SlideShare a Scribd company logo
Information Technology Act 2000- An overview Date: 27 th  November 2008 Venue: National Institute of Financial Management  Faridabad Sector-48, Pali Road   Karnika Seth Partner and Cyber Lawyer   SETH ASSOCIATES  ADVOCATES AND CONSULTANTS All rights Reserved © Seth Associates 2008
IT Act, 2000 ,[object Object],[object Object]
Objectives of the IT Act ,[object Object],[object Object],[object Object],[object Object]
Extent of application ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Role of the Government
Section 3 Defines Digital Signatures ,[object Object],[object Object],[object Object]
Secure digital signature-S.15 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Certificate based Key Management ,[object Object],[object Object],[object Object],CA User A User B CA  A  B CA  A CA  B
Essential steps of the digital signature process   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essential steps of the digital signature process ,[object Object],[object Object],[object Object],[object Object]
Section 4- Legal recognition of Electronic Records ,[object Object]
Sections 5, 6 & 7 ,[object Object],[object Object],[object Object],[object Object],[object Object]
CCA has to regulate the    functioning of CAs in the country by- ,[object Object],[object Object],[object Object],[object Object]
The licensing process ,[object Object],[object Object],[object Object]
Audit Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditors Panel  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Size mandated by the CCA ,[object Object],[object Object],[object Object],[object Object]
Licensed Certifying Authorities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
Securing communications… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 15- Secure Digital Signatures ,[object Object],[object Object],[object Object]
Regulation of Certifying Authorities [Chapter IV]  ,[object Object],[object Object]
Digital Signature Certificate [Chapter VII] ,[object Object],[object Object]
IT Act –overview of other relevant provisions ,[object Object],[object Object],[object Object],[object Object]
Section 12- Acknowledgement of Receipt ,[object Object],[object Object],[object Object]
Section 13- Dispatch of Electronic record ,[object Object],[object Object],[object Object],[object Object]
Civil Wrongs under IT Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Civil Wrongs under IT Act (Contd.) © Seth Associates, 2008 All Rights Reserved
Data diddling:   changing data prior or during input into a computer   ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 46 IT Act ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 47, IT Act ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cybercrime provisions under IT Act,2000   Offences & Relevant   Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration  Sec.66 Publishing obscene information  Sec.67 Un-authorized access to protected system  Sec.70  Breach of Confidentiality and Privacy  Sec.72 Publishing false digital signature certificates  Sec.73 © Seth Associates, 2008 All Rights Reserved
TYPES OF CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved Crime against property Crime against Government Crime against persons
TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Cyber crimes Hacking Information  Theft E-mail bombing Salami  attacks Denial of  Service  attacks Trojan  attacks Web jacking
Frequency of reporting Cybercrime in India ,[object Object],© Seth Associates, 2008 All Rights Reserved
Section 65: Source Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss  or   damage to the public or any person – Destruction, deletion, alteration, diminishing   value or utility or injuriously affecting   information residing in a computer resource • Punishment – imprisonment up to three years, and / or   – fine up to Rs. 2 lakh • Cognizable, Non Bailable,   Section 66 covers data theft aswell as data alteration © Seth Associates, 2008 All Rights Reserved
Sec. 67. Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber Pornography Cases ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
State of  Tamil Nadu Vs Suhas Katti  Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting.  The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet.  The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
The verdict extract… “  The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
Sec 69: Decryption of information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Sec 70 Protected System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Sections 71 & 72 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sections 73 & 74 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber crimes punishable under various Indian laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
Some more offences dealt with under IPC… ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],Cognizability and Bailability   ,[object Object],- Rely on Part II of Schedule I of CrPC © Seth Associates, 2008 All Rights Reserved
Power of Police to Investigate ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Power of Police to investigate (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Email spoofing:   ,[object Object],© Seth Associates, 2008 All Rights Reserved
Legal provisions to counter identity theft ,[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Forgery ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber stalking ,[object Object],© Seth Associates, 2008 All Rights Reserved
Cyber defamation ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Online gambling: virtual casinos, Cases of money laundering ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case Study- BPO Data Theft ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
BPO data theft -Case Study (contd.) ,[object Object],[object Object],© Seth Associates, 2007 All Rights Reserved
BPO data theft -Case Study  (contd.) ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case Study- Case of Extortion of Money Through Internet ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Case of Extortion of Money Through Internet -Case Study (contd.) ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
FIR NO 76/02 PS PARLIAMENT STREET   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Other important provisions of the  IT Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amendments- Indian Evidence Act 1872 ,[object Object]
Presumptions in law ,[object Object]
Presumptions in law ,[object Object]
Societe Des products Nestle SA case  2006 (33 ) PTC 469 &  State v Mohd Afzal, 2003 (7) AD (Delhi)1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important issues to ponder..IT Act is incomplete?? ,[object Object],[object Object],[object Object],[object Object]
Is IT Act incomplete? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Report of the Expert Committee Proposed Amendments to  Information Technology Act 2000   SUMMARY  -August  2005  ,[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
Suggestions from Report of the Expert Committee (contd..) ,[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
POSITIVE INITIATIVES & RECOMMENDATIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],© Seth Associates, 2008 All Rights Reserved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],POSITIVE INITIATIVES & RECOMMENDATIONS (Contd.) © Seth Associates, 2008 All Rights Reserved

More Related Content

What's hot

E contract
E  contractE  contract
E contract
Benita Ezeigbo
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
Panjab University
 
It act 2000
It act 2000It act 2000
It act 2000
Vidhu Arora
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
Kamal Thakur
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
Vijay Dalmia
 
Dishonour of cheque
Dishonour of chequeDishonour of cheque
Dishonour of chequeDivya Kalra
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
Dhurba Mainali
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
Ankita Sharma
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
Mohit Goswami
 
Negotiation and effects of endorsement
Negotiation and effects of endorsementNegotiation and effects of endorsement
Negotiation and effects of endorsement
Sweetp999
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 

What's hot (20)

E contract
E  contractE  contract
E contract
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Dishonour of cheque
Dishonour of chequeDishonour of cheque
Dishonour of cheque
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
E contracts
E contractsE contracts
E contracts
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
it act 2000
it act 2000it act 2000
it act 2000
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Negotiation and effects of endorsement
Negotiation and effects of endorsementNegotiation and effects of endorsement
Negotiation and effects of endorsement
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Case of baazee
Case of baazeeCase of baazee
Case of baazee
 

Viewers also liked

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Network Intelligence India
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
Amlin David
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber law
Cyber lawCyber law
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
Prateek Sinha
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
n|u - The Open Security Community
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
pattok
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 

Viewers also liked (20)

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 

Similar to Information technology-act 2000

Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
shahulgk
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
SuvabrataSamanta
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
akshitarathi77
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
2coolshivani
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
Dr. Prashant Vats
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
Shrey Patel
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
Vaishnavi Meghe
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
Rohit6699
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
Vikas Saw
 
Act2000n
Act2000nAct2000n
Act2000n
Partha Mehrotra
 

Similar to Information technology-act 2000 (20)

Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Class it act
Class it actClass it act
Class it act
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
It act
It actIt act
It act
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
It act 2000
It act 2000It act 2000
It act 2000
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Act2000n
Act2000nAct2000n
Act2000n
 

More from Onkar Sule

Understanding e commerce
Understanding e commerceUnderstanding e commerce
Understanding e commerceOnkar Sule
 
Nordin malaysia
Nordin malaysiaNordin malaysia
Nordin malaysiaOnkar Sule
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Introduction to ecommerce
Introduction to ecommerceIntroduction to ecommerce
Introduction to ecommerceOnkar Sule
 
E commerce052503
E commerce052503E commerce052503
E commerce052503Onkar Sule
 
Ecommerce overview
Ecommerce overviewEcommerce overview
Ecommerce overviewOnkar Sule
 
E commerce (1)
E commerce (1)E commerce (1)
E commerce (1)Onkar Sule
 

More from Onkar Sule (20)

Understanding e commerce
Understanding e commerceUnderstanding e commerce
Understanding e commerce
 
Tisc99keynote
Tisc99keynoteTisc99keynote
Tisc99keynote
 
Part i
Part iPart i
Part i
 
Overview
OverviewOverview
Overview
 
Nordin malaysia
Nordin malaysiaNordin malaysia
Nordin malaysia
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
I walden
I waldenI walden
I walden
 
I walden
I waldenI walden
I walden
 
Introduction to ecommerce
Introduction to ecommerceIntroduction to ecommerce
Introduction to ecommerce
 
Hengesbaugh
HengesbaughHengesbaugh
Hengesbaugh
 
E commerce052503
E commerce052503E commerce052503
E commerce052503
 
Ecommerce2
Ecommerce2Ecommerce2
Ecommerce2
 
E commerce
E commerceE commerce
E commerce
 
Ecommerce overview
Ecommerce overviewEcommerce overview
Ecommerce overview
 
Ecommerce (2)
Ecommerce (2)Ecommerce (2)
Ecommerce (2)
 
E commerce (1)
E commerce (1)E commerce (1)
E commerce (1)
 
Ecommerce (1)
Ecommerce (1)Ecommerce (1)
Ecommerce (1)
 
Ec elim purch
Ec elim purchEc elim purch
Ec elim purch
 
Conklin
ConklinConklin
Conklin
 
Conklin
ConklinConklin
Conklin
 

Recently uploaded

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 

Recently uploaded (20)

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 

Information technology-act 2000

  • 1. Information Technology Act 2000- An overview Date: 27 th November 2008 Venue: National Institute of Financial Management Faridabad Sector-48, Pali Road Karnika Seth Partner and Cyber Lawyer SETH ASSOCIATES ADVOCATES AND CONSULTANTS All rights Reserved © Seth Associates 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Cybercrime provisions under IT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73 © Seth Associates, 2008 All Rights Reserved
  • 44.
  • 45. TYPES OF CYBER CRIMES © Seth Associates, 2008 All Rights Reserved Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking
  • 46.
  • 47.
  • 48. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration © Seth Associates, 2008 All Rights Reserved
  • 49.
  • 50.
  • 51. State of Tamil Nadu Vs Suhas Katti Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
  • 52. The verdict extract… “ The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India. © Seth Associates, 2008 All Rights Reserved
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.