SlideShare a Scribd company logo
* New communication systems and digital technology
 have made dramatic changes in way of transacting
 business. Use of computers to create, transmit and
 store information is increasing. Computer has many
 advantages in e-commerce. It is difficult to shift
 business from paper to electronic form due to two
 legal hurdles –
  (a) Requirements as to writing and
  (b) Signature for legal recognition.
Many legal provisions assume paper based records
 and documents and signature on paper.
* The General Assembly of the United Nations by
 resolution dated the 30th January, 1997 adopted the
 Model Law on Electronic Commerce and
 recommended  that all States should give favourable
 consideration to the Model Law when they enact or
 revise their laws.
* The Information Technology Act has been passed to
 give effect to the UN resolution and to promote
 efficient delivery of Government services by means of
 reliable electronic records.
THE INFORMATION TECHNOLOGY
          ACT, 2000
 An Act to provide legal recognition for transactions carried
                               .
out by means of electronic data interchange and other means
    of electronic communication, commonly referred to as
       "electronic commerce", which involve the use of
 alternatives to paper-based methods of communication and
    storage of information, to facilitate electronic filing of
  documents with the Government agencies and further to
   amend the Indian Penal Code, the Indian Evidence Act,
    1872, the Bankers' Books Evidence Act, 1891 and the
Reserve Bank of India Act, 1934 and for matters connected
                therewith or incidental thereto.
In this Act, unless the context otherwise requires
(c)"access" means gaining entry into, instructing or communicating
    with the logical, arithmetical, or memory function resources of a
    computer, computer system or computer network;

(b) "addressee" means a person who is intended by the originator to
    receive the electronic record but does not include any
    intermediary;

(c) "affixing digital signature“ means adoption of any methodology or
    procedure by a person for the purpose of authenticating an
    electronic record by means of digital signature

(d) “asymmetric crypto system" means a system of a secure key pair
    consisting of a
    private key for creating a digital signature and a public key to
    verify the digital signature
(b)“digital signature” means authentication of any electronic record by a
 subscriber by means of an electronic method in accordance with the
 provisions of section 3

(d)“Function“ in relation to a computer, includes logic, control arithmetical
 process, deletion, storage and retrieval and communication or
 telecommunication from or within a computer

(f)"intermediary" with respect to any particular electronic message means any
 person who on behalf of another person receives, stores or transmits that
 message or provides any service with respect to that message

(h) "key pair", in an asymmetric crypto system, means a private key and its
  mathematically related public key, which are so related that the public key
  can verify a digital signature created by the private key

(x)"private key" means the key of a key pair used to create a digital signature;
(j) "public key" means the key of a key pair used to verify a digital signature
     and listed in the Digital Signature Certificate
The Act provides for –
*Electronic contracts will be legally valid
*Legal recognition of digital signatures
*Digital signature to be effected by use of asymmetric crypto system and hash function
*Security procedure for electronic records and digital signature
*Appointment of Certifying Authorities and Controller of Certifying Authorities, including
recognition of foreign Certifying Authorities
*Controller to act as repository of all digital signature certificates
*Certifying authorities to get License to issue digital signature certificates
*Various types of computer crimes defined and stringent penalties provided under the Act
*Appointment of Adjudicating Officer for holding inquiries under the Act
*Establishment of Cyber Appellate Tribunal under the Act
*Appeal from order of Adjudicating Officer to Cyber Appellate Tribunal and not to any Civil
Court 
*Appeal from order of Cyber Appellate Tribunal to High Court
*Act to apply for offences or contraventions committed outside India
*Network service providers not to be liable in certain cases
*Power of police officers and other officers to enter into any public place and search and
arrest without warrant
*Constitution of Cyber Regulations Advisory Committee who will advice the Central
Government and Controller
* The Information Technology Act enables:
* Legal recognition to Electronic Transaction / Record
* Facilitate Electronic Communication by means of reliable electronic
  record
* Acceptance of contract expressed by electronic means
* Facilitate Electronic Commerce and Electronic Data interchange
* Electronic Governance
* Facilitate electronic filing of documents
* Retention of documents in electronic form
* Where the law requires the signature, digital signature satisfy the
  requirement
* Uniformity of rules, regulations and standards regarding the
  authentication and integrity of electronic records or documents
* Publication of official gazette in the electronic form
* Interception of any message transmitted in the electronic or encrypted
  form
* Prevent Computer Crime, forged electronic records, international
  alteration of electronic records fraud, forgery or falsification in
  Electronic Commerce and electronic transaction.
Chapter 1-DIGITAL SIGNATURE
 Authentication of electronic records

Chapter 2-ELECTRONIC GOVERNANCE
 Legal recognition of electronic records
 Legal recognition of digital signatures
 Use of electronic records and digital signatures in
  Government and its agencies
 Retention of electronic records
 Publication of rule, regulation, etc., in Electronic Gazette
*Attribution of electronic records
*Acknowledgment of receipt
*Time and place of despatch and receipt of
 electronic record
* Secure electronic record
* Secure digital signature
* Security procedure
*Appointment of Controller and other officers.
*Functions of Controller
*Recognition of foreign Certifying Authorities
*Licence to issue Digital Signature Certificates
*Application for licence
*Renewal of licence
*Procedure for grant or rejection of licence
*Suspension of licence
*Display of licence
*Surrender of licence
*   Generating key pair
*   Acceptance of Digital Signature
    Certificate
*   Control of private key
* Penalty for damage to computer, computer
 system
* Penalty for failure to furnish information
 return
* Residuary penalty
* Power to adjudicate
Establishment of Cyber Appellate Tribunal
* Composition of Cyber Appellate Tribunal
* Qualifications for appointment as Presiding Officer
  of the Cyber Appellate
* Tribunal
* Term of office
* . Resignation and removal
* Procedure and powers of the Cyber Appellate
  Tribunal
* Limitation
* Appeal to High Court
Tampering with computer source documents.
*Hacking with computer system
*Publishing of information which is obscene in
 electronic form
*Power of Controller to give directions
*Protected system
*Penalty for misrepresentation
*Penalty for breach of confidentiality and privacy
*Publication for fraudulent purpose
*Confiscation
* Power of police officer and other officers to enter,
  search
* . Offences by companies
* . Power of Central Government to make rules
* Constitution of Advisory Committee
* Power of State Government to make rules
THE FIRST SCHEDULE
AMENDMENTS TO THE INDIAN PENAL CODE


THE SECOND SCHEDULE
AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872

THE THIRD SCHEDULE
AMENDMENTS TO THE BANKERS' BOOKS EVIDENCE ACT , 1891


THE FOURTH SCHEDULE
AMENDMENT TO THE RESERVE BANK OF INDIA ACT, 1934
.
AMENDMENTS TO THE INDIAN PENAL CODE.
(Electronic Records).
The words "electronic record" shall have the meaning assigned to
      them in clause (t) of subsection.
(5) of section 2 of the Information Technology Act, 2000.".

. In section 172, for the words "produce a document in a Court of
       Justice", the words "produce.
a document or an electronic record in a Court of Justice" shall be
       substituted.
AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872.
1. In section 3,—.
(c)in the definition of "Evidence", for the words
"all documents produced for the inspection of the Court", the words
"all documents including electronic records produced for the inspection of
  the Court" shall be substituted;

2) after the definition of "India", the following shall be inserted, namely:—
  'the.
expressions "Certifying Authority", "digital signature", "Digital Signature
  Certificate",
"electronic form", "electronic records", "information", "secure electronic
  record", "secure.
digital signature" and "subscriber" shall have the meanings respectively
  assigned to them in.
the Information Technology Act, 2000.'.
AMENDMENTS TO THE BANKERS' BOOKS EVIDENCE
 ACT , 1891
1. In section 2—
(a) for clause (3), the following clause shall be
  substituted, namely:—
'(3) "bankers' books" include ledgers, day-books, cash-
  books, account-books and
all other books used in the ordinary business of a bank
  whether kept in the written form or
as printouts of data stored in a floppy, disc, tape or any
 other form of electro-magnetic
data storage device;
AMENDMENT TO THE RESERVE BANK OF INDIA ACT, 1934.


   In the Reserve Bank of India Act, 1934, in section 58, in sub-section
    (2), after clause.
   (p), the following clause shall be inserted, namely:—.
   "(pp) the regulation of fund transfer through electronic means between
    the banks.
   or between the banks and other financial institutions referred to in
    clause (c) of section.
   45-1, including the laying down of the conditions subject to which
    banks and other.
   financial institutions shall participate in such fund transfers, the
    manner of such fund.
   transfers and the rights and obligations of the participants in such fund
    transfers;".

More Related Content

What's hot

IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
E contract
E  contractE  contract
E contract
Benita Ezeigbo
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
Ristya Anditha
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
Ankita Sharma
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
Prateek Sinha
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
PAYAL SINHA
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 

What's hot (20)

IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
E contract
E  contractE  contract
E contract
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Information technology act
Information technology actInformation technology act
Information technology act
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 

Viewers also liked

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
Onkar Sule
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Rights and limitations of patentee
Rights and limitations of patenteeRights and limitations of patentee
Rights and limitations of patentee
Palak Khare
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
Amlin David
 
Trademark presentation
Trademark presentationTrademark presentation
Trademark presentationadamconsulting
 

Viewers also liked (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 
Class it act
Class it actClass it act
Class it act
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Rights and limitations of patentee
Rights and limitations of patenteeRights and limitations of patentee
Rights and limitations of patentee
 
Types of patents
Types of patentsTypes of patents
Types of patents
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
E governance
E governanceE governance
E governance
 
Business law
Business lawBusiness law
Business law
 
Business law
Business lawBusiness law
Business law
 
Trademark presentation
Trademark presentationTrademark presentation
Trademark presentation
 
E governance
E governanceE governance
E governance
 
Business law ppt
Business law pptBusiness law ppt
Business law ppt
 

Similar to It act 2000

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
akshitarathi77
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
Mohit Goswami
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
SuvabrataSamanta
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
Gururaj H L
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
shahulgk
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
2coolshivani
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan
 
Cyber law
Cyber lawCyber law
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
Dr. Prashant Vats
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
SOMASUNDARAM T
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Cyber
CyberCyber
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
Vaishnavi Meghe
 
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 

Similar to It act 2000 (20)

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber law
Cyber lawCyber law
Cyber law
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber
CyberCyber
Cyber
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
It act 2000
It act 2000It act 2000
It act 2000
 

Recently uploaded

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 

Recently uploaded (20)

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 

It act 2000

  • 1.
  • 2. * New communication systems and digital technology have made dramatic changes in way of transacting business. Use of computers to create, transmit and store information is increasing. Computer has many advantages in e-commerce. It is difficult to shift business from paper to electronic form due to two legal hurdles – (a) Requirements as to writing and (b) Signature for legal recognition. Many legal provisions assume paper based records and documents and signature on paper.
  • 3. * The General Assembly of the United Nations by resolution dated the 30th January, 1997 adopted the Model Law on Electronic Commerce and recommended  that all States should give favourable consideration to the Model Law when they enact or revise their laws. * The Information Technology Act has been passed to give effect to the UN resolution and to promote efficient delivery of Government services by means of reliable electronic records.
  • 4. THE INFORMATION TECHNOLOGY ACT, 2000 An Act to provide legal recognition for transactions carried . out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.
  • 5. In this Act, unless the context otherwise requires (c)"access" means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network; (b) "addressee" means a person who is intended by the originator to receive the electronic record but does not include any intermediary; (c) "affixing digital signature“ means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature (d) “asymmetric crypto system" means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature
  • 6. (b)“digital signature” means authentication of any electronic record by a subscriber by means of an electronic method in accordance with the provisions of section 3 (d)“Function“ in relation to a computer, includes logic, control arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer (f)"intermediary" with respect to any particular electronic message means any person who on behalf of another person receives, stores or transmits that message or provides any service with respect to that message (h) "key pair", in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key (x)"private key" means the key of a key pair used to create a digital signature; (j) "public key" means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate
  • 7. The Act provides for – *Electronic contracts will be legally valid *Legal recognition of digital signatures *Digital signature to be effected by use of asymmetric crypto system and hash function *Security procedure for electronic records and digital signature *Appointment of Certifying Authorities and Controller of Certifying Authorities, including recognition of foreign Certifying Authorities *Controller to act as repository of all digital signature certificates *Certifying authorities to get License to issue digital signature certificates *Various types of computer crimes defined and stringent penalties provided under the Act *Appointment of Adjudicating Officer for holding inquiries under the Act *Establishment of Cyber Appellate Tribunal under the Act *Appeal from order of Adjudicating Officer to Cyber Appellate Tribunal and not to any Civil Court  *Appeal from order of Cyber Appellate Tribunal to High Court *Act to apply for offences or contraventions committed outside India *Network service providers not to be liable in certain cases *Power of police officers and other officers to enter into any public place and search and arrest without warrant *Constitution of Cyber Regulations Advisory Committee who will advice the Central Government and Controller
  • 8. * The Information Technology Act enables: * Legal recognition to Electronic Transaction / Record * Facilitate Electronic Communication by means of reliable electronic record * Acceptance of contract expressed by electronic means * Facilitate Electronic Commerce and Electronic Data interchange * Electronic Governance * Facilitate electronic filing of documents * Retention of documents in electronic form * Where the law requires the signature, digital signature satisfy the requirement * Uniformity of rules, regulations and standards regarding the authentication and integrity of electronic records or documents * Publication of official gazette in the electronic form * Interception of any message transmitted in the electronic or encrypted form * Prevent Computer Crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in Electronic Commerce and electronic transaction.
  • 9. Chapter 1-DIGITAL SIGNATURE  Authentication of electronic records Chapter 2-ELECTRONIC GOVERNANCE  Legal recognition of electronic records  Legal recognition of digital signatures  Use of electronic records and digital signatures in Government and its agencies  Retention of electronic records  Publication of rule, regulation, etc., in Electronic Gazette
  • 10. *Attribution of electronic records *Acknowledgment of receipt *Time and place of despatch and receipt of electronic record
  • 11. * Secure electronic record * Secure digital signature * Security procedure
  • 12. *Appointment of Controller and other officers. *Functions of Controller *Recognition of foreign Certifying Authorities *Licence to issue Digital Signature Certificates *Application for licence *Renewal of licence *Procedure for grant or rejection of licence *Suspension of licence *Display of licence *Surrender of licence
  • 13. * Generating key pair * Acceptance of Digital Signature Certificate * Control of private key
  • 14. * Penalty for damage to computer, computer system * Penalty for failure to furnish information return * Residuary penalty * Power to adjudicate
  • 15. Establishment of Cyber Appellate Tribunal * Composition of Cyber Appellate Tribunal * Qualifications for appointment as Presiding Officer of the Cyber Appellate * Tribunal * Term of office * . Resignation and removal * Procedure and powers of the Cyber Appellate Tribunal * Limitation * Appeal to High Court
  • 16. Tampering with computer source documents. *Hacking with computer system *Publishing of information which is obscene in electronic form *Power of Controller to give directions *Protected system *Penalty for misrepresentation *Penalty for breach of confidentiality and privacy *Publication for fraudulent purpose *Confiscation
  • 17. * Power of police officer and other officers to enter, search * . Offences by companies * . Power of Central Government to make rules * Constitution of Advisory Committee * Power of State Government to make rules
  • 18. THE FIRST SCHEDULE AMENDMENTS TO THE INDIAN PENAL CODE THE SECOND SCHEDULE AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872 THE THIRD SCHEDULE AMENDMENTS TO THE BANKERS' BOOKS EVIDENCE ACT , 1891 THE FOURTH SCHEDULE AMENDMENT TO THE RESERVE BANK OF INDIA ACT, 1934
  • 19. . AMENDMENTS TO THE INDIAN PENAL CODE. (Electronic Records). The words "electronic record" shall have the meaning assigned to them in clause (t) of subsection. (5) of section 2 of the Information Technology Act, 2000.". . In section 172, for the words "produce a document in a Court of Justice", the words "produce. a document or an electronic record in a Court of Justice" shall be substituted.
  • 20. AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872. 1. In section 3,—. (c)in the definition of "Evidence", for the words "all documents produced for the inspection of the Court", the words "all documents including electronic records produced for the inspection of the Court" shall be substituted; 2) after the definition of "India", the following shall be inserted, namely:— 'the. expressions "Certifying Authority", "digital signature", "Digital Signature Certificate", "electronic form", "electronic records", "information", "secure electronic record", "secure. digital signature" and "subscriber" shall have the meanings respectively assigned to them in. the Information Technology Act, 2000.'.
  • 21. AMENDMENTS TO THE BANKERS' BOOKS EVIDENCE ACT , 1891 1. In section 2— (a) for clause (3), the following clause shall be substituted, namely:— '(3) "bankers' books" include ledgers, day-books, cash- books, account-books and all other books used in the ordinary business of a bank whether kept in the written form or as printouts of data stored in a floppy, disc, tape or any other form of electro-magnetic data storage device;
  • 22. AMENDMENT TO THE RESERVE BANK OF INDIA ACT, 1934.  In the Reserve Bank of India Act, 1934, in section 58, in sub-section (2), after clause.  (p), the following clause shall be inserted, namely:—.  "(pp) the regulation of fund transfer through electronic means between the banks.  or between the banks and other financial institutions referred to in clause (c) of section.  45-1, including the laying down of the conditions subject to which banks and other.  financial institutions shall participate in such fund transfers, the manner of such fund.  transfers and the rights and obligations of the participants in such fund transfers;".