SlideShare a Scribd company logo
1 of 22
Cyber Crimes and Information
Technology Act 2000- An overview
Santosh Kumar Pathak
PGT(CS)
KV No. 1, Arakkonam
TYPES OF CYBER CRIMES
 Cyber terrorism
 Cyber Extortion
 Cyber Warfare
 Cyber pornography
 Defamation
 Cyber stalking (section 509 IPC)
 Sale of illegal articles-narcotics, weapons,
wildlife
 Online gambling
 Intellectual Property crimes(Plagiarism)
 Email spoofing
 Forgery
 Phishing
 Hacking / Cracking
 Salami Attacks
 Denial of Service / Email Bombing
 Spam (not a crime as per IT ACT)
 Data Diddling
 Steganography
Crime against property
Crime against Government
Crime against persons
IT Act, 2000
 Enacted on 17th
May
2000- India is 12th
nation in the world to
adopt cyber laws
 IT Act is based on
Model law on e-
commerce adopted
by UNCITRAL
Objectives of the IT Act
To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as "electronic commerce“
 To facilitate electronic filing of documents with
Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act
1891,Reserve Bank of India Act ,1934
Extent of application
 Extends to whole of India and also applies to any offence
or contravention there under committed outside India by
any person {section 1 (2)} read with Section 75- Act
applies to offence or contravention committed outside
India by any person irrespective of his nationality, if such
act involves a computer, computer system or network
located in India
 Section 2 (1) (a) –”Access” means gaining entry into
,instructing or communicating with the logical, arithmetic
or memory function resources of a computer, computer
resource or network
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Secti
on
Offence Description Penalty
65
Tampering with
computer
source documents
If a person knowingly or
intentionally conceals,
destroys or alters or
intentionally or knowingly
causes another to conceal,
destroy or alter any
computer source code used
for a computer, computer
programme, computer
system or computer
network, when the
computer source code is
required to be kept or
maintained by law for the
time being in force.
Imprisonment up
to three years,
or/and with fine up
to ₹200,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Secti
on
Offence Description Penalty
66
Hacking with computer 
system
If a person with the intent 
to cause or knowing that 
he is likely to cause 
wrongful loss or damage to 
the public or any person 
destroys or deletes or 
alters any information 
residing in a computer 
resource or diminishes its 
value or utility or affects it 
injuriously by any means, 
commits hack.
Imprisonment up 
to three years, 
or/and with fine up 
to ₹500,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
66A
Publishing offensive, 
false or threatening 
information
Any person who sends by 
any means of a computer 
resource any information 
that is grossly offensive or 
has a menacing character; 
or any information which 
he knows to be false, but 
for the purpose of causing 
annoyance, 
inconvenience, danger, 
obstruction, insult shall be 
punishable with 
imprisonment for a term 
which may extend to three 
years and with fine.
Imprisonment up 
to three years, 
with fine.
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
66B
Receiving stolen 
computer or 
communication device
A person receives or 
retains a computer 
resource or communication 
device which is known to 
be stolen or the person 
has reason to believe is 
stolen.
Imprisonment up 
to three years, 
or/and with fine up 
to ₹100,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
66C Using password of another person
A person fradulently uses 
the password, digital 
signature or other unique 
identification of another 
person.
Imprisonment up 
to three years, 
or/and with fine up 
to ₹100,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
66D Cheating using computer resource
If a person cheats 
someone using a computer 
resource or 
communication.
Imprisonment up 
to three years, 
or/and with fine up 
to ₹100,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
66E
Publishing 
private images of others
If a person captures, 
transmits or publishes 
images of a person's 
private parts without 
his/her consent or 
knowledge.
Imprisonment up 
to three years, 
or/and with fine up 
to ₹200,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
66F Acts ofcyberterrorism
If a person denies access
to an authorised personnel
to a computer resource,
accesses a protected
system or introduces
contaminant into a system,
with the intention of
threatening the unity,
integrity, sovereignty or
security of India, then he
commits cyberterrorism.
Imprisonment up
to life.
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
67
Publishing information
which is obscene in
electronic form.
If a person publishes or
transmits or causes to be
published in the electronic
form, any material which is
lascivious or appeals to the
prurient interest or if its
effect is such as to tend to
deprave and corrupt
persons who are likely,
having regard to all
relevant circumstances, to
read, see or hear the
matter contained or
embodied in it.
Imprisonment up
to five years,
or/and with fine up
to ₹1,000,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
67A
Publishing images
containing sexual acts
If a person publishes or
transmits images
containing a sexual explicit
act or conduct.
Imprisonment up
to seven years,
or/and with fine up
to ₹1,000,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
67B
Publishing child porn or
predating children online
If a person captures,
publishes or transmits
images of a child in a
sexually explicit act or
conduct. If a person
induces a child into a
sexual act. A child is
defined as anyone under
18.
Imprisonment up
to five years,
or/and with fine up
to ₹1,000,000 on
first conviction.
Imprisonment up
to seven years,
or/and with fine up
to ₹1,000,000 on
second conviction.
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
67C
Failure to maintain
records
Persons deemed as
intermediatary (such as an
ISP) must maintain
required records for
stipulated time. Failure is
an offence.
Imprisonment up
to three years,
or/and with fine.
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
68
Failure/refusal to comply
with orders
The Controller may, by
order, direct a Certifying
Authority or any employee
of such Authority to take
such measures or cease
carrying on such activities
as specified in the order if
those are necessary to
ensure compliance with
the provisions of this Act,
rules or any regulations
made thereunder. Any
person who fails to comply
with any such order shall
be guilty of an offence.
Imprisonment up
to three years,
or/and with fine up
to ₹200,000
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
69
Failure/refusal todecrypt
data
The subscriber or any
person in charge of the
computer resource shall,
when called upon by any
agency which has been
directed, must extend all
facilities and technical
assistance to decrypt the
information. The
subscriber or any person
who fails to assist the
agency referred is deemed
to have committed a crime.
Imprisonment up
to seven years
and possible fine.
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
70
Securing access or
attempting to secure
access to a protected
system
The appropriate
Government may, by order
in writing, authorise the
persons who are
authorised to access
protected systems. If a
person who secures
access or attempts to
secure access to a
protected system, then he
is committing an offence.
Imprisonment up
to ten years,
or/and with fine.
Cybercrime provisions under ITCybercrime provisions under IT
Act,2000Act,2000
Offences & Relevant Sections under IT Act
Section Offence Description Penalty
71 Misrepresentation
If anyone makes any
misrepresentation to, or
suppresses any material
fact from, the Controller or
the Certifying Authority for
obtaining any license or
Digital Signature
Certificate.
Imprisonment up
to three years,
or/and with fine up
to ₹100,000
Thank You.

More Related Content

What's hot (20)

IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Cyber law
Cyber lawCyber law
Cyber law
 
E contract
E  contractE  contract
E contract
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
It act 2000
It act 2000It act 2000
It act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 

Viewers also liked

Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000n|u - The Open Security Community
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11TeamOneI1MBA11
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technologyDr. Trilok Kumar Jain
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 

Viewers also liked (20)

Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technology
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.
The Indian Penal Code.
 

Similar to Information Technology Act 2000 - Santosh K Pathak

Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaakashsaqi444
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdfnithyam40
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 

Similar to Information Technology Act 2000 - Santosh K Pathak (20)

Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
Information technology act
Information technology actInformation technology act
Information technology act
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 

More from Dipayan Sarkar

introduction to aep arc
introduction to aep arcintroduction to aep arc
introduction to aep arcDipayan Sarkar
 
why focus on adolescents unique needs
why focus on adolescents unique needswhy focus on adolescents unique needs
why focus on adolescents unique needsDipayan Sarkar
 
aep in india milestones, learning, way forward
aep in india milestones, learning, way forwardaep in india milestones, learning, way forward
aep in india milestones, learning, way forwardDipayan Sarkar
 
Softskills - S Fernandez
Softskills - S FernandezSoftskills - S Fernandez
Softskills - S FernandezDipayan Sarkar
 
Project Based Learning- Ashish K Chaurdia
Project Based Learning- Ashish K ChaurdiaProject Based Learning- Ashish K Chaurdia
Project Based Learning- Ashish K ChaurdiaDipayan Sarkar
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarDipayan Sarkar
 
File Handling - N K Upadhyay
File Handling - N K UpadhyayFile Handling - N K Upadhyay
File Handling - N K UpadhyayDipayan Sarkar
 
Sorting Techniques - Govardhan Satish
Sorting Techniques - Govardhan SatishSorting Techniques - Govardhan Satish
Sorting Techniques - Govardhan SatishDipayan Sarkar
 
Application of Stack - Yadraj Meena
Application of Stack - Yadraj MeenaApplication of Stack - Yadraj Meena
Application of Stack - Yadraj MeenaDipayan Sarkar
 
Universal Gates - Aneesa N Ali
Universal Gates - Aneesa N AliUniversal Gates - Aneesa N Ali
Universal Gates - Aneesa N AliDipayan Sarkar
 
Selection Sort - Vipin Ramola
Selection Sort - Vipin RamolaSelection Sort - Vipin Ramola
Selection Sort - Vipin RamolaDipayan Sarkar
 
Deletion of a Record from a File - K Karun
Deletion of a Record from a File - K KarunDeletion of a Record from a File - K Karun
Deletion of a Record from a File - K KarunDipayan Sarkar
 
Java Databse Connectvity- Alex Jose
Java Databse Connectvity- Alex JoseJava Databse Connectvity- Alex Jose
Java Databse Connectvity- Alex JoseDipayan Sarkar
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyDipayan Sarkar
 
Cloud Computing- Sreehari S
Cloud Computing- Sreehari SCloud Computing- Sreehari S
Cloud Computing- Sreehari SDipayan Sarkar
 

More from Dipayan Sarkar (18)

Relationships
RelationshipsRelationships
Relationships
 
ideal learning space
ideal learning spaceideal learning space
ideal learning space
 
introduction to aep arc
introduction to aep arcintroduction to aep arc
introduction to aep arc
 
why focus on adolescents unique needs
why focus on adolescents unique needswhy focus on adolescents unique needs
why focus on adolescents unique needs
 
aep in india milestones, learning, way forward
aep in india milestones, learning, way forwardaep in india milestones, learning, way forward
aep in india milestones, learning, way forward
 
Softskills - S Fernandez
Softskills - S FernandezSoftskills - S Fernandez
Softskills - S Fernandez
 
Project Based Learning- Ashish K Chaurdia
Project Based Learning- Ashish K ChaurdiaProject Based Learning- Ashish K Chaurdia
Project Based Learning- Ashish K Chaurdia
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D Sarkar
 
File Handling - N K Upadhyay
File Handling - N K UpadhyayFile Handling - N K Upadhyay
File Handling - N K Upadhyay
 
Sorting Techniques - Govardhan Satish
Sorting Techniques - Govardhan SatishSorting Techniques - Govardhan Satish
Sorting Techniques - Govardhan Satish
 
Application of Stack - Yadraj Meena
Application of Stack - Yadraj MeenaApplication of Stack - Yadraj Meena
Application of Stack - Yadraj Meena
 
Universal Gates - Aneesa N Ali
Universal Gates - Aneesa N AliUniversal Gates - Aneesa N Ali
Universal Gates - Aneesa N Ali
 
Selection Sort - Vipin Ramola
Selection Sort - Vipin RamolaSelection Sort - Vipin Ramola
Selection Sort - Vipin Ramola
 
Deletion of a Record from a File - K Karun
Deletion of a Record from a File - K KarunDeletion of a Record from a File - K Karun
Deletion of a Record from a File - K Karun
 
Java Databse Connectvity- Alex Jose
Java Databse Connectvity- Alex JoseJava Databse Connectvity- Alex Jose
Java Databse Connectvity- Alex Jose
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
 
Cloud Computing- Sreehari S
Cloud Computing- Sreehari SCloud Computing- Sreehari S
Cloud Computing- Sreehari S
 
SQL JOINS- Reena P V
SQL JOINS- Reena P VSQL JOINS- Reena P V
SQL JOINS- Reena P V
 

Recently uploaded

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Recently uploaded (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

Information Technology Act 2000 - Santosh K Pathak

  • 1. Cyber Crimes and Information Technology Act 2000- An overview Santosh Kumar Pathak PGT(CS) KV No. 1, Arakkonam
  • 2. TYPES OF CYBER CRIMES  Cyber terrorism  Cyber Extortion  Cyber Warfare  Cyber pornography  Defamation  Cyber stalking (section 509 IPC)  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes(Plagiarism)  Email spoofing  Forgery  Phishing  Hacking / Cracking  Salami Attacks  Denial of Service / Email Bombing  Spam (not a crime as per IT ACT)  Data Diddling  Steganography Crime against property Crime against Government Crime against persons
  • 3. IT Act, 2000  Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws  IT Act is based on Model law on e- commerce adopted by UNCITRAL
  • 4. Objectives of the IT Act To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 5. Extent of application  Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India  Section 2 (1) (a) –”Access” means gaining entry into ,instructing or communicating with the logical, arithmetic or memory function resources of a computer, computer resource or network
  • 6. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Secti on Offence Description Penalty 65 Tampering with computer source documents If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. Imprisonment up to three years, or/and with fine up to ₹200,000
  • 7. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Secti on Offence Description Penalty 66 Hacking with computer  system If a person with the intent  to cause or knowing that  he is likely to cause  wrongful loss or damage to  the public or any person  destroys or deletes or  alters any information  residing in a computer  resource or diminishes its  value or utility or affects it  injuriously by any means,  commits hack. Imprisonment up  to three years,  or/and with fine up  to ₹500,000
  • 8. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 66A Publishing offensive,  false or threatening  information Any person who sends by  any means of a computer  resource any information  that is grossly offensive or  has a menacing character;  or any information which  he knows to be false, but  for the purpose of causing  annoyance,  inconvenience, danger,  obstruction, insult shall be  punishable with  imprisonment for a term  which may extend to three  years and with fine. Imprisonment up  to three years,  with fine.
  • 9. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 66B Receiving stolen  computer or  communication device A person receives or  retains a computer  resource or communication  device which is known to  be stolen or the person  has reason to believe is  stolen. Imprisonment up  to three years,  or/and with fine up  to ₹100,000
  • 10. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 66C Using password of another person A person fradulently uses  the password, digital  signature or other unique  identification of another  person. Imprisonment up  to three years,  or/and with fine up  to ₹100,000
  • 11. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 66D Cheating using computer resource If a person cheats  someone using a computer  resource or  communication. Imprisonment up  to three years,  or/and with fine up  to ₹100,000
  • 12. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 66E Publishing  private images of others If a person captures,  transmits or publishes  images of a person's  private parts without  his/her consent or  knowledge. Imprisonment up  to three years,  or/and with fine up  to ₹200,000
  • 13. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 66F Acts ofcyberterrorism If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyberterrorism. Imprisonment up to life.
  • 14. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 67 Publishing information which is obscene in electronic form. If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it. Imprisonment up to five years, or/and with fine up to ₹1,000,000
  • 15. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 67A Publishing images containing sexual acts If a person publishes or transmits images containing a sexual explicit act or conduct. Imprisonment up to seven years, or/and with fine up to ₹1,000,000
  • 16. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 67B Publishing child porn or predating children online If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18. Imprisonment up to five years, or/and with fine up to ₹1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to ₹1,000,000 on second conviction.
  • 17. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 67C Failure to maintain records Persons deemed as intermediatary (such as an ISP) must maintain required records for stipulated time. Failure is an offence. Imprisonment up to three years, or/and with fine.
  • 18. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 68 Failure/refusal to comply with orders The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Any person who fails to comply with any such order shall be guilty of an offence. Imprisonment up to three years, or/and with fine up to ₹200,000
  • 19. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 69 Failure/refusal todecrypt data The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information. The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. Imprisonment up to seven years and possible fine.
  • 20. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 70 Securing access or attempting to secure access to a protected system The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. Imprisonment up to ten years, or/and with fine.
  • 21. Cybercrime provisions under ITCybercrime provisions under IT Act,2000Act,2000 Offences & Relevant Sections under IT Act Section Offence Description Penalty 71 Misrepresentation If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate. Imprisonment up to three years, or/and with fine up to ₹100,000