SlideShare a Scribd company logo
Presentation by :
Gautam GR
IT Act 2000
◦ An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as electronic
commerce‖, which involve the use of alternatives to paper-based methods of communication and
storage of information, to facilitate electronic filing of documents with the Government agencies
and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker’s Books
Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith
or incidental thereto.
◦ The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9
May 2000.
◦ Cyber law is the part of the overall legal system that deals with the internet, cyberspace, and their
respective legal issues. Cyber law covers a fairly broad area covering several subtopics including
freedom of expression, access to and usage of the internet, and online privacy. Generically, cyber law
is referred to as the Law of the Internet.
◦ This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a
major impact for e-businesses and the new economy in India. So, it is important to understand what
are the various perspectives of the IT Act, 2000 and what it offers.
◦ The Information Technology Act, 2000 also aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other activities carried out by electronic means. The
Act states that unless otherwise agreed, an acceptance of contract may be expressed by electronic
means of communication and the same shall have legal validity and enforceability.
Highlights of the Act :
Chapter I
stipulates that any subscriber may
authenticate an electronic record by
affixing his digital signature. It further
states that any person can verify an
electronic record by use of a public key of
the subscriber.
Chapter II
details about Electronic Governance and
provides inter alia amongst others that
where any law provides that information or
any other matter shall be in writing or in
the typewritten or printed form
Chapter III
details about Electronic Governance and
provides inter alia amongst others that where
any law provides that information or any other
matter shall be in writing or in the typewritten
or printed form
Chapter IV
gives a scheme for Regulation of
Certifying Authorities. The Act envisages a
Controller of Certifying Authorities who
shall perform the function of exercising
supervision over the activities of the
Certifying Authorities.
Chapter V
of the Act details about the scheme of
things relating to Digital Signature
Certificates. The duties of subscribers
are also enshrined in the said Act.
Offences and Penalties:
 Section 65 - Tampering with computer source documents :
If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to
conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or
computer network, when the computer source code is required to be kept or maintained by law for the time.
Penalty - Imprisonment up to three years, or/and with fine up to Rs.200,000
 Section 66 – Hacking with computer system
If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any
person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or
affects it injuriously by any means, commits hack.
Penalty - Imprisonment up to three years, or/and with fine up to Rs.500,000
 Section 67 - Publishing information which is obscene in e-form
If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or
appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard
to all relevant circumstances, to read, see or hear the matter contained or embodied in it.
Penalty - Imprisonment up to five years, or/and with fine up to RS 1,000,000
• Section 67A – Publishing images containing sexual acts
If a person publishes or transmits images containing a sexual explicit act or conduct.
Penalty- Imprisonment up to seven years, or/and with fine up to RS 1,000,000
• Section 67B – Publishing child porn or predating children online
If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child
into a sexual act. A child is defined as anyone under 18.
Penalty- Imprisonment up to five years, or/and with fine up to RS 1,000,000 on first conviction. Imprisonment up to seven
years, or/and with fine up to RS 1,000,000 on second conviction.
• Section 67C - Failure to maintain records
Persons deemed as intermediary (such as an ISP) must maintain required records for stipulated time. Failure is an offence.
Penalty- Imprisonment up to three years, or/and with fine.
 Section 68 - Failure/refusal to comply with orders
The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or
cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions
of this Act, rules or any regulations made there under. Any person who fails to comply with any such order shall be guilty
of an offence.
Penalty- Imprisonment up to three years, or/and with fine up to RS 200,000
 Section 69 - Failure/refusal to decrypt data
If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of
India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the
commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the
Government to intercept any information transmitted through any computer resource
Penalty- Imprisonment up to seven years and possible fine.
 Section 70 - Securing access to a protected system
The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or
computer network to be a protected system. If a person who secures access or attempts to secure access to a protected
system, then he is committing an offence.
Penalty- Imprisonment up to ten years, or/and with fine.
Criticism:
◦ Section 66A and Restriction of Free Speech
From its establishment as an amendment to the original act in 2008, Section 66A attracted controversy over its
unconstitutional nature:
Section 66A - Publishing offensive, false or threatening information
◦ Any person who sends by any means of a computer resource any information that is grossly offensive or has a
menacing character; or any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult shall be punishable with imprisonment for a term which may extend to three
years and with fine.
◦ In December 2012, P Rajeev, a Rajya Sabha member from Kerala, tried to pass a resolution seeking to amend the
Section 66A. He was supported by D. Bandyopadhyay, Gyan Prakash, Narendra Kumar Kashyap, Rama Chandra
Khuntia and Baishnab Charan Parida. P Rajeev pointed that cartoons and editorials allowed in traditional media, were
being censored in the new media. He also said that law was barely debated before being passed in December 2008.
Future Changes :
◦ On 2 April 2015, the Chief Minister of Maharashtra, Devendra Fadnavis revealed to the state assembly that a new
law was being framed to replace the repealed Section 66A. Fadnavis was replying to a query Shiv Sena leader
Neelam Gorhe. Gorhe had said that repeal of the law would encourage online miscreants and asked whether the
state government would frame a law to this regard. Fadnavis said that the previous law had resulted in no
convictions, so the law would be framed such that it would be strong and result in convictions.
◦ On 13 April 2015, it announced that the Ministry of Home Affairs would form a committee of officials from
the Intelligence Bureau, Central Bureau of Investigation, National Investigation Agency, Delhi Police and ministry
itself to produce a new legal framework. This step was reportedly taken after complaints from intelligence agencies
that, they were no longer able to counter online posts that involved national security matter or incite people to
commit an offence, such as online recruitment for ISIS. Former Minister of State with the Ministry of
Information Technology, Milind Deora has supported a new "unambiguous section to replace 66A"
Conclusion :
• Computers add a new dimension to
criminal law, presenting many issues
for law enforcement. At the front of
law enforcement concern is the
necessity to secure adequate
training to combat these crimes.
This requires additional resources.
• In some cases data are encrypted,
making it difficult for police
authorities to get the contents of
the information. Corporations may
fear the negative publicity that
might result as a consequence of
their systems being compromised.
• In many cases, unauthorized
computer access may go undetected
by the individual or entity whose
computer system had been invaded.
Though not all the peoples are
victims to cyber crimes but they are
still at risk.
THANK YOU!

More Related Content

What's hot

Information technology act
Information technology actInformation technology act
Information technology act
bahubali1611
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Maxwell Ranasinghe
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
Ayesha Majid
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
Md. Mehedi Al Hasan Rakib
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
KOMALMALLIK
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
Shahid Jamal Tubrazy
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
Tearsome Llantada
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
Ayesha Majid
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
fiza209
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Rana Muhammad Asif
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
IshitaSrivastava21
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
Shakeel Ahmed
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 

What's hot (20)

Information technology act
Information technology actInformation technology act
Information technology act
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 

Similar to Indian IT Act - Cybersecurity

Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
ShashankBajpai24
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
Tapan Khilar
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
PrakharPrasoon
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
nithyam40
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Pradeep Tomar
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
Hemraj Singh Chouhan
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
Parth Patel
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
kinjal vaghela
 
cyberlaw
cyberlawcyberlaw
cyberlaw
divyaanjali8
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mohit Dholakiya
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
RAJ ANAND
 
it act
it act it act
it act
9535814851
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Ashish Karan
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
EquiCorp Associates
 

Similar to Indian IT Act - Cybersecurity (20)

Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
it act
it act it act
it act
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

Indian IT Act - Cybersecurity

  • 2. IT Act 2000 ◦ An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce‖, which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker’s Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. ◦ The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9 May 2000.
  • 3. ◦ Cyber law is the part of the overall legal system that deals with the internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area covering several subtopics including freedom of expression, access to and usage of the internet, and online privacy. Generically, cyber law is referred to as the Law of the Internet. ◦ This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers. ◦ The Information Technology Act, 2000 also aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means. The Act states that unless otherwise agreed, an acceptance of contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability.
  • 4. Highlights of the Act : Chapter I stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. It further states that any person can verify an electronic record by use of a public key of the subscriber. Chapter II details about Electronic Governance and provides inter alia amongst others that where any law provides that information or any other matter shall be in writing or in the typewritten or printed form Chapter III details about Electronic Governance and provides inter alia amongst others that where any law provides that information or any other matter shall be in writing or in the typewritten or printed form Chapter IV gives a scheme for Regulation of Certifying Authorities. The Act envisages a Controller of Certifying Authorities who shall perform the function of exercising supervision over the activities of the Certifying Authorities. Chapter V of the Act details about the scheme of things relating to Digital Signature Certificates. The duties of subscribers are also enshrined in the said Act.
  • 5. Offences and Penalties:  Section 65 - Tampering with computer source documents : If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time. Penalty - Imprisonment up to three years, or/and with fine up to Rs.200,000  Section 66 – Hacking with computer system If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. Penalty - Imprisonment up to three years, or/and with fine up to Rs.500,000
  • 6.  Section 67 - Publishing information which is obscene in e-form If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it. Penalty - Imprisonment up to five years, or/and with fine up to RS 1,000,000 • Section 67A – Publishing images containing sexual acts If a person publishes or transmits images containing a sexual explicit act or conduct. Penalty- Imprisonment up to seven years, or/and with fine up to RS 1,000,000 • Section 67B – Publishing child porn or predating children online If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18. Penalty- Imprisonment up to five years, or/and with fine up to RS 1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to RS 1,000,000 on second conviction. • Section 67C - Failure to maintain records Persons deemed as intermediary (such as an ISP) must maintain required records for stipulated time. Failure is an offence. Penalty- Imprisonment up to three years, or/and with fine.
  • 7.  Section 68 - Failure/refusal to comply with orders The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made there under. Any person who fails to comply with any such order shall be guilty of an offence. Penalty- Imprisonment up to three years, or/and with fine up to RS 200,000  Section 69 - Failure/refusal to decrypt data If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource Penalty- Imprisonment up to seven years and possible fine.  Section 70 - Securing access to a protected system The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. Penalty- Imprisonment up to ten years, or/and with fine.
  • 8. Criticism: ◦ Section 66A and Restriction of Free Speech From its establishment as an amendment to the original act in 2008, Section 66A attracted controversy over its unconstitutional nature: Section 66A - Publishing offensive, false or threatening information ◦ Any person who sends by any means of a computer resource any information that is grossly offensive or has a menacing character; or any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult shall be punishable with imprisonment for a term which may extend to three years and with fine. ◦ In December 2012, P Rajeev, a Rajya Sabha member from Kerala, tried to pass a resolution seeking to amend the Section 66A. He was supported by D. Bandyopadhyay, Gyan Prakash, Narendra Kumar Kashyap, Rama Chandra Khuntia and Baishnab Charan Parida. P Rajeev pointed that cartoons and editorials allowed in traditional media, were being censored in the new media. He also said that law was barely debated before being passed in December 2008.
  • 9.
  • 10. Future Changes : ◦ On 2 April 2015, the Chief Minister of Maharashtra, Devendra Fadnavis revealed to the state assembly that a new law was being framed to replace the repealed Section 66A. Fadnavis was replying to a query Shiv Sena leader Neelam Gorhe. Gorhe had said that repeal of the law would encourage online miscreants and asked whether the state government would frame a law to this regard. Fadnavis said that the previous law had resulted in no convictions, so the law would be framed such that it would be strong and result in convictions. ◦ On 13 April 2015, it announced that the Ministry of Home Affairs would form a committee of officials from the Intelligence Bureau, Central Bureau of Investigation, National Investigation Agency, Delhi Police and ministry itself to produce a new legal framework. This step was reportedly taken after complaints from intelligence agencies that, they were no longer able to counter online posts that involved national security matter or incite people to commit an offence, such as online recruitment for ISIS. Former Minister of State with the Ministry of Information Technology, Milind Deora has supported a new "unambiguous section to replace 66A"
  • 11. Conclusion : • Computers add a new dimension to criminal law, presenting many issues for law enforcement. At the front of law enforcement concern is the necessity to secure adequate training to combat these crimes. This requires additional resources. • In some cases data are encrypted, making it difficult for police authorities to get the contents of the information. Corporations may fear the negative publicity that might result as a consequence of their systems being compromised. • In many cases, unauthorized computer access may go undetected by the individual or entity whose computer system had been invaded. Though not all the peoples are victims to cyber crimes but they are still at risk.