SlideShare a Scribd company logo
1 of 13
ASSIGNMENT # A 630
Course: 50421622 (Media Laws and Ethics)
Topic: Detailed note on the definitions (Section 2)
Of Information Technology Act, 2000.
Roll No- 489
Introduction
Information Technology Act 200, is to provide legal
recognition for transactions carried out by means of
electronic data interchange and other means of
electronic communication, commonly referred to as
“electronic commerce”, which involves the use of
alternatives to paper-based methods of
communication and storage of information, to
facilitate electronic filings of documents with
government agencies and further to amend The Indian
Penal Code, The Indian Evidence Act,1872, The
Banker’s Books Evidence Act,1891 and the Reserve
Bank of India Act,1934 and for matters connected
therewith or incidental thereto.
Information Technology Act 2000 is based on
UNCITRAL (United Nations Commission on
International Trade Law) Model law.
Information Technology Act 2000 has 13 chapters, 94
sections and 4 schedules. First 14 sections deals with
some legal aspects concerning digital signatures.
Further other sections deal with certifying authorities
that are licensed to issue digital signature. Section 43
to 47 provide for penalties and compensation. Section
48 to 67 deals with Tribunals appeal to high court.
Section 65 to 79 of the act deals with offences.
Section 80 to 94 deals with miscellaneous of the Act.
Objectives of The Information Technology Act
2000.
I. This Act may be called the Information
Technology Act, 2000.
II. It shall extend to the whole of India and, save as
otherwise provided in this Act, it applies also to
any offence or contravention there under
committed outside India by any person.
III. It shall come into force on such date1 as the
Central Government may, by notification, appoint
and different dates may be appointed for different
provisions of this Act and any reference in any
such provision to the commencement of this Act
shall be construed as a reference to the
commencement of that provision.
IV. Nothing in this Act shall apply to:-
 A negotiable instrument as defined in section 13
of the Negotiable Instrument Act, 1881;
 A power of attorney as defined in section 1A of
the Power-of-Attorney Act, 1882;
 A trust as defined in section 3 of the Indian
Succession Act, 1925 including any other
testamentary disposition by whatever name called;
 Any contract for the sale or conveyance of
immovable property or any interest in such
property;
 Any such class of documents or transactions as
may be notified by Central Government in the
Official Gazette.
The definitions (Section 2) of Information
Technology Act, 2000.
S.2. Definitions-
(1) In this Act, unless the context otherwise requires,
(a) “access” with its grammatical variations and
cognate expressions means gaining entry into,
instructing or communicating with the logical,
arithmetical, or memory function resources of a
computer, computer system or computer network;
(b) “addressee” means a person who is intended by
the originator to receive the electronic record but does
not include any intermediary;
(c) “adjudicating officer” means an adjudicating
officer appointed under sub- section (1) of section 46;
(d) “affixing [electronic signature]” with its
grammatical variations and cognate expressions
means adoption of any methodology or procedure by a
person for the purpose of authenticating an electronic
record by means of [electronic signature];
(e) “appropriate Government” means as respects
any matter,—
 enumerated in List II of the Seventh Schedule to
the Constitution;
 Relating to any State law enacted under List III of
the Seventh Schedule to the Constitution,
The State Government and in any other case, the
Central Government;
(f) “asymmetric crypto system” means a system of a
secure key pair consisting of a private key for creating
a digital signature and a public key to verify the
digital signature;
(g) “Certifying Authority” means a person who has
been granted a license to issue a 5[electronic
signature] Certificate under section 24;
(h) “Certification practice statement” means a
statement issued by a Certifying Authority to specify
the practices that the Certifying Authority employs in
issuing 6[Electronic Signature] Certificates;
(ha) “Communication device” means cell phones,
personal digital assistance or combination of both or
any other device used to communicate, send or
transmit any text, video, audio or image;]
(i) “Computer” means any electronic, magnetic,
optical or other high-speed data processing device or
system which performs logical, arithmetic, and
memory functions by manipulations of electronic,
magnetic or optical impulses, and includes all input,
output, processing, storage, computer soft- ware, or
communication facilities which are connected or
related to the computer in a computer system or
computer network;
(j) “Computer network” means the inter-connection
of one or more computers or computer systems or
communication device through—
 The use of satellite, microwave, terrestrial line,
wire, wireless or other communication media; and
 Terminals or a complex consisting of two or more
inter-connected computers or communication
device whether or not the interconnection is
continuously maintained;]
(k) “Computer resource” means computer, computer
system, computer net- work, data, computer data-base
or software;
(l)“computer system” means a device or collection of
devices, including input and output support devices
and excluding calculators which are not
programmable and capable of being used in
conjunction with external files, which contain
computer programs, electronic instructions, input data,
and output data, that performs logic, arithmetic, data
storage and retrieval, communication control and
other functions;
(m) “Controller” means the Controller of Certifying
Authorities appointed un- der sub-section (7) of
section 17;
(n) “Cyber Appellate Tribunal” means the Cyber
Regulations Appellate Tribunal established under sub-
section (1) of section 48;
(na) “Cyber cafe” means any facility from where
access to the Internet is offered by any person in the
ordinary course of business to the members of the
public;
(nb) “Cyber security” means protecting information,
equipment, devices, computer, computer resource,
communication device and information stored therein
from unauthorized access, use, disclosure, disruption,
modification or destruction;]
(o) “data” means a representation of information,
knowledge, facts, concepts or instructions which are
being prepared or have been prepared in a formalized
manner, and is intended to be processed, is being
processed or has been processed in a computer system
or computer network, and may be in any form
(including computer printouts, magnetic or optical
storage media, punched cards, punched tapes) or
stored internally in the memory of the computer;
(p) “Digital signature” means authentication of any
electronic record by a sub- scriber by means of an
electronic method or procedure in accordance with the
provisions of section 3;
(q) “Digital Signature Certificate” means a Digital
Signature Certificate issued under sub-section (4) of
section 35;
(r) “Electronic form” with reference to information
means any information generated, sent, received or
stored in media, magnetic, optical, computer memory,
microfilm, computer generated microfiche or similar
device;
(s) “Electronic Gazette” means the official gazette
published in the electronic form;
(t) “Electronic record” means data, record or data
generated, image or sound stored, received or sent in
an electronic form or microfilm or computer
generated microfiche;
(ta) “Electronic signature” means authentication of
any electronic record by a subscriber by means of the
electronic technique specified in the Second Schedule
and includes digital signature;
(ta) “Electronic Signature Certificate” means an
Electronic Signature Certificate issued under Section
35 and includes Digital Signature Certificate;]
(u) “Function”, in relation to a computer, includes
logic, control, arithmetical process, deletion, storage
and retrieval and communication or
telecommunication from or within a computer;
(ua) “Indian Computer Emergency Response
Team” means an agency established under sub-
section (1) of section 70B;]
(v) “Information” includes 13[data, message, text,]
images, sound, voice, codes, computer programs,
software and data-bases or micro film or computer
generated micro fiche;
w) “Intermediary”, with respect to any particular
electronic records, means any person who on behalf of
another person receives, stores or transmits that record
or provides any service with respect to that record and
includes telecom service providers, network service
providers, internet service providers, web-hosting
service providers, search engines, online payment
sites, online- auction sites, online-market places and
cyber cafes;]
(x) “Key pair”, in an asymmetric crypto system,
means a private key and its mathematically related
public key, which are so related that the public key
can verify a digital signature created by the private
key;
(y) “Law” includes any Act of Parliament or of a
State Legislature, Ordinances promulgated by the
President or a Governor, as the case may be,
Regulations made by the President under article 240,
Acts enacted as President’s Act under sub-clause (a)
of clause (1) of article 357 of the Constitution and
includes rules, regulations, bye-laws and orders issued
or made thereunder;
(z) “License” means a license granted to a Certifying
Authority under section 24;
(za) “Originator” means a person who sends,
generates, stores or transmits any electronic message
or causes any electronic message to be sent,
generated, stored or transmitted to any other person
but does not include an intermediary;
(zb) “Prescribed” means prescribed by rules made
under this Act;
(zc) “Private key” means the key of a key pair used
to create a digital signature;
(zd) “Public key” means the key of a key pair used to
verify a digital signature and listed in the Digital
Signature Certificate;
(ze) “Secure system” means computer hardware,
software, and procedure that—
I. Are reasonably secure from unauthorized access
and misuse;
II. Provide a reasonable level of reliability and
correct operation;
III. Are reasonably suited to performing the intended
functions; and
IV. Adhere to generally accepted security procedures;
(zf) “Security procedure” means the security
procedure prescribed under section 16 by the Central
Government;
(zg) “Subscriber” means a person in whose name the
[Electronic Signature] Certificate is issued;
(zh) “Verify” in relation to a digital signature,
electronic record or public key, with its grammatical
variations and cognate expressions means to
determine whether—
 The initial electronic record was affixed with the
digital signature by the use of private key
corresponding to the public key of the sub-
scriber;
 The initial electronic record is retained intact or
has been altered since such electronic record was
so affixed with the digital signature.
(2) Any reference in this Act to any enactment or any
provision thereof shall, in relation to an area in which
such enactment or such provision is not in force, be
construed as a reference to the corresponding law or
the relevant provision of the corresponding law, if
any, in force in that area.

More Related Content

What's hot

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Competition act,2002-Business Law
Competition act,2002-Business LawCompetition act,2002-Business Law
Competition act,2002-Business Lawshrinivas kulkarni
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Competition act 2002
Competition act 2002Competition act 2002
Competition act 2002ramandeepjrf
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Role of Competition Commission of India in Governance of Combination
Role of Competition Commission of India in Governance of CombinationRole of Competition Commission of India in Governance of Combination
Role of Competition Commission of India in Governance of CombinationDr. Kalpeshkumar L Gupta
 
FEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management ActFEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management ActVignesh Sreenivasan
 
Competition Commission of India
Competition Commission of IndiaCompetition Commission of India
Competition Commission of Indiaharleenjabbal13
 

What's hot (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Competition act,2002-Business Law
Competition act,2002-Business LawCompetition act,2002-Business Law
Competition act,2002-Business Law
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Competition act 2002
Competition act 2002Competition act 2002
Competition act 2002
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Competition Commission of India
Competition Commission of IndiaCompetition Commission of India
Competition Commission of India
 
Nature of contract
Nature of contractNature of contract
Nature of contract
 
Role of Competition Commission of India in Governance of Combination
Role of Competition Commission of India in Governance of CombinationRole of Competition Commission of India in Governance of Combination
Role of Competition Commission of India in Governance of Combination
 
FEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management ActFEMA-Foreign Exchange Management Act
FEMA-Foreign Exchange Management Act
 
Competition Commission of India
Competition Commission of IndiaCompetition Commission of India
Competition Commission of India
 

Similar to Information & technology Act, 2000.

12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdfNavarajBaniya1
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdfDharmendraRai32
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 

Similar to Information & technology Act, 2000. (20)

12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Class it act
Class it actClass it act
Class it act
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdf
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from Vaishnavi Meghe

Ethics, norms, values and beliefs and kohlberg's theory of ethical judgment
Ethics, norms, values and beliefs and kohlberg's theory of ethical judgmentEthics, norms, values and beliefs and kohlberg's theory of ethical judgment
Ethics, norms, values and beliefs and kohlberg's theory of ethical judgmentVaishnavi Meghe
 
‘Exceptions for IPC section 499.’
‘Exceptions for IPC section 499.’‘Exceptions for IPC section 499.’
‘Exceptions for IPC section 499.’Vaishnavi Meghe
 
Red bull stratos campaign
Red bull stratos campaignRed bull stratos campaign
Red bull stratos campaignVaishnavi Meghe
 
STP of sunfeast biscuits
STP of sunfeast biscuitsSTP of sunfeast biscuits
STP of sunfeast biscuitsVaishnavi Meghe
 
Comparative study between Homer and Valmiki
Comparative study between Homer and ValmikiComparative study between Homer and Valmiki
Comparative study between Homer and ValmikiVaishnavi Meghe
 

More from Vaishnavi Meghe (8)

Ethics, norms, values and beliefs and kohlberg's theory of ethical judgment
Ethics, norms, values and beliefs and kohlberg's theory of ethical judgmentEthics, norms, values and beliefs and kohlberg's theory of ethical judgment
Ethics, norms, values and beliefs and kohlberg's theory of ethical judgment
 
‘Exceptions for IPC section 499.’
‘Exceptions for IPC section 499.’‘Exceptions for IPC section 499.’
‘Exceptions for IPC section 499.’
 
Mc donalds india
Mc donalds indiaMc donalds india
Mc donalds india
 
Case study on kuwait
Case study on kuwaitCase study on kuwait
Case study on kuwait
 
Red bull stratos campaign
Red bull stratos campaignRed bull stratos campaign
Red bull stratos campaign
 
STP of sunfeast biscuits
STP of sunfeast biscuitsSTP of sunfeast biscuits
STP of sunfeast biscuits
 
Comparative study between Homer and Valmiki
Comparative study between Homer and ValmikiComparative study between Homer and Valmiki
Comparative study between Homer and Valmiki
 
Evil of dowry
Evil of dowryEvil of dowry
Evil of dowry
 

Recently uploaded

如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxnibresliezel23
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 

Recently uploaded (20)

Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Information & technology Act, 2000.

  • 1. ASSIGNMENT # A 630 Course: 50421622 (Media Laws and Ethics) Topic: Detailed note on the definitions (Section 2) Of Information Technology Act, 2000. Roll No- 489
  • 2. Introduction Information Technology Act 200, is to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involves the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filings of documents with government agencies and further to amend The Indian Penal Code, The Indian Evidence Act,1872, The Banker’s Books Evidence Act,1891 and the Reserve Bank of India Act,1934 and for matters connected therewith or incidental thereto. Information Technology Act 2000 is based on UNCITRAL (United Nations Commission on International Trade Law) Model law. Information Technology Act 2000 has 13 chapters, 94 sections and 4 schedules. First 14 sections deals with some legal aspects concerning digital signatures. Further other sections deal with certifying authorities that are licensed to issue digital signature. Section 43 to 47 provide for penalties and compensation. Section 48 to 67 deals with Tribunals appeal to high court.
  • 3. Section 65 to 79 of the act deals with offences. Section 80 to 94 deals with miscellaneous of the Act. Objectives of The Information Technology Act 2000. I. This Act may be called the Information Technology Act, 2000. II. It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention there under committed outside India by any person. III. It shall come into force on such date1 as the Central Government may, by notification, appoint and different dates may be appointed for different provisions of this Act and any reference in any such provision to the commencement of this Act shall be construed as a reference to the commencement of that provision. IV. Nothing in this Act shall apply to:-  A negotiable instrument as defined in section 13 of the Negotiable Instrument Act, 1881;  A power of attorney as defined in section 1A of the Power-of-Attorney Act, 1882;
  • 4.  A trust as defined in section 3 of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called;  Any contract for the sale or conveyance of immovable property or any interest in such property;  Any such class of documents or transactions as may be notified by Central Government in the Official Gazette. The definitions (Section 2) of Information Technology Act, 2000. S.2. Definitions- (1) In this Act, unless the context otherwise requires, (a) “access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network; (b) “addressee” means a person who is intended by the originator to receive the electronic record but does not include any intermediary;
  • 5. (c) “adjudicating officer” means an adjudicating officer appointed under sub- section (1) of section 46; (d) “affixing [electronic signature]” with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of [electronic signature]; (e) “appropriate Government” means as respects any matter,—  enumerated in List II of the Seventh Schedule to the Constitution;  Relating to any State law enacted under List III of the Seventh Schedule to the Constitution, The State Government and in any other case, the Central Government; (f) “asymmetric crypto system” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature; (g) “Certifying Authority” means a person who has been granted a license to issue a 5[electronic signature] Certificate under section 24;
  • 6. (h) “Certification practice statement” means a statement issued by a Certifying Authority to specify the practices that the Certifying Authority employs in issuing 6[Electronic Signature] Certificates; (ha) “Communication device” means cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text, video, audio or image;] (i) “Computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer soft- ware, or communication facilities which are connected or related to the computer in a computer system or computer network; (j) “Computer network” means the inter-connection of one or more computers or computer systems or communication device through—  The use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and  Terminals or a complex consisting of two or more inter-connected computers or communication
  • 7. device whether or not the interconnection is continuously maintained;] (k) “Computer resource” means computer, computer system, computer net- work, data, computer data-base or software; (l)“computer system” means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programs, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions; (m) “Controller” means the Controller of Certifying Authorities appointed un- der sub-section (7) of section 17; (n) “Cyber Appellate Tribunal” means the Cyber Regulations Appellate Tribunal established under sub- section (1) of section 48; (na) “Cyber cafe” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public;
  • 8. (nb) “Cyber security” means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction;] (o) “data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts, magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer; (p) “Digital signature” means authentication of any electronic record by a sub- scriber by means of an electronic method or procedure in accordance with the provisions of section 3; (q) “Digital Signature Certificate” means a Digital Signature Certificate issued under sub-section (4) of section 35; (r) “Electronic form” with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory,
  • 9. microfilm, computer generated microfiche or similar device; (s) “Electronic Gazette” means the official gazette published in the electronic form; (t) “Electronic record” means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated microfiche; (ta) “Electronic signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the Second Schedule and includes digital signature; (ta) “Electronic Signature Certificate” means an Electronic Signature Certificate issued under Section 35 and includes Digital Signature Certificate;] (u) “Function”, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer; (ua) “Indian Computer Emergency Response Team” means an agency established under sub- section (1) of section 70B;]
  • 10. (v) “Information” includes 13[data, message, text,] images, sound, voice, codes, computer programs, software and data-bases or micro film or computer generated micro fiche; w) “Intermediary”, with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online- auction sites, online-market places and cyber cafes;] (x) “Key pair”, in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key; (y) “Law” includes any Act of Parliament or of a State Legislature, Ordinances promulgated by the President or a Governor, as the case may be, Regulations made by the President under article 240, Acts enacted as President’s Act under sub-clause (a) of clause (1) of article 357 of the Constitution and
  • 11. includes rules, regulations, bye-laws and orders issued or made thereunder; (z) “License” means a license granted to a Certifying Authority under section 24; (za) “Originator” means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary; (zb) “Prescribed” means prescribed by rules made under this Act; (zc) “Private key” means the key of a key pair used to create a digital signature; (zd) “Public key” means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate; (ze) “Secure system” means computer hardware, software, and procedure that— I. Are reasonably secure from unauthorized access and misuse; II. Provide a reasonable level of reliability and correct operation;
  • 12. III. Are reasonably suited to performing the intended functions; and IV. Adhere to generally accepted security procedures; (zf) “Security procedure” means the security procedure prescribed under section 16 by the Central Government; (zg) “Subscriber” means a person in whose name the [Electronic Signature] Certificate is issued; (zh) “Verify” in relation to a digital signature, electronic record or public key, with its grammatical variations and cognate expressions means to determine whether—  The initial electronic record was affixed with the digital signature by the use of private key corresponding to the public key of the sub- scriber;  The initial electronic record is retained intact or has been altered since such electronic record was so affixed with the digital signature. (2) Any reference in this Act to any enactment or any provision thereof shall, in relation to an area in which such enactment or such provision is not in force, be construed as a reference to the corresponding law or
  • 13. the relevant provision of the corresponding law, if any, in force in that area.