• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
Ashoka University to improve governance in the state and driving a mass impact on ground. Running since 2016, the programme provides a platform to 25 young individuals each year, to work closely with the Chief Minister's Office for bringing transparency, accountability and efficiency in public service delivery in the state. The CMGGAs are recruited through a competitive process with the selection ratio of -1:100. The associates are trained and oriented about government functioning and structure through a 15 day boot camp at Ashoka University and are then posted across 22 districts to work in tandem with the district administration for a period of one year.
The World Health Organization (WHO) states that cycling can reduce the risk of cancers, heart disease, and diabetes that are prevalent in sedentary lifestyles
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
Many ways to support street children.pptxSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
2. Essentials of IT law
• E- commerce requires identifying originator and
recipient of communication, authenticating the document
and time and place of communication.
• E-governance facilitates exchange of information in
electronic form between government departments inter se
including citizens.
• Protection of IPR in the digital medium such as data
bases, websites and protection against unauthorized
copying and downloading.
• Cyber crimes committed with the use of computers.
3. Information Technology Act,2000
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
4. Objectives of the IT Act
To provide legal recognition for transactions:-
Carried out by means of electronic data interc
hange, and other means of electronic c
ommunication, commonly referred to as "
electronic commerce“
To facilitate electronic filing of documents w
ith Government agencies and E-Payments
To amend the Indian Penal Code, Indian E
vidence Act,1872, the Banker’s Books Evidence A
ct 1891,Reserve Bank of India Act ,1934
5. OFFICE MEMORANDUM
22 August, 2016.
Subject: Children Education Allowance (CEA) -Clarification
The undersigned is directed to refer to Department of
Personnel & Training's O.M. No.12011/ 03/ 2008- Estt.
(Allowance) dated 21 September, 2008 and subsequent
clarifications issued from time to time on the subject
mentioned above and to say that E-Receipts produced by
Central Govt. employees as a proof of payment of fee, etc
., may be treated as original and hence may be allowed
for claiming reimbursement of CEA.
6. Issues covered
Secure e-transactions to enable parties to enter
into e-contracts.
Legal status to e-record and e-signature.
Contraventions such as hacking and spreading of
viruses.
Offences such as tampering with source code
and cyber pornography.
Right of Govt. to decrypt information
Privacy and confidentiality of information
submitted to statuary authorities.
7. Not applicable to S. 1(4) – First Schedule
- a negotiable instrument as defined in section 13 of the
Negotiable Instruments Act, 1881;
– a power-of-attorney as defined in section 1A of the
Powers-of-Attorney Act, 1882;
– a trust as defined in section 3 of the Indian Trusts Act,
1882;
– a will as defined in clause (h) of section 2 of the Indian
Succession Act, 1925 including any other testamentary
disposition by whatever name called;
https://sbicaptrustee.in
– any contract for the sale or conveyance of immovable
property or any interest in such property;
8. Amendments- Indian Evidence Act 1872
Section 3 of the Evidence
Act amended to take
care of admissibility of ER
as evidence along with
the paper based records
as part of the documents
which can be produced
before the court for
inspection.
13. Penalty and compensation for damage to
computer, computer system - Section 43
without permission of the owner or any other person who is in charge ----
– accesses
– downloads
– introduces virus
– damages
– denial of access
– provides any assistance
3 years or 5 lakh or both - Section 66
14. Compensation for failure to protect
data - Section 43A
possessing, dealing or handling any sensitive
personal data or information, and is
negligent in implementing and maintaining
reasonable security practices resulting in
wrongful loss or wrongful gain to any
person, then such body corporate may be
held liable to pay damages to the person
so affected.
15. Tampering with Computer Source
Documents - Section 65
whoever knowingly or intentionally
conceals, destroys, or alters any
computer source code used for a
computer, computer programme,
computer system or computer network
3 years or fine (200,000 ) or both
Illustration 1 and 2
16. Illustration 1
Mr. X maintain the Software System supplied
by them to the bank. He was also looking
Software System of certain other banks. In
connection with rendering such services, the
petitioner was having access to their
accounting system.
Mr. X has manipulated the computerized
Bank account i.e. the interest entries and
thereby cheated the complainant bank by
forging electronic record in order to cause
wrongful loss to the bank and wrongful gain
to himself.
17. Syed Asifuddin and Ors. v. The State of Andhra Pradesh
and Anr., 2005 CriLJ 4314 AP
Reliance Infocomm - digital handset worth Rs.
10,500/- as well as service bundle for 3 years
with an initial payment of Rs. 3350/-
Tata Indicom employees were arrested for
manipulation of the electronic 32-bit number
(ESN) programmed into cell phones that were
exclusively franchised to Reliance Infocomm.
The court held that such manipulation
amounted to tampering with computer source
code as envisaged by section 65 of the
Information Technology Act, 2000.
18. Punishment for sending offensive
messages through communication
service, etc. - Section 66A
causing annoyance, inconvenience,
danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred or
ill will
3 years + fine
22. Identity theft – Section 66C
make use of the electronic
signature, password or any other
unique identification feature
3 years + 1 lakh
Illustration 3
23. Identity Theft
Kareena Kapoor has approached the police
alleging that someone has filed the income tax
return for the financial year 2015-16 in her
name online without her knowledge. Police have
registered a case of 'identity theft' under the
Information Technology Act and are probing
further. As per the complaint, unidentified
person(s) seemed to have got her PAN and her
password for filing the return online on the IT
website. Police have registered a case under sec.
419 of IPC (cheating) and section 66-C (identity
theft) of the IT Act. (NDTV)
24. Cheating by personation by
using communication device or
computer resource –
Section 66D
3 years + 1 lakh
25. Violation for privacy - Section 66E
captures, publishes or transmits the
image of a private area of any
person
3 years or 2 lakh or both
MMS Scandal
26. Cyber Terrorism s. 66F
intent to threaten the unity, integrity,
security or sovereignty of India or to
strike terror in the people
imprisonment for life
Illustration 4
27. Illustration 4
A threat email was sent to the BSE and NSE
challenging the security agencies to prevent a
terror attack by one Shahab Md with an ID
sh.itaiyeb125@yahoo.in to BSE’s administrative
email ID corp.relations@bseindia.com at around
10.44 am. The IP address of the sender has been
traced to Patna in Bihar. The ISP is Sify. The email
ID was created just four minutes before the email
was sent. “The sender had, while creating the new
ID, given two mobile numbers in the personal
details column. Both the numbers belong to a
photo frame-maker in Patna,’’
28. S. 67 – Publishing or transmitting
obscene material in electronic
form
3 years + 5 lakh
Second or subsequent conviction -
5 years + 10 lakh
Illustration 5
29. State of Tamil Nadu v. Suhas Katti
The case related to posting of obscene, defamatory and
annoying message about a divorcee woman in the yahoo
message group. E-Mails were also forwarded to the victim
for information by the accused through a false e-mail account
opened by him in the name of the victim. The posting of the
message resulted in annoying phone calls to the lady in the
belief that she was soliciting.
The accused was a known family friend of the victim and was
reportedly interested in marrying her. She however married
another person. This marriage later ended in divorce and the
accused started contacting her once again. On her reluctance
to marry him, the accused took up the harassment through
the Internet.
The accused is found guilty and convicted for offences under
section 469, 509 IPC and 67 of IT Act 2000 .
30. Publishing or transmitting of
material containing sexually
explicit act, etc. in electronic form
- Section 67A
5 years + 10 lakh
Second or subsequent conviction –
7 years + 10 lakh
31. Publishing or transmitting of
material depicting children in
sexually explicit act, etc. in
electronic form - Section 67B
5 years + 10 lakh
Second or subsequent conviction –
7 years + 10 lakh
32. Powers to issue directions for
interception or monitoring or
decryption of any information through
any computer resource - Section 69
Central Government or a State Government:-
– interest of the sovereignty or integrity of India,
– defence of India,
– security of the State,
– friendly relations with foreign States or
– public order or
– for preventing incitement to the commission of any cognizable
offence
direct any agency
fails to assist the agency – 7 years + fine
33. Power to issue directions for
blocking for public access of any
information through any computer
resource - Section 69A
Central Government :-
– interest of the sovereignty or integrity of India,
– defence of India,
– security of the State,
– friendly relations with foreign States or
– public order or
– for preventing incitement to the commission of any cognizable
offence
direct any agency
fails to assist the agency – 7 years + fine
34. S. 72A –Disclosure of information in
breach of lawful contract
any person
providing services
secured access to any material containing personal
information about another person
intent to cause or knowing
wrongful loss or wrongful gain
without the consent of the person
3 Years or 5 lakh or both
35. Exemption from liability of intermediary in
certain cases - S. 79
function of the intermediary is limited to providing access to a
communication system
the intermediary does not-
(i) initiate the transmission,
(ii) select the receiver of the transmission, and
(iii) select or modify the information contained in the
transmission;
OBSERVES DUE DILIGENCE
not apply if:-
– CONSPIRED OR ABETTED OR AIDED
– ACTUAL KNOWLEDGE
36. Cyber crimes punishable under
various Indian laws
Emails that are defamatory in nature are punishable under
Section 500 of the Indian Penal Code which recommends
an imprisonment of upto two years or a fine or both.
Threatening emails are punishable under the provisions of
the IPC pertaining to criminal intimidation, insult and
annoyance (Chapter XXII), extortion (Chapter XVII)
Email spoofing
Email spoofing is covered under provisions of the
IPC relating to fraud, cheating by personation (Chapter X
VII), forgery (Chapter XVIII)
37. Computer Related Crimes under
IPC and Special Laws
Sending threatening messages by email Sec 503 IPC
Sending defamatory messages by email Sec 499, 500 IPC
Forgery of electronic records Sec 463, 470, 471 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing Sec 416, 417, 463 IPC
Online sale of Drugs NDPS Act
Web - Jacking Sec. 383 IPC
Online sale of Arms Arms Act
38. Some more offences dealt with
under IPC…
Criminal breach of trust/Fraud- Sec. 405, 406,
408, 409 IPC
Destruction of electronic evidence - Sec. 204,
477 IPC
False electronic evidence-Sec.193 IPC
Offences by or against public servant-Sec.167,
172, 173, 175 IPC