THE INFORMATION TECHNOLOGY ACT, 2000  Purpose of the Act To provide legal recognition for  transactions  by means of  electronic date interchange  electronic communication,  "electronic  commerce“
JURISDICTION [section 75] Applicable to whole of  India  to offences committed outside India
Important Definitions What is Data ? Representation of  Information Knowledge Facts concepts  instruction  which are being prepared / have been prepared  in a formalized manner,  is intended to be processed, is being processed or  has been processed  in  a computer system or computer network, and  may be in any form or stored internally in the memory of the computer  [Section 2(1)(o) ]
Digital Authentication Sec. 3  Sec. 14 and Sec. 15 Digital   Authentication of any electronic record by a    signature  subscriber
Legal Recognition and Acknowledgement  of Electronic Record Electronic Records Recognized  [section 4 ] Any Record  Which is REQUIRED To be in writing Or typewritten Printed Has been  Rendered Or Made Available in Electronic Form  AND Is accessible and usable for subsequent references
Acknowledgement  of Receipt  [ section 12 ]   When There is no Specific Provision Or mode prescribed Acknowledgement can be GIVEN By Any Communication Automated Or Otherwise Or Conduct  Of the addressee
Establishments & Authorities  Certifying Authority  – A person who has been granted licence to issue a Digital Signature Certificate Deputy Controller & Assistant Controller Controller - Controller of Certifying Authorities appointed under Section 17 (1) Cyber Regulations Appellate Tribunal-  Tribunal established under Section 48 (1)
Digital Signature Certificates  Sec. 35 to 39 Certifying Authority issues the Digital Signature Certificate Representations upon issuance of the Digital Certificate Public Key Private Key PAIRING Suspension  &  Revocation
Offences under the Act Tampering [section 65]  Hacking [ section 66] Publishing obscene information [section 67]  Misrepresentation [section 71] Breach of confidentiality and privacy [section 72]  Publication for fraudulent purpose [section 74]
Tampering  [section 65] Knowingly or intentionally Himself or through another  Conceals  Destroys  Alter Any computer source code Used for computer  Computer programme Computer system Computer network Where such source code is required to be kept or maintained Punishment :  3 Years or Fine 2 Lakh INR or Both
Hacking  [ section 66] Hacking is a Crime Done with the intention to  Cause Wrongful Loss Or Damage  To Public Or any person Destroys  Or Delete Or Alter Any Information in computer resource  Or Diminish  its Value  or Utility  or affects injuriously  Punishment :  3 Years or Fine 2 Lakh INR or Both
Publishing obscene information  [section 67] Publication Transmission Or getting it published In Electronic Form Any Material  Lascivious Appeal to Prurient interest or Tend to DEPRAVE Or Corrupt  Persons likely to read – see – hear First Offence 5 Years + Fine Upto 1 Lakh INR Second and Subsequent Offence 10 Years + Fine    Up to 2 Lakh INR Don’t Forget Sec. 292, 293 and 294 of the IPC
Other Offences  Misrepresentation [section 71] 2 Years or Fine or Both  Breach of confidentiality and privacy [section 72]  2 Years or Fine or Both Publication for fraudulent purpose [section 74]  2 Years or Fine or Both
Penalties   Penalty for damage to computer system- damages by way of compensation upto  one crore   [ ‘damage’ means to destroy, alter, delete , add, modify or rearrange any computer resource by any means] Penalty for failure to furnish any information, return or report Residuary Penalty upto Rupees 25,000/- Confiscation of any computer/ system//floppies/disks/drives  in contravention of the Act
Investigation of Offences & Access to computers Power to investigate contraventions   [section 28 & section29]   lies with the Controller/any officer authorised by him in this behalf who shall exercise the like powers which are conferred on Income-tax authorities under Chapter XIII of the Income-tax Act, 1961 subject to such limitations laid down under that Act have access to any computer system, any apparatus, data or any other material connected with such system, for the purpose of searching or causing a search to be made
Power of the Controller to give directions  to a subscriber to extend facilities to decrypt information  [section 69] If the Controller is satisfied that it is necessary or expedient in the interest of the sovereignty or integrity of India,  the security of the State,  friendly relations with foreign Stales or  public order or  for preventing incitement to the commission of  any cognizable offence,  he may, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. However, he must record reasons in writing for the same
Power of police officer and other officers in respect of search, etc [Section 80] Any police officer[ not below the rank of a Deputy Superintendent of Police or any other officer of the Central Government / State Government authorised by the Central Government in this behalf  may enter any public place and search and arrest without warrant any person  found therein who is reasonably suspected or having committed or of committing or of being about to commit any offence under this Act
Appeal  to Cyber Appellate Tribunal [Section 57] An appeal from an order made by Controller or an adjudicating officer under this Act lies to Cyber Appellate Tribunal having jurisdiction in the matter. However, no appeal shall lie to the Cyber Appellate Tribunal from an order made by an adjudicating officer with the consent of the parties. Every appeal shall be filed within a period of forty-five days from the date on which a copy of the order made by the Controller or the adjudicating officer is receive Endeavour shall be made to dispose off the appeal finally within six months from the date of receipt of the appeal.
Various forms of cyber crime Cyber stalking -  Following and pursuing a person    online   Spam - Unsolicited sending of bulk email  for commercial purposes  Fraud &  -  Dishonest misrepresentation of fact identity theft intended to induce another to do or  refrain from doing something which  causes loss   Obscene or  offensive content
Cyber Crimes Phishing Scams- Fraudulent process of attempting to  acquire sensitive information such as  usernames, passwords and credit card  details by masquerading as a  trustworthy entity in an electronic  communication.  Cyber terrorism  An act of terrorism committed through  the use of cyberspace or computer  resources
Personal Data Protection It is pertinent to note that “personal data has not been defined in the IT Act. However, “Personal Data Protection Bill, 2006” aimed at protecting personal data and information of an individual collected for a particular purpose by one organization is under consideration by the  Indian Parliament. The said bill has already been introduced in the Upper House (Rajya Sabha).
Contact Us India Head Office   Flat No. 5, 2 nd  Floor, 10, Hailey Road, New Delhi-110001, India email:  [email_address] Phone:- +91-11-42492525 Fax :- +91-11-23320484 Branch Offices at Mumbai 106, Peninsula Center, (Behind Piramal Chambers-Income-tax Office) Dr. S.S. Rao Road, Parel, Mumbai 400 012 (India), Phone: +91-22-42134101 Fax : +91-22-42134102 [email_address] Gurgaon, Haryana 803, Tower A, Signature Towers, South City-1, NH-8,Gurgaon-122001, Haryana, India [email_address]   Phone- +91-124-4541000  Fax:: +91-124-4541010 IP & IT Laws Division Vaish Associates Advocates Flat No. 903, Indra Prakash, 21, Barakhamba Road, New Delhi-110001, India  email:  [email_address] Phone:- +91-11-42492532 (Direct) Mobile: +91-9810081079 Fax :- +91-11-23320484
Flat No 903, Indra Prakash, 21, Barakhamba  Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext 532 Mobile :- 9810081079 Fax: +91 11 23320484 email:-  [email_address]   Intellectual Property & Information Technology Laws Division

Information Technology Act 2000

  • 1.
    THE INFORMATION TECHNOLOGYACT, 2000 Purpose of the Act To provide legal recognition for transactions by means of electronic date interchange electronic communication, "electronic commerce“
  • 2.
    JURISDICTION [section 75]Applicable to whole of India to offences committed outside India
  • 3.
    Important Definitions Whatis Data ? Representation of Information Knowledge Facts concepts instruction which are being prepared / have been prepared in a formalized manner, is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form or stored internally in the memory of the computer [Section 2(1)(o) ]
  • 4.
    Digital Authentication Sec.3 Sec. 14 and Sec. 15 Digital Authentication of any electronic record by a signature subscriber
  • 5.
    Legal Recognition andAcknowledgement of Electronic Record Electronic Records Recognized [section 4 ] Any Record Which is REQUIRED To be in writing Or typewritten Printed Has been Rendered Or Made Available in Electronic Form AND Is accessible and usable for subsequent references
  • 6.
    Acknowledgement ofReceipt [ section 12 ] When There is no Specific Provision Or mode prescribed Acknowledgement can be GIVEN By Any Communication Automated Or Otherwise Or Conduct Of the addressee
  • 7.
    Establishments & Authorities Certifying Authority – A person who has been granted licence to issue a Digital Signature Certificate Deputy Controller & Assistant Controller Controller - Controller of Certifying Authorities appointed under Section 17 (1) Cyber Regulations Appellate Tribunal- Tribunal established under Section 48 (1)
  • 8.
    Digital Signature Certificates Sec. 35 to 39 Certifying Authority issues the Digital Signature Certificate Representations upon issuance of the Digital Certificate Public Key Private Key PAIRING Suspension & Revocation
  • 9.
    Offences under theAct Tampering [section 65] Hacking [ section 66] Publishing obscene information [section 67] Misrepresentation [section 71] Breach of confidentiality and privacy [section 72] Publication for fraudulent purpose [section 74]
  • 10.
    Tampering [section65] Knowingly or intentionally Himself or through another Conceals Destroys Alter Any computer source code Used for computer Computer programme Computer system Computer network Where such source code is required to be kept or maintained Punishment : 3 Years or Fine 2 Lakh INR or Both
  • 11.
    Hacking [section 66] Hacking is a Crime Done with the intention to Cause Wrongful Loss Or Damage To Public Or any person Destroys Or Delete Or Alter Any Information in computer resource Or Diminish its Value or Utility or affects injuriously Punishment : 3 Years or Fine 2 Lakh INR or Both
  • 12.
    Publishing obscene information [section 67] Publication Transmission Or getting it published In Electronic Form Any Material Lascivious Appeal to Prurient interest or Tend to DEPRAVE Or Corrupt Persons likely to read – see – hear First Offence 5 Years + Fine Upto 1 Lakh INR Second and Subsequent Offence 10 Years + Fine Up to 2 Lakh INR Don’t Forget Sec. 292, 293 and 294 of the IPC
  • 13.
    Other Offences Misrepresentation [section 71] 2 Years or Fine or Both Breach of confidentiality and privacy [section 72] 2 Years or Fine or Both Publication for fraudulent purpose [section 74] 2 Years or Fine or Both
  • 14.
    Penalties Penalty for damage to computer system- damages by way of compensation upto one crore [ ‘damage’ means to destroy, alter, delete , add, modify or rearrange any computer resource by any means] Penalty for failure to furnish any information, return or report Residuary Penalty upto Rupees 25,000/- Confiscation of any computer/ system//floppies/disks/drives in contravention of the Act
  • 15.
    Investigation of Offences& Access to computers Power to investigate contraventions [section 28 & section29] lies with the Controller/any officer authorised by him in this behalf who shall exercise the like powers which are conferred on Income-tax authorities under Chapter XIII of the Income-tax Act, 1961 subject to such limitations laid down under that Act have access to any computer system, any apparatus, data or any other material connected with such system, for the purpose of searching or causing a search to be made
  • 16.
    Power of theController to give directions to a subscriber to extend facilities to decrypt information [section 69] If the Controller is satisfied that it is necessary or expedient in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign Stales or public order or for preventing incitement to the commission of any cognizable offence, he may, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. However, he must record reasons in writing for the same
  • 17.
    Power of policeofficer and other officers in respect of search, etc [Section 80] Any police officer[ not below the rank of a Deputy Superintendent of Police or any other officer of the Central Government / State Government authorised by the Central Government in this behalf may enter any public place and search and arrest without warrant any person found therein who is reasonably suspected or having committed or of committing or of being about to commit any offence under this Act
  • 18.
    Appeal toCyber Appellate Tribunal [Section 57] An appeal from an order made by Controller or an adjudicating officer under this Act lies to Cyber Appellate Tribunal having jurisdiction in the matter. However, no appeal shall lie to the Cyber Appellate Tribunal from an order made by an adjudicating officer with the consent of the parties. Every appeal shall be filed within a period of forty-five days from the date on which a copy of the order made by the Controller or the adjudicating officer is receive Endeavour shall be made to dispose off the appeal finally within six months from the date of receipt of the appeal.
  • 19.
    Various forms ofcyber crime Cyber stalking - Following and pursuing a person online Spam - Unsolicited sending of bulk email for commercial purposes Fraud & - Dishonest misrepresentation of fact identity theft intended to induce another to do or refrain from doing something which causes loss Obscene or offensive content
  • 20.
    Cyber Crimes PhishingScams- Fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Cyber terrorism An act of terrorism committed through the use of cyberspace or computer resources
  • 21.
    Personal Data ProtectionIt is pertinent to note that “personal data has not been defined in the IT Act. However, “Personal Data Protection Bill, 2006” aimed at protecting personal data and information of an individual collected for a particular purpose by one organization is under consideration by the  Indian Parliament. The said bill has already been introduced in the Upper House (Rajya Sabha).
  • 22.
    Contact Us IndiaHead Office Flat No. 5, 2 nd Floor, 10, Hailey Road, New Delhi-110001, India email: [email_address] Phone:- +91-11-42492525 Fax :- +91-11-23320484 Branch Offices at Mumbai 106, Peninsula Center, (Behind Piramal Chambers-Income-tax Office) Dr. S.S. Rao Road, Parel, Mumbai 400 012 (India), Phone: +91-22-42134101 Fax : +91-22-42134102 [email_address] Gurgaon, Haryana 803, Tower A, Signature Towers, South City-1, NH-8,Gurgaon-122001, Haryana, India [email_address] Phone- +91-124-4541000 Fax:: +91-124-4541010 IP & IT Laws Division Vaish Associates Advocates Flat No. 903, Indra Prakash, 21, Barakhamba Road, New Delhi-110001, India email: [email_address] Phone:- +91-11-42492532 (Direct) Mobile: +91-9810081079 Fax :- +91-11-23320484
  • 23.
    Flat No 903,Indra Prakash, 21, Barakhamba  Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext 532 Mobile :- 9810081079 Fax: +91 11 23320484 email:- [email_address] Intellectual Property & Information Technology Laws Division