SlideShare a Scribd company logo
1 of 25
INFORMATION TECHNOLOGY ACT,
      RATHER THAN GIVING
  INFORMATION & TECHNOLOGY
       GIVES RISE TO MORE
          CYBER CRIMES
GROUP MEMBERS
   Lalit Ambolkar        :   01
   Shweta Bais           :   03
   Vinayan Bambardekar   :   05
   Vivek Band            :   07
   Karan Bhagatwala      :   09
   Aishwarya Bhavsar     :   11
   Meghana Bhogle        :   13
   Devesh Bhuwad         :   15
   Kaivalya Biwalkar     :   17
   Ankit Gehlot          :   19
INFORMATION TECHNOLOGY ACT,
            2000
INTRODUCTION


   Focus of the IT Act 2000 was recognition of electronic records and
    facilitation of e –commerce

   The amended IT Act 2008 focuses on Cyber Terrorism and Cyber Crime

   Issues related to electronic transactions, digital signatures, hacking and
    network service providers are covered
CYBER CRIME

‘Cyber Crime is any criminal activity done
       using computer and a network'

                AS ALSO

  ‘Criminal exploitation of the internet’
MOST COMMON CYBER CRIMES

   Phishing

   Hacking

   Publishing of Obscene Content

   Cyber Squatting

   Cyber Defamation
LATEST CYBER CRIMES
  Tushar Mehta v/s Sanjeev Bhatt
         22 Oct, 2011




   Suhel Seth v/s ITC
      6 Nov, 2011




        Sayali Bhagat v/s Anant Rane
                22 Nov, 2011
DIGITAL SIGNATURES


•   It is a mathematical scheme for demonstrating the authenticity of a
    digital message or document

•   Section 3A: Any subscriber may authenticate electronic records by
    Electronic Signatures

•   Now ‘Digital Signature’ has been made a subset of ‘Electronic Signature’

•   Ensures Authentication, Integrity and Non-repudiation
LICENSED CAs IN INDIA
   Safescrypt (www.safescrypt.com)

   NIC (www.nic.in)

   IDRBT (www.idrbtca.org.in)

   TCS (www.tcs-ca.tcs.co.in)

   MTNL Trustline (www.mtnltrustline.com)

   GNFC (www.ncodesolutions.com)

   e-Mudhra CA (www.e-Mudhra.com)
CASE STUDY
ON DIGITAL SIGNATURES



      ICICI Bank ‘Phishing’ Case
RELEVANT SECTIONS OF THE IT ACT
•   Section 66 :
    • Hacking and gaining unauthorized access
    • Any person who dishonestly, fraudulently indulges in actions like
      unauthorized access, theft/misuse of data, etc.
•   Caselet:
    • Mphasis BPO – Citibank Theft Case

•   Section 67 :
     • Publishing content in electronic form which is obscene
     • Any person who circulates/publishes sexually explicit/pornographic
       content in electronic form
•   Caselet:
     • Delhi Public School MMS Scandal Case
VALIDITY OUTSIDE INDIA
•   Section 75 :

    • Act to apply for offence or contravention committed outside India
    • The provision for the act shall also apply to any offence or
      contravention committed outside India by any person irrespective of
      his nationality




•   Caselet:
    • State Bank of India Cyber-Squatting Case.
NETWORK PROVIDERS
•   Section 79 :

    • Network Service providers not to be liable in certain cases
    • An intermediary shall not be liable for any third party information data
      or communication link made available or hosted by him; subject to
      some conditions.




•   Caselet:
    • Insulting images of Warrior Shivaji on Google’s Orkut.
OFFENCES BY COMPANIES
•   Section 85:

    • Company shall be liable
    • Director, Manager or Secretary or any other
      official shall be liable

•   Caselet:
    • The Bank NSP Case.
STATISTICS
                                   2009                      2010                 % change
     CYBER CRIMES
                           Cases          Arrested   Cases          Arrested   Cases    Arrested



1. Tampering computer                                                                   1216.7
                            21               6        64              79        204
source documents



2. Hacking with computer system



a.   Loss and damage to                                                                  269.8
                            115             63       346              233      200.8
     computer resource



b.     Hacking              118             44       164              61       38.9      38.6


3. Publication and
transmission of obscene     139             141      328              361      135.9      156
material


TOTAL (Including Other
                           420             288       966              799      128.4     177.4
Cases)
ADVANTAGES OF THE ACT
   Empowers the government departments to accept filing, creating and
    retention of official documents in the digital format

   The Act legalizes the e-mail as a mode of communication

   Digital Signatures and Digital Records can be used as legal and valid
    proof for launching litigation in a court of law

   Provides statutory remedy to corporates in case the crime against the
    accused for breaking into their computer systems or network and
    damaging and copying the data is proven
LOOPHOLES IN THE ACT
   Inapplicability

   Digital Signatures: Recognizes only PKI System

   Misuse of Police Powers

   No IPR Protection Guaranteed

   ISP not held liable.
AWARENESS SURVEY ANALYSIS
Received Spam Mail?                  What did you do about it?
               No                                             Deleted
              13%                  Marked                      it after
                                   as spam                    opening
                                     29%                           it
                                                                 21%
                                                    Deleted
     Yes                                               it
     87%                                            without
                                                    opening
                                                       it
                                                     50%


                Do you check for Secured
                     Connections?
                                              No
                                             10%
                                   Unaware of
                                     such a
                                    concept
                                      17%

                       Yes
                       73%
NASSCOM
•   A consortium that serves as an interface to the Indian Software industry
    & the Indian BPO industry.

•   Role

•   Objective:
    To build a growth led and sustainable technology and business services
    sector in the country.

•   Functions:
        • Partnership with the government
        • Research on IT and ITES
        • Protection of Intellectual Property Rights
        • Reinforce the brand equity of Indian IT and ITES industries
ROLE OF IT IN INDIAN BANKING SECTOR
•    Post liberalization, increasing competition & emergence of new banks
     led to a paradigm shift.

•    Crucial Landmarks:
    • Committee on Computerisation in Banks (1988) headed by Dr.
       C.R. Rangarajan, Deputy Governor of RBI. (MICR – Standardized
       cheque forms and encoders & centralized clearing systems)
    • Committee on Technology Issues (1994) headed by Mr. W.S.
       Saraf, ED, RBI. (EFT systems)

•    The Information Technology Act, 2000 has given legal recognition to
     creation, transmission and retention of an electronic (or magnetic) data
     to be treated as valid proof in a court of law.
ADVANTAGES TO BANKING SECTOR

•   Improved the factors in service quality like:
    responsiveness, communication and access.
•   Provides 24 hour access
•   Allows access to one’s account from virtually
    anywhere
•   Enhances speed and reliability of financial operations
•   Facilitates newer delivery channels like:
    • ATMs
    • Mobile Banking
•   Use of De-mat accounts helps users trade shares online
COMBATING CYBER CRIME
•   Spam – Filters for E-mails
•   Regular Backup of Important data
•   Periodic Virus Scan, Malware Scan & Spyware Scan.
•   Avoid publishing personal details online.

•   While transacting online:
    • Check for Valid SSL Certificate
    • Check for secured connection (HTTPS)

•   In case of any attack or suspicion, do not hesitate to lodge a complaint
    with the Cyber Crime Investigation Cell in your city.
     • Visit: http://infosecawareness.in/cyber-crime-cells-in-india to find
       your nearest CCIC.
CONCLUSION
   The IT Act is a comprehensive piece of legislation which aims at policing
    some of the activities over the Internet

   Biggest challenges are lack of awareness & non-compliance

   Overhaul of judicial system and entire mechanism to deliver justice at
    quick speed

   Stringent punishments to kill the motive of the
    criminals

   The Act is not the end but only a beginning to a
    plethora of legislation that still needs to be formed.
THANK YOU

More Related Content

What's hot

Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

What's hot (20)

Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
It act 2000
It act 2000It act 2000
It act 2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Right To Information Act 2005
Right To Information Act 2005Right To Information Act 2005
Right To Information Act 2005Ashish Kumar
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection ActAtif Ghayas
 

Viewers also liked (20)

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Business law ppt
Business law pptBusiness law ppt
Business law ppt
 
Right To Information Act 2005
Right To Information Act 2005Right To Information Act 2005
Right To Information Act 2005
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
 

Similar to Indian Information Technology Act

Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4Mahbubul Alam
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Arrow ECS UK
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ahmed Banafa
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeCA
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 

Similar to Indian Information Technology Act (20)

Sim registration
Sim registrationSim registration
Sim registration
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crime
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 

More from Karan Bhagatwala

PepsiCo & Coke Comparative Study
PepsiCo & Coke Comparative StudyPepsiCo & Coke Comparative Study
PepsiCo & Coke Comparative StudyKaran Bhagatwala
 
Mahindra & Mahindra - Proficiencies & Ethics in HRM
Mahindra & Mahindra - Proficiencies & Ethics in HRMMahindra & Mahindra - Proficiencies & Ethics in HRM
Mahindra & Mahindra - Proficiencies & Ethics in HRMKaran Bhagatwala
 
Should India go in for FCAC
Should India go in for FCACShould India go in for FCAC
Should India go in for FCACKaran Bhagatwala
 
Development of e-commerce business for e-services for housekeeping, plumbing ...
Development of e-commerce business for e-services for housekeeping, plumbing ...Development of e-commerce business for e-services for housekeeping, plumbing ...
Development of e-commerce business for e-services for housekeeping, plumbing ...Karan Bhagatwala
 

More from Karan Bhagatwala (6)

Starbucks case study
Starbucks case studyStarbucks case study
Starbucks case study
 
PepsiCo & Coke Comparative Study
PepsiCo & Coke Comparative StudyPepsiCo & Coke Comparative Study
PepsiCo & Coke Comparative Study
 
Mahindra & Mahindra - Proficiencies & Ethics in HRM
Mahindra & Mahindra - Proficiencies & Ethics in HRMMahindra & Mahindra - Proficiencies & Ethics in HRM
Mahindra & Mahindra - Proficiencies & Ethics in HRM
 
Should India go in for FCAC
Should India go in for FCACShould India go in for FCAC
Should India go in for FCAC
 
Development of e-commerce business for e-services for housekeeping, plumbing ...
Development of e-commerce business for e-services for housekeeping, plumbing ...Development of e-commerce business for e-services for housekeeping, plumbing ...
Development of e-commerce business for e-services for housekeeping, plumbing ...
 
Apollo tyres presentation
Apollo tyres presentationApollo tyres presentation
Apollo tyres presentation
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 

Indian Information Technology Act

  • 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION & TECHNOLOGY GIVES RISE TO MORE CYBER CRIMES
  • 2. GROUP MEMBERS  Lalit Ambolkar : 01  Shweta Bais : 03  Vinayan Bambardekar : 05  Vivek Band : 07  Karan Bhagatwala : 09  Aishwarya Bhavsar : 11  Meghana Bhogle : 13  Devesh Bhuwad : 15  Kaivalya Biwalkar : 17  Ankit Gehlot : 19
  • 4. INTRODUCTION  Focus of the IT Act 2000 was recognition of electronic records and facilitation of e –commerce  The amended IT Act 2008 focuses on Cyber Terrorism and Cyber Crime  Issues related to electronic transactions, digital signatures, hacking and network service providers are covered
  • 5. CYBER CRIME ‘Cyber Crime is any criminal activity done using computer and a network' AS ALSO ‘Criminal exploitation of the internet’
  • 6. MOST COMMON CYBER CRIMES  Phishing  Hacking  Publishing of Obscene Content  Cyber Squatting  Cyber Defamation
  • 7. LATEST CYBER CRIMES Tushar Mehta v/s Sanjeev Bhatt 22 Oct, 2011 Suhel Seth v/s ITC 6 Nov, 2011 Sayali Bhagat v/s Anant Rane 22 Nov, 2011
  • 8. DIGITAL SIGNATURES • It is a mathematical scheme for demonstrating the authenticity of a digital message or document • Section 3A: Any subscriber may authenticate electronic records by Electronic Signatures • Now ‘Digital Signature’ has been made a subset of ‘Electronic Signature’ • Ensures Authentication, Integrity and Non-repudiation
  • 9.
  • 10. LICENSED CAs IN INDIA  Safescrypt (www.safescrypt.com)  NIC (www.nic.in)  IDRBT (www.idrbtca.org.in)  TCS (www.tcs-ca.tcs.co.in)  MTNL Trustline (www.mtnltrustline.com)  GNFC (www.ncodesolutions.com)  e-Mudhra CA (www.e-Mudhra.com)
  • 11. CASE STUDY ON DIGITAL SIGNATURES ICICI Bank ‘Phishing’ Case
  • 12. RELEVANT SECTIONS OF THE IT ACT • Section 66 : • Hacking and gaining unauthorized access • Any person who dishonestly, fraudulently indulges in actions like unauthorized access, theft/misuse of data, etc. • Caselet: • Mphasis BPO – Citibank Theft Case • Section 67 : • Publishing content in electronic form which is obscene • Any person who circulates/publishes sexually explicit/pornographic content in electronic form • Caselet: • Delhi Public School MMS Scandal Case
  • 13. VALIDITY OUTSIDE INDIA • Section 75 : • Act to apply for offence or contravention committed outside India • The provision for the act shall also apply to any offence or contravention committed outside India by any person irrespective of his nationality • Caselet: • State Bank of India Cyber-Squatting Case.
  • 14. NETWORK PROVIDERS • Section 79 : • Network Service providers not to be liable in certain cases • An intermediary shall not be liable for any third party information data or communication link made available or hosted by him; subject to some conditions. • Caselet: • Insulting images of Warrior Shivaji on Google’s Orkut.
  • 15. OFFENCES BY COMPANIES • Section 85: • Company shall be liable • Director, Manager or Secretary or any other official shall be liable • Caselet: • The Bank NSP Case.
  • 16. STATISTICS 2009 2010 % change CYBER CRIMES Cases Arrested Cases Arrested Cases Arrested 1. Tampering computer 1216.7 21 6 64 79 204 source documents 2. Hacking with computer system a. Loss and damage to 269.8 115 63 346 233 200.8 computer resource b. Hacking 118 44 164 61 38.9 38.6 3. Publication and transmission of obscene 139 141 328 361 135.9 156 material TOTAL (Including Other 420 288 966 799 128.4 177.4 Cases)
  • 17. ADVANTAGES OF THE ACT  Empowers the government departments to accept filing, creating and retention of official documents in the digital format  The Act legalizes the e-mail as a mode of communication  Digital Signatures and Digital Records can be used as legal and valid proof for launching litigation in a court of law  Provides statutory remedy to corporates in case the crime against the accused for breaking into their computer systems or network and damaging and copying the data is proven
  • 18. LOOPHOLES IN THE ACT  Inapplicability  Digital Signatures: Recognizes only PKI System  Misuse of Police Powers  No IPR Protection Guaranteed  ISP not held liable.
  • 19. AWARENESS SURVEY ANALYSIS Received Spam Mail? What did you do about it? No Deleted 13% Marked it after as spam opening 29% it 21% Deleted Yes it 87% without opening it 50% Do you check for Secured Connections? No 10% Unaware of such a concept 17% Yes 73%
  • 20. NASSCOM • A consortium that serves as an interface to the Indian Software industry & the Indian BPO industry. • Role • Objective: To build a growth led and sustainable technology and business services sector in the country. • Functions: • Partnership with the government • Research on IT and ITES • Protection of Intellectual Property Rights • Reinforce the brand equity of Indian IT and ITES industries
  • 21. ROLE OF IT IN INDIAN BANKING SECTOR • Post liberalization, increasing competition & emergence of new banks led to a paradigm shift. • Crucial Landmarks: • Committee on Computerisation in Banks (1988) headed by Dr. C.R. Rangarajan, Deputy Governor of RBI. (MICR – Standardized cheque forms and encoders & centralized clearing systems) • Committee on Technology Issues (1994) headed by Mr. W.S. Saraf, ED, RBI. (EFT systems) • The Information Technology Act, 2000 has given legal recognition to creation, transmission and retention of an electronic (or magnetic) data to be treated as valid proof in a court of law.
  • 22. ADVANTAGES TO BANKING SECTOR • Improved the factors in service quality like: responsiveness, communication and access. • Provides 24 hour access • Allows access to one’s account from virtually anywhere • Enhances speed and reliability of financial operations • Facilitates newer delivery channels like: • ATMs • Mobile Banking • Use of De-mat accounts helps users trade shares online
  • 23. COMBATING CYBER CRIME • Spam – Filters for E-mails • Regular Backup of Important data • Periodic Virus Scan, Malware Scan & Spyware Scan. • Avoid publishing personal details online. • While transacting online: • Check for Valid SSL Certificate • Check for secured connection (HTTPS) • In case of any attack or suspicion, do not hesitate to lodge a complaint with the Cyber Crime Investigation Cell in your city. • Visit: http://infosecawareness.in/cyber-crime-cells-in-india to find your nearest CCIC.
  • 24. CONCLUSION  The IT Act is a comprehensive piece of legislation which aims at policing some of the activities over the Internet  Biggest challenges are lack of awareness & non-compliance  Overhaul of judicial system and entire mechanism to deliver justice at quick speed  Stringent punishments to kill the motive of the criminals  The Act is not the end but only a beginning to a plethora of legislation that still needs to be formed.