SlideShare a Scribd company logo
INFORMATION TECHNOLOGY ACT,
      RATHER THAN GIVING
  INFORMATION & TECHNOLOGY
       GIVES RISE TO MORE
          CYBER CRIMES
GROUP MEMBERS
   Lalit Ambolkar        :   01
   Shweta Bais           :   03
   Vinayan Bambardekar   :   05
   Vivek Band            :   07
   Karan Bhagatwala      :   09
   Aishwarya Bhavsar     :   11
   Meghana Bhogle        :   13
   Devesh Bhuwad         :   15
   Kaivalya Biwalkar     :   17
   Ankit Gehlot          :   19
INFORMATION TECHNOLOGY ACT,
            2000
INTRODUCTION

   Cyber Crime is any criminal activity done using computers and the
    Internet

   The focus of the IT Act 2000 was recognition of electronic records and
    facilitation of e –commerce

   However, the amended IT Act 2008 focuses on Cyber Terrorism and to a
    significant extent, Cyber Crime

   Issues related to electronic transactions, digital signatures, hacking and
    network service providers are covered
DEFINITIONS


          Access

          Computer

          Computer Network

          Information

          Data

          Electronic Record
MOST COMMON CYBER CRIMES

   Phishing

   Hacking

   Publishing of Obscene Content

   Cyber Squatting

   Cyber Defamation
DIGITAL SIGNATURES


•   It is a mathematical scheme for demonstrating the authenticity of a
    digital message or document

•   Section 3A: Any subscriber may authenticate electronic records by
    Electronic Signatures

•   Now ‘Digital Signature’ has been made a subset of ‘Electronic Signature’

•   Ensures Authentication, Integrity and Non-repudiation
LICENSED CAs IN INDIA
   Safescrypt (www.safescrypt.com)

   NIC (www.nic.in)

   IDRBT (www.idrbtca.org.in)

   TCS (www.tcs-ca.tcs.co.in)

   MTNL Trustline (www.mtnltrustline.com)

   GNFC (www.ncodesolutions.com)

   e-Mudhra CA (www.e-Mudhra.com)
CASE STUDY



 ICICI Bank ‘Phishing’ Case
RELEVANT SECTIONS OF THE IT ACT
•   Section 66 :

    • Hacking and gaining unauthorized access
    • Any person who dishonestly, fraudulently indulges in actions as
      mentioned in Section 43




•   Section 67 :

    • Publishing content in electronic form which is obscene
    • Any person who circulates/publishes sexually explicit/pornographic
      content in electronic form
CASELETS

 MphasiS BPO – Citibank theft




Delhi Public School MMS scandal
VALIDITY OUTSIDE INDIA




•   Section 75 :

    • Act to apply for offence or contravention committed outside India

    • The provision for the act shall also apply to any offence or
      contravention committed outside India by any person irrespective of
      his nationality
CASE STUDY



     SBI Cyber-Squatting Case
NETWORK PROVIDERS




•   Section 79 :

    • Network Service providers not to be liable in certain cases

    • An intermediary shall not be liable for any third party information data
      or communication link made available or hosted by him; subject to
      some conditions.
CASE STUDY


Insulting images of
Warrior Shivaji on Google
OFFENCES BY COMPANIES


•   Section 85:

    • Company shall be liable

    • Director, Manager or Secretary or any other
      official shall be liable
CASE STUDY



     The Bank NSP Case
STATISTICS
     CYBER CRIMES                  2009                      2010                 % change

                           Cases          Arrested   Cases          Arrested   Cases    Arrested

1. Tampering computer       21               6        64              79       204      1216.7
source documents




2. Hacking with computer system

a.   Loss and damage to     115             63       346              233      200.8     269.8
     computer resource




b.     Hacking              118             44       164              61       38.9      38.6

3. Publication and          139             141      328              361      135.9      156
transmission of obscene
material




TOTAL (Including Other      420             288      966              799      128.4     177.4
Cases)
ADVANTAGES OF THE ACT
   Empowers the government departments to accept filing, creating and
    retention of official documents in the digital format

   The Act legalizes the e-mail as a mode of communication

   Digital Signatures and Digital Records can be used as legal and valid
    proof for launching litigation in a court of law

   Provides statutory remedy to corporates in case the crime against the
    accused for breaking into their computer systems or network and
    damaging and copying the data is proven
LOOPHOLES IN THE ACT
   Inapplicability

   Digital Signatures: Recognizes only PKI System

   Powers of Adjudicating Officers unclear.

   Possible Violation of Fundamental Rights

   Misuse of Police Powers

   No IPR Protection Guaranteed

   No mention of ‘Spamming’
AWARENESS SURVEY ANALYSIS
   Received Spam Mail?         What did you do about it?
                                                        Deleted
                     No       Marked                     it after
                    13%       as spam                   opening
                                29%                          it
                                                           21%
                                              Deleted
            Yes                                  it
            87%                               without
                                              opening
                                                 it
                                               50%


                              Do you check for Secured
Which is NOT a Cyber Crime?        Connections?
                                                             No
Spamming                                                    10%
  13%
                                                 Unaware of
 Sniffing                                          such a
  12%                                             concept
                                                    17%
Phishing
  5%              Biting                Yes
                  67%                   73%
 Hacking
    3%
NASSCOM

•   Objective:
    • To build a growth led and sustainable technology and business services
      sector in the country.

•   Functions:
        • Partnership with the government
        • Research on IT and ITES protection of intellectual property
          rights
        • Reinforce the brand equity of Indian IT and ITES industries
        • Increase talent pool in India

•   Case-study: Nasscom vs. Ajay Sood & Others
ROLE OF IT IN INDIAN BANKING SECTOR
•   A paradigm shift.

•   Internet has emerged as an important medium for delivery of banking
    products & services.

•   The Information Technology Act, 2000 has given legal recognition to
    creation, transmission and retention of an electronic (or magnetic) data
    to be treated as valid proof in a court of law

•   Some Technology products in Banking sector include:
    • Net Banking
    • Online payment of Excise and Service Tax
ADVANTAGES TO BANKING SECTOR

•   Improved the factors in service quality like:
    responsiveness, communication and access.
•   It’s generally secure
•   Provides 24 hour access
•   Allows access to one’s account from virtually
    anywhere
•   Enhances speed and reliability of financial operations
•   Facilitates newer delivery channels like:
    • ATMs
    • Mobile Banking
•   Use of De-mat accounts helps users trade shares online
COMBATING CYBER CRIME
•   Spam – Filters for E-mails
•   Regular Backup of Important data
•   Periodic Virus Scan, Malware Scan & Spyware Scan.
•   Avoid publishing personal details online.

•   While transacting online:
    • Check for Valid SSL Certificate
    • Check for secured connection (HTTPS)

•   In case of any attack or suspicion, do not hesitate to lodge a complaint
    with the Cyber Crime Investigation Cell in your city.
     • Visit: http://infosecawareness.in/cyber-crime-cells-in-india to find
       your nearest CCIC.
CONCLUSION
   The IT Act is a comprehensive piece of legislation which aims at policing
    some of the activities over the Internet
   Awareness regarding these cyber laws must be created
   Trained law enforcement officials for effective enforcement
   Overhaul of judicial system and entire mechanism to deliver justice at
    quick speed
   Stringent punishments to kill the motive of the criminals
   The Act is not the end but only a beginning to a
    plethora of legislation that still needs to be formed.
STATE OF CYBER CRIME
THANK YOU

More Related Content

What's hot

Cyber law
Cyber lawCyber law
Can Fundamental Rights be amended under aticle 13(4)
Can Fundamental Rights be amended under aticle  13(4)Can Fundamental Rights be amended under aticle  13(4)
Can Fundamental Rights be amended under aticle 13(4)
zaztha1
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
Dababrata Mondal
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cyber crime
Cyber crimeCyber crime
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
AnandKaGe
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
Kanhaiya Kumar
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anees Raza
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 

What's hot (20)

Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Can Fundamental Rights be amended under aticle 13(4)
Can Fundamental Rights be amended under aticle  13(4)Can Fundamental Rights be amended under aticle  13(4)
Can Fundamental Rights be amended under aticle 13(4)
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar to Information technology act

Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
Mahmudul hasan
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
Mahmudul hasan
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Matteo Masi
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
itnewsafrica
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
 
Sim registration
Sim registrationSim registration
Sim registration
bansi bharadwaj
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
Parag Deodhar
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
NISHAGPARDESHI
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4
Mahbubul Alam
 

Similar to Information technology act (20)

Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Sim registration
Sim registrationSim registration
Sim registration
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4
 

More from Meghana Bhogle

Tyco - A corporate governance failure
Tyco - A corporate governance failureTyco - A corporate governance failure
Tyco - A corporate governance failure
Meghana Bhogle
 
Charagh Din
Charagh DinCharagh Din
Charagh Din
Meghana Bhogle
 
Starbucks
StarbucksStarbucks
Starbucks
Meghana Bhogle
 
IMC components of promoting The Sentosa Resort World Singapore
IMC components of promoting The Sentosa Resort World SingaporeIMC components of promoting The Sentosa Resort World Singapore
IMC components of promoting The Sentosa Resort World Singapore
Meghana Bhogle
 
Maruti suzuki’s prolonged labour pain!
Maruti suzuki’s prolonged labour pain!Maruti suzuki’s prolonged labour pain!
Maruti suzuki’s prolonged labour pain!
Meghana Bhogle
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
Meghana Bhogle
 
HDIL- An overview
HDIL- An overviewHDIL- An overview
HDIL- An overview
Meghana Bhogle
 
Foldaway- efurniture
Foldaway- efurnitureFoldaway- efurniture
Foldaway- efurniture
Meghana Bhogle
 
Smart things to know about change
Smart things to know about changeSmart things to know about change
Smart things to know about change
Meghana Bhogle
 
Impact of microfinance on the indian economy
Impact of microfinance on the indian economyImpact of microfinance on the indian economy
Impact of microfinance on the indian economy
Meghana Bhogle
 

More from Meghana Bhogle (10)

Tyco - A corporate governance failure
Tyco - A corporate governance failureTyco - A corporate governance failure
Tyco - A corporate governance failure
 
Charagh Din
Charagh DinCharagh Din
Charagh Din
 
Starbucks
StarbucksStarbucks
Starbucks
 
IMC components of promoting The Sentosa Resort World Singapore
IMC components of promoting The Sentosa Resort World SingaporeIMC components of promoting The Sentosa Resort World Singapore
IMC components of promoting The Sentosa Resort World Singapore
 
Maruti suzuki’s prolonged labour pain!
Maruti suzuki’s prolonged labour pain!Maruti suzuki’s prolonged labour pain!
Maruti suzuki’s prolonged labour pain!
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
HDIL- An overview
HDIL- An overviewHDIL- An overview
HDIL- An overview
 
Foldaway- efurniture
Foldaway- efurnitureFoldaway- efurniture
Foldaway- efurniture
 
Smart things to know about change
Smart things to know about changeSmart things to know about change
Smart things to know about change
 
Impact of microfinance on the indian economy
Impact of microfinance on the indian economyImpact of microfinance on the indian economy
Impact of microfinance on the indian economy
 

Recently uploaded

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Information technology act

  • 1. INFORMATION TECHNOLOGY ACT, RATHER THAN GIVING INFORMATION & TECHNOLOGY GIVES RISE TO MORE CYBER CRIMES
  • 2. GROUP MEMBERS  Lalit Ambolkar : 01  Shweta Bais : 03  Vinayan Bambardekar : 05  Vivek Band : 07  Karan Bhagatwala : 09  Aishwarya Bhavsar : 11  Meghana Bhogle : 13  Devesh Bhuwad : 15  Kaivalya Biwalkar : 17  Ankit Gehlot : 19
  • 4. INTRODUCTION  Cyber Crime is any criminal activity done using computers and the Internet  The focus of the IT Act 2000 was recognition of electronic records and facilitation of e –commerce  However, the amended IT Act 2008 focuses on Cyber Terrorism and to a significant extent, Cyber Crime  Issues related to electronic transactions, digital signatures, hacking and network service providers are covered
  • 5. DEFINITIONS  Access  Computer  Computer Network  Information  Data  Electronic Record
  • 6. MOST COMMON CYBER CRIMES  Phishing  Hacking  Publishing of Obscene Content  Cyber Squatting  Cyber Defamation
  • 7. DIGITAL SIGNATURES • It is a mathematical scheme for demonstrating the authenticity of a digital message or document • Section 3A: Any subscriber may authenticate electronic records by Electronic Signatures • Now ‘Digital Signature’ has been made a subset of ‘Electronic Signature’ • Ensures Authentication, Integrity and Non-repudiation
  • 8.
  • 9. LICENSED CAs IN INDIA  Safescrypt (www.safescrypt.com)  NIC (www.nic.in)  IDRBT (www.idrbtca.org.in)  TCS (www.tcs-ca.tcs.co.in)  MTNL Trustline (www.mtnltrustline.com)  GNFC (www.ncodesolutions.com)  e-Mudhra CA (www.e-Mudhra.com)
  • 10. CASE STUDY ICICI Bank ‘Phishing’ Case
  • 11. RELEVANT SECTIONS OF THE IT ACT • Section 66 : • Hacking and gaining unauthorized access • Any person who dishonestly, fraudulently indulges in actions as mentioned in Section 43 • Section 67 : • Publishing content in electronic form which is obscene • Any person who circulates/publishes sexually explicit/pornographic content in electronic form
  • 12. CASELETS MphasiS BPO – Citibank theft Delhi Public School MMS scandal
  • 13. VALIDITY OUTSIDE INDIA • Section 75 : • Act to apply for offence or contravention committed outside India • The provision for the act shall also apply to any offence or contravention committed outside India by any person irrespective of his nationality
  • 14. CASE STUDY SBI Cyber-Squatting Case
  • 15. NETWORK PROVIDERS • Section 79 : • Network Service providers not to be liable in certain cases • An intermediary shall not be liable for any third party information data or communication link made available or hosted by him; subject to some conditions.
  • 16. CASE STUDY Insulting images of Warrior Shivaji on Google
  • 17. OFFENCES BY COMPANIES • Section 85: • Company shall be liable • Director, Manager or Secretary or any other official shall be liable
  • 18. CASE STUDY The Bank NSP Case
  • 19. STATISTICS CYBER CRIMES 2009 2010 % change Cases Arrested Cases Arrested Cases Arrested 1. Tampering computer 21 6 64 79 204 1216.7 source documents 2. Hacking with computer system a. Loss and damage to 115 63 346 233 200.8 269.8 computer resource b. Hacking 118 44 164 61 38.9 38.6 3. Publication and 139 141 328 361 135.9 156 transmission of obscene material TOTAL (Including Other 420 288 966 799 128.4 177.4 Cases)
  • 20. ADVANTAGES OF THE ACT  Empowers the government departments to accept filing, creating and retention of official documents in the digital format  The Act legalizes the e-mail as a mode of communication  Digital Signatures and Digital Records can be used as legal and valid proof for launching litigation in a court of law  Provides statutory remedy to corporates in case the crime against the accused for breaking into their computer systems or network and damaging and copying the data is proven
  • 21. LOOPHOLES IN THE ACT  Inapplicability  Digital Signatures: Recognizes only PKI System  Powers of Adjudicating Officers unclear.  Possible Violation of Fundamental Rights  Misuse of Police Powers  No IPR Protection Guaranteed  No mention of ‘Spamming’
  • 22. AWARENESS SURVEY ANALYSIS Received Spam Mail? What did you do about it? Deleted No Marked it after 13% as spam opening 29% it 21% Deleted Yes it 87% without opening it 50% Do you check for Secured Which is NOT a Cyber Crime? Connections? No Spamming 10% 13% Unaware of Sniffing such a 12% concept 17% Phishing 5% Biting Yes 67% 73% Hacking 3%
  • 23. NASSCOM • Objective: • To build a growth led and sustainable technology and business services sector in the country. • Functions: • Partnership with the government • Research on IT and ITES protection of intellectual property rights • Reinforce the brand equity of Indian IT and ITES industries • Increase talent pool in India • Case-study: Nasscom vs. Ajay Sood & Others
  • 24. ROLE OF IT IN INDIAN BANKING SECTOR • A paradigm shift. • Internet has emerged as an important medium for delivery of banking products & services. • The Information Technology Act, 2000 has given legal recognition to creation, transmission and retention of an electronic (or magnetic) data to be treated as valid proof in a court of law • Some Technology products in Banking sector include: • Net Banking • Online payment of Excise and Service Tax
  • 25. ADVANTAGES TO BANKING SECTOR • Improved the factors in service quality like: responsiveness, communication and access. • It’s generally secure • Provides 24 hour access • Allows access to one’s account from virtually anywhere • Enhances speed and reliability of financial operations • Facilitates newer delivery channels like: • ATMs • Mobile Banking • Use of De-mat accounts helps users trade shares online
  • 26. COMBATING CYBER CRIME • Spam – Filters for E-mails • Regular Backup of Important data • Periodic Virus Scan, Malware Scan & Spyware Scan. • Avoid publishing personal details online. • While transacting online: • Check for Valid SSL Certificate • Check for secured connection (HTTPS) • In case of any attack or suspicion, do not hesitate to lodge a complaint with the Cyber Crime Investigation Cell in your city. • Visit: http://infosecawareness.in/cyber-crime-cells-in-india to find your nearest CCIC.
  • 27. CONCLUSION  The IT Act is a comprehensive piece of legislation which aims at policing some of the activities over the Internet  Awareness regarding these cyber laws must be created  Trained law enforcement officials for effective enforcement  Overhaul of judicial system and entire mechanism to deliver justice at quick speed  Stringent punishments to kill the motive of the criminals  The Act is not the end but only a beginning to a plethora of legislation that still needs to be formed.
  • 28. STATE OF CYBER CRIME