itsavvy.in/applications-computers-fields