The document summarizes key sections of the Information Technology Act, 2000 related to cyber security in India. It discusses sections establishing protected computer systems, designating agencies responsible for critical infrastructure protection and incident response, penalties for various cyber crimes, and intermediary liability exemptions. The sections establish national agencies to coordinate cyber security, empower agencies to investigate offenses, and outline penalties including imprisonment and fines for offenses like unauthorized access, privacy breaches, and publishing false digital signatures.
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
After coming the computer age our privacy is not so secure. We are bening followed and traced if we are using multimedia mobile with internet connection. What are the remedies against this, this Notes reply.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
History
Introduction
Introduce and finalized by Atal bhirai Bajpai
Parts of the Act
Amendments to I.T. ACT 2000
Offences of I.T ACT 2000
What works
What doesn’t work
Section of I.T. ACT 2000
The advantage of I.T. ACT 2000
The disadvantage of I.T ACT 2000
Conclusion
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
After coming the computer age our privacy is not so secure. We are bening followed and traced if we are using multimedia mobile with internet connection. What are the remedies against this, this Notes reply.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
History
Introduction
Introduce and finalized by Atal bhirai Bajpai
Parts of the Act
Amendments to I.T. ACT 2000
Offences of I.T ACT 2000
What works
What doesn’t work
Section of I.T. ACT 2000
The advantage of I.T. ACT 2000
The disadvantage of I.T ACT 2000
Conclusion
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
UNOFFICIAL TRANSLATION
Law on Combating Cybercrime in the Kingdom of Bahrain
On information technology crimes
We are Hamad bin Isa Al Khalifa, King of the Kingdom of Bahrain.
After reviewing the Constitution,
The Penal Code promulgated by Legislative Decree No. 15 of 1976 and its
amendments,
And Decree-Law No. (17) of 1976 regarding Juveniles, amended by Legislative
Decree No. (23) of 2013,
And Decree-Law No. 4 of 2001 on the Prohibition and Combating of Money
Laundering and its amendments,
And Decree-Law No. (28) of 2002 on electronic transactions and its
amendments,
And the Code of Criminal Procedure promulgated by Legislative Decree No. 46 of
2002 and its amendments,
And Decree-Law No. (47) of 2002 regarding the organization of the press,
printing and publishing,
And the Telecommunications Law promulgated by Legislative Decree No. 48 of
2002,
Law No. (19) of 2004 approving the accession of the Kingdom of Bahrain to the
Optional Protocols to the Convention on the Rights of the Child on the
involvement of children in armed conflict and on the sale of children, child
prostitution and child pornography,
Law No. (22) for the year 2006 regarding the protection of copyright and related
rights and its amendments,
Law No. (58) for the year 2006 regarding the protection of society from terrorist
acts and amended by Legislative Decree No. (20) of 2013,
Law No. 64 of 2006 promulgating the Central Bank of Bahrain Law and financial
institutions,
The Shura Council and the Council of Representatives approved the following
law, which we have ratified and issued:
Introductory chapter
Article (1)
In the application of the provisions of this Law, the following words and
expressions shall have the meanings assigned to each of them unless the context
otherwise requires.
Information technology : includes all forms of technology used to create, process,
store, share, use and display information in various formats.
Information : All that can be stored, processed, generated and transmitted using
IT means, in particular, writing, still images, mobile, sound, numbers, letters,
symbols, signs, etc.
Means any electronic, magnetic, optical, electrochemical, or any instrument that
integrates communication, computing or any other device that has the ability to
receive, transmit, process, store and retrieve data very quickly.
IT system : A related or related tool or set of tools, one or more of which
automatically processes the IT data in accordance with a software program.
IT data : representation of facts, facts, information, or concepts in an appropriate
form that allows the IT system to process them.
Program : A set of instructions expressed in words, symbols, methods or
otherwise, if included in any of the machine-readable media, is capable of making
an IT tool perform a particular work or produce a specific result.
Service Provider, any of the following:
A) a.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
2. section 70 Protected system.
(1) The appropriate Government may, by notification in the Official Gazette,
declare any computer resource which directly or indirectly affects the facility
of Critical Information Infrastructure, to be a protected system.
Explanation. -For the purposes of this section, "Critical Information
Infrastructure" means the computer resource ,destruction of which, shall have
debilitating impact on national security, economy, public health or safety.]
(2) The appropriate Government may, by order in writing, authorize the
persons who are authorized to access protected systems notified under sub-
section (1).
(3) Any person who secures access or attempts to secure access to a protected
system in contravention of the provisions of this section shall be punished with
imprisonment of either description for a term which may extend to ten years
and shall also be liable to fine.
(4) The Central Government shall prescribe the information security practices
and procedures for such protected system.
3. section 70A National nodal agency
(1) The Central Government may, by notification published in the
Official Gazette, designate any organization of the Government as the
national nodal agency in respect of Critical Information Infrastructure
Protection.
(2) The national nodal agency designated under sub-section (1) shall
be responsible for all measures including Research and Development
relating to protection of Critical Information Infrastructure.
(3) The manner of performing functions and duties of the agency
referred to in sub-section (1) shall be such as may be prescribed.
4. 70B Indian Computer Emergency Response
Team to serve as national agency for incident
response
(1) The Central Government shall, by notification in the Official Gazette,
appoint an agency of the Government to be called the Indian Computer
Emergency Response Team.
(2) The Central Government shall provide the agency referred to in sub-
section (1) with a Director-General and such other officers and employees as
may be prescribed.
(3) The salary and allowances and terms and conditions of the Director-
General and other officers and employees shall be such as may be prescribed.
(4) The Indian Computer Emergency Response Team shall serve as the
national agency for performing the following functions in the area of cyber
security,-
(a) collection, analysis and dissemination of information on cyber incidents;
(b) forecast and alerts of cyber security incidents;
(c) emergency measures for handling cyber security incidents;
5. (d) coordination of cyber incidents response activities;
(e) issue guidelines, advisories, vulnerability notes and whitepapers relating
to information security practices, procedures, preventation, response and
reporting of cyber incidents;
(f) such other functions relating to cyber security as may be prescribed.
(5) The manner of performing functions and duties of the agency referred to
in sub-section (1) shall be such as may be prescribed.
(6) For carrying out the provisions of sub-section (4), the agency referred to
in sub-section (1) may call for information and give direction to the service
providers, intermediaries, data centres, body corporate and any other
person.
(7) Any service provider, intermediaries, data centres, body corporate or
person who fails to provide the information called for or comply with the
direction under sub-section (6), shall be punishable with imprisonment for a
term which may extend to one year or with fine which may extend to one
lakh rupees or with both.
(8) No court shall take cognizance of any offence under this section, except
on a complaint made by an officer authorised in this behalf by the agency
referred to in sub-section (1).
6. Section 71 Penalty for misrepresentation.
-Whoever makes any misrepresentation to, or suppresses any material fact
from the Controller or the Certifying Authority for obtaining any licence or
[Electronic Signature] Certificate, as the case may be, shall be punished with
imprisonment for a term which may extend to two years, or with fine which
may extend to one lakh rupees, or with both.
7. 72. Penalty for breach of confidentiality
and privacy
Save as otherwise provided in this Act or any other law for the time being in
force, if any person who, in pursuance of any of the powers conferred under
this Act, rules or regulations made thereunder, has secured access to any
electronic record, book, register, correspondence, information, document or
other material without the consent of the person concerned discloses such
electronic record, book, register, correspondence, information, document or
other material to any other person shall be punished with imprisonment for a
term which may extend to two years, or with fine which may extend to one
lakh rupees, or with both.
8. 72A Punishment for disclosure of
information in breach of lawful contract
In this Act or any other law for the time being in force, any person including
an intermediary who, while providing services under the terms of lawful
contract, has secured access to any material containing personal information
about another person, with the intent to cause or knowing that he is likely to
cause wrongful loss or wrongful gain discloses, without the consent of the
person concerned, or in breach of a lawful contract, such material to any
other person, shall be punished with imprisonment for a term which mayimprisonment for a term which may
extend toextend to three yearsthree years, or with fine which may extend to five lakh rupees, or
with both.
9. SECTION 73 Penalty for publishing
[Electronic
Signature] Certificate false in certain particulars.
(1) No person shall publish a
[Electronic Signature] Certificate or otherwise
make it available to any other person with the knowledge that-
(a) the Certifying Authority listed in the certificate has not issued it; or
(b) the subscriber listed in the certificate has not accepted it; or
(c) the certificate has been revoked or suspended, unless such publication is
for the purpose of verifying a
[electronic signature] created prior to such
suspension or revocation.
(2) Any person who contravenes the provisions of sub-section (1) shall be
punished with imprisonment for a term which may extend to two years, or
with fine which may extend to one lakh rupees, or with both.
10. 74 Publication for fraudulent purpose
Whoever knowingly creates, publishes or otherwise makes available a
[Electronic Signature] Certificate for any fraudulent or unlawful purpose shall
be punished with imprisonment for a term which may extend to two years, or
with fine which may extend to one lakh rupees, or with both. If any person
knowingly creates, publishes or otherwise makes available a Electronic
Signature Certificate for any fraudulent or unlawful purpose, he shall be
punished with imprisonment upto two years, or with fine upto one lakh
rupees, or with both.
11. 75. Act to apply for offence or contravention
committed outside India.-
(1) Subject to the provisions of sub-section (2), the provisions of this Act shall
apply also to any offence or contravention committed outside India by any
person irrespective of his nationality.
(2) For the purposes of sub-section (1), this Act shall apply to an offence or
contravention committed outside India by any person if the act or conduct
constituting the offence or contravention involves a computer, computer
system or computer network located in India.
12. 76. Confiscation
.-Any computer, computer system, floppies, compact disks, tape
drives or any other accessories related thereto, in respect of which
any provision of this Act, rules, orders or regulations made
thereunder has been or is being contravened, shall be liable to
confiscation: Provided that where it is established to the satisfaction
of the court adjudicating the confiscation that the person in whose
possession, power or control of any such computer, computer system,
floppies, compact disks, tape drives or any other accessories relating
thereto is found is not responsible for the contravention of the
provisions of this Act, rules, orders or regulations made thereunder,
the court may, instead of making an order for confiscation of such
computer, computer system, floppies, compact disks, tape drives or
any other accessories related thereto, make such other order
authorised by this Act against the person contravening of the
provisions of this Act, rules, orders or regulations made thereunder as
it may think fit.
13. 77 Penalties or confiscation not to
interfere with other punishments
No penalty imposed or confiscation made under this Act shall prevent the
imposition of any other punishment to which the person affected thereby is
liable under any other law for the time being in force.
14. 78 Power to investigate offences
-Notwithstanding anything contained in the Code of Criminal Procedure, 1973
(2 of 1974), a police officer not below the rank of 94
[Inspector] shall
investigate any offence under this Act.
95 [ 79 Exemption from liability of intermediary in certain cases. -
(1) Notwithstanding anything contained in any law for the time being in force
but subject to the provisions of sub-sections (2) and (3), an intermediary shall
not be liable for any third party information, data, or communication link
made available or hosted by him.
(2) The provisions of sub-section (1) shall apply if-
(a) the function of the intermediary is limited to providing access to a
communication system over which information made available by third
parties is transmitted or temporarily stored or hosted; or
15. (b) the intermediary does not-
(i) initiate the transmission,
(ii) select the receiver of the transmission, and
(iii) select or modify the information contained in the transmission;
(c) the intermediary observes due diligence while discharging his duties under this Act
and also observes such other guidelines as the Central Government may prescribe in
this behalf.
(3) The provisions of sub-section (1) shall not apply if-
(a) the intermediary has conspired or abetted or aided or induced, whether by threats
or promise or othorise in the commission of the unlawful act;
(b) upon receiving actual knowledge, or on being notified by the appropriate
Government or its agency that any information, data or communication link residing in
or connected to a computer resource, controlled by the intermediary is being used to
commit the unlawful act, the intermediary fails to expeditiously remove or disable
access to that material on that resource without vitiating the evidence in any manner.
16. 79 Exemption from liability of
intermediary in certain cases.
-(1) Notwithstanding anything contained in any law for the time being in force but subject to the provisions of sub-
sections (2) and (3), an intermediary shall not be liable for any third party information, data, or communication link
made available or hosted by him.
(2) The provisions of sub-section (1) shall apply if-
(a) the function of the intermediary is limited to providing access to a communication system over which
information made available by third parties is transmitted or temporarily stored or hosted; or
(b) the intermediary does not-(i) initiate the transmission,
(ii) select the receiver of the transmission, and
(iii) select or modify the information contained in the transmission;
(c) the intermediary observes due diligence while discharging his duties under this Act and also observes such other
guidelines as the Central Government may prescribe in this behalf.
(3) The provisions of sub-section (1) shall not apply if-
(a) the intermediary has conspired or abetted or aided or induced, whether by threats or promise or othorise in the
commission of the unlawful act;
(b) upon receiving actual knowledge, or on being notified by the appropriate Government or its agency that any
information, data or communication link residing in or connected to a computer resource, controlled by the
intermediary is being used to commit the unlawful act, the intermediary fails to expeditiously remove or disable
access to that material on that resource without vitiating the evidence in any manner.
Explanation. -For the purpose of this section, the expression "third party information" means any information dealt
with by an intermediary in his capacity as an intermediary.
17. 79(A): Central Government to notify
Examiner of Electronic Evidence
The Central Government may, for the purposes of providing expert
opinion on electronic form evidence before any court or other
authority specify, by notification in the Official Gazette, any
Department, body or agency of the Central Government or a State
Government as an Examiner of Electronic Evidence. Explanation. -For
the purposes of this section, "electronic form evidence" means any
information of probative value that is either stored or transmitted in
electronic form and includes computer evidence, digital audio, digital
video, cell phones, digital fax machines.
18. Group Members
Amil Chaturvedi (14030122021)
Dipesh Sharma (14030122053)
Shivam Bharadwaj (14030122027)
Himal Rustagi (14030122063)