2. Objectives of the IT Act
To provide legal recognition for transactions:-
Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as "electronic commerce“
To facilitate electronic filing of documents with
Government agencies and E-Payments
To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act ,1934
Aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other
activities carried out by electronic means.
3. IT Act 2000 Objectives
Legal Recognition for E-Commerce
Digital Signatures and Regulatory Regime
Electronic Documents at par with paper documents
E-Governance
Electronic Filing of Documents
Amend certain Acts
Define Civil wrongs, Offences, punishments
Investigation, Adjudication
Appellate Regime
4. Definitions
A total of 34 definition given in bare act
Categorized into
Digital Infrastructure
Authorizing agency
Documentation
5. Definitions ( section 2)
"computer" means electronic, magnetic, optical or other high-speed
date processing device or system which performs logical, arithmetic
and memory functions by manipulations of electronic, magnetic or
optical impulses, and includes all
input, output, processing, storage, computer software or
communication facilities which are connected or relates to the
computer in a computer system or computer network;
"computer network" means the inter-connection of one or more
computers through-
(i) the use of satellite, microwave, terrestrial lime or other
communication media; and
(ii) terminals or a complex consisting of two or more interconnected
computers whether or not the interconnection is continuously
maintained;
6. Definitions ( section 2)
"computer system" means a device or collection of devices, including
input and output support devices and excluding calculators which are
not programmable and capable being used in conjunction with
external files which contain computer programmes, electronic
instructions, input data and output data that performs logic,
arithmetic, data storage and retrieval, communication control and
other functions;
"data" means a representation of information, knowledge, facts,
concepts or instruction which are being prepared or have been
prepared in a formalised manner, and is intended to be processed, is
being processed or has been processed in a computer system or
computer network, and may be in any form (including computer
printouts magnetic or optical storage media, punched cards, punched
tapes) or stored internally in the memory of the computer.
7. Definitions ( section 2)
"electronic record" means date, record or date generated, image or
sound stored, received or sent in an electronic form or micro film or
computer generated micro fiche;
“secure system” means computer hardware, software, and
procedure that-
(a) are reasonably secure from unauthorized access and misuse;
(b) provide a reasonable level of reliability and correct operation;
(c) are reasonably suited to performing the intended function; and
(d) adhere to generally accepted security procedures
“security procedure” means the security procedure prescribed by the
Central Government under the IT Act, 2000.
secure electronic record – where any security procedure has been
applied to an electronic record at a specific point of time, then such
record shall be deemed to be a secure electronic record from such
point of time to the time of verification
8. Definitions ( section 2)
"Certifying Authority" means a person who has been granted a
licence to issue a Digital Signature Certificate
"Controller" means the Controller of Certifying Authorities appointed
under sub-section (l) of section 17
"Cyber Appellate Tribunal" means the Cyber Regulations Appellate
Tribunal established under sub-section (1) of section 48
"Electronic Gazette" means the Official Gazette published in the
electronic form;
"originator" means a person who sends, generates, stores or
transmits any electronic message or causes any electronic message
to be sent, generated, stored or transmitted to any other person but
does not include an intermediary;
"subscriber" means a person in whose name the Digital Signature
Certificate is issued;
9. Definitions ( section 2)
"Act'' means the Information Technology Act, 2000; (21 of 2000);
"Agent" means a person duly authorised by a party to present an
application or reply on its behalf before the Tribunal;
"Application" means an application made to the Tribunal under
section 57;
"Legal practitioner" shall have the same meaning as is assigned to it
in the Advocates Act, 1961 (25 of 1971):
"Presiding OfficerRegistrar" means the R" means the Presiding
Officer of the Tribunal;
“Registrar of the Tribunal” and includes any officer to whom the
powers and functions of the Registrar may be delegated;
"Registry" means the Registry of the Tribunal;
"Section" means a section of the Act;
10. Definitions ( section 2)
"affixing digital signature" means adoption of any methodology or
procedure by a person for the purpose of authenticating an electronic
record by means of digital signature;
"digital signature" means authentication of any electronic record by a
subscriber by means of an electronic method or procedure ;
"Digital Signature Certificate" means a Digital Signature Certificate
issued under subsection (4) of section 35;
"electronic form" with reference to information means any
information generated, sent, received or stored in
media, magnetic, optical, computer memory, micro film, computer
generated micro fiche or similar device;
"key pair", in an asymmetric crypto system, means a private key and
its mathematically related public key, which are so related that the
public key can verify a digital signature created by the private key;
11. Issue addressed
Legal Recognition of Electronic Documents
Legal recognition of Electronic Transaction /
Record
Legal recognition of digital signature is at par
with the handwritten signature
Electronic Communication by means of reliable
electronic record
12. Issue addressed
Legal Recognition of Digital Signatures
Acceptance of contract expressed by electronic means
e-Commerce and Electronic Data interchange
e-Governance
Electronic filing of documents
Retention of documents in electronic form
Uniformity of rules, regulations and standards regarding
the authentication and integrity of electronic
records or documents
Publication of official gazette in the electronic form
Interception of any message transmitted in the
electronic or encrypted form
13. Issue addressed
Offenses and Contraventions
Prevention of Computer Crime, forged electronic
records, international alteration of electronic
records
fraud, forgery or falsification in e-Commerce and
electronic transaction.
14. Issue addressed
Justice Dispensation Systems for
Cybercrimes
Authorities
• Controller to certify the public keys of the
Certifying Authorities (CAs)
• Controller to act as repository of all digital
signature certificates
• Certifying Authorities to get Licence from the
Controller to issue digital signature .
15. REGULATION OF CERTIFYING AUTHORITIES
J
U
Govt. Of India Supreme Court D
I
C
I
Controller of A
Certifying High Court L
Authorities
S
Cyber Regulations T
Deputy Controllers R
Appellate Tribunal.
U
C
T
Assistant U
Officer R
Controllers
E
Regulation Structure
16. REGULATION OF CERTIFYING AUTHORITIES
Appointment of Controller and other
officers.
The Central Government may, appoint a
Controller of Certifying Authorities
The Deputy Controllers and Assistant Controllers
shall perform the functions assigned to them by
the Controller
17. REGULATION OF CERTIFYING AUTHORITIES
Functions of Controller.
exercising supervision over the activities of the
Certifying Authorities
certifying public keys of the Certifying
Authorities
specifying the contents of written, printed or
visual materials and advertisements that may be
distributed or used in respect of a Digital
Signature Certificate and the public key
resolving any conflict of interests between the
Certifying Authorities and the subscribers;
18. civil offences under the IT Act 2000
Sec Offence Punishment
43 Damage to Computer, Computer system etc. Compensation to the tune of Rs.1 crore to the affected person.
44(a) For failing to furnish any document, return on Penalty not exceeding one lakh and fifty thousand rupees for
report to the Controller or the Certifying each such failure.
Authority.
44(b) For failing to file any return or furnish any Penalty not exceeding five thousand rupees for every day
information or other document within the during which such failure continues.
prescribed time.
44(c) For not maintaining books of account or records. Penalty not exceeding ten thousand rupees for every day
during which the failure continues.
45 Offences for which no penalty is separately Compensation not exceeding twenty five thousand rupees to
provided. the affected person or a penalty not exceeding twenty five
thousand rupees.
65 Tampering with computer source documents. Imprisonment upto three years, or with fine which may extend
upto two lakh rupees, or with both.
66 Hacking with computer system with the intent or Imprisonment upto three years, or with fine which may extend
knowledge to cause wrongful loss. upto two lakh rupees, or with both.
66A For sending offensive messages through Imprisonment for a term which may extend to three years and
communication service etc. with fine.
66B For dishonestly receiving stolen computer Imprisonment of either description for a term which may
resource or communication device. extend to three years or with fine which may extend to rupees
one lakh or with both.
19. Sec Offence Punishment
66D For cheating by personation by using computer Imprisonment of either description for a term which may
resource. extend to three years and shall also be liable to fine which may
extend to one lakh rupees.
66D For cheating by personation by using computer Imprisonment of either description for a term which may
resource. extend to three years and shall also be liable to fine which may
extend to one lakh rupees.
66E. For violation of privacy Imprisonment which may extend to three years or with fine not
exceeding two lakh rupees, or with both.
66F For cyber terrorism Imprisonment which may extend to imprisonment for life.
67 Publication of obscene material in an electronic Imprisonment upto 5 years and with fine which may extend to
form. one lakh rupees on first conviction and its double punishment
for second and subsequent convictions.
67A For publishing or transmitting of material Imprisonment upto 5 years and with fine which may extend to
containing sexually explicit act etc. in electronic ten lakh rupees and in the event of second or subsequent
form. conviction with imprisonment of either description for a term
which may extend to seven years and also with fine which may
extend to ten lakh rupees.
67B For publishing or transmitting of material Imprisonment upto five years and with fine which may extend
depicting children in sexually explicit act etc. in to ten lakh rupees and in the event of second or subsequent
electronic form. conviction with imprisonment of seven years and also with fine
which may extend to ten lakh rupees.
67C For preserving and retention of information by Imprisonment upto three years and also liable to fine.
Intermediaries.
68 For failing to comply with the directions of the Imprisonment upto 3 years and fine upto two lakhs, or both.
20. Sec Offence Punishment
69 For failing to extend facilities to decrypt Imprisonment which may extend to seven years.
information which is against the interest
of sovereignty or integrity of India.
70 Securing or attempting to secure access Imprisonment which may extend to 10 years and fine.
to a protected system.
71 For misrepresentation or suppression of Imprisonment upto 2 years, or fine upto rupees one lakh or with
any material fact from the Controller or both.
the Certifying Authority.
72 For break of confidentiality and privacy Imprisonment upto two years or fine upto rupees one lakh, or
with both.
72A For disclosure of information in breach of Imprisonment upto three years or with fine upto five lakh
lawful contract. rupees or with both.
73 For publishing digital signature certificate Imprisonment upto two years or with fine which may extend to
false in certain particulars. one lakh rupees or with both.
74. Publication of Digital Signature Certificate Imprisonment upto two years or fine upto rupees one lakh.
for any fraudulent or unlawful purpose.
76 Any computer, computer system, Liable to confiscation.
floppies, compact disks, tape drives or
any other accessories related thereto
used for contravention of this Act, rules,
orders or regulations made thereunder.
21. civil offences under the IT Act 2000
• Unauthorised copying, extracting and downloading
of any data, database
• Unauthorised access to computer, computer system
or computer network
• Introduction of virus
• Damage to computer System and Computer Network
• Disruption of Computer, computer network
• Denial of access to authorised person to computer
• Providing assistance to any person to facilitate
unauthorised access to a computer
• Charging the service availed by a person to an account
of another person by tampering and manipulation of
other computer Section 44 of the IT Act provides for
penalty on failure to furnish information, return etc. to
the Controller by Certifying Authorities.
22. criminal offences
• Tampering with computer source documents
• Hacking with computer system
• Electronic forgery I.e. affixing of false digital
signature, making false electronic record
• Electronic forgery for the purpose of cheating
• Electronic forgery for the purpose of harming reputation
• Using a forged electronic record
• Publication of digital signature certificate for fraudulent
purpose
• Offences and contravention by companies
• Unauthorised access to protected system
• Confiscation of computer, network, etc.
• Publication of information which is obscene in electronic form
• Misrepresentation or suppressing of material facts for
obtaining Digital Signature Certificates
• Breach of confidentiality and Privacy
• Publishing false Digital Signature Certificate
23. Checklist Information security manager
Establish information security forum
Define scope of Management Information
System
Risk assessment
Division of threats of Information within
centralized and distributed systems
24. Checklist Information security manager
IT security policy
Formulate mission and goal
Alignment to IT requirement
Alignment to organizational policy
Compliance with regulations and standards
Security procedure & std of performance
Formalize steps
Standard operating procedure
Define hierarchy of security and level of authority
Practice
Operationalize policy through execution of procedure
Endpoint security problem
IT security training
Support for internal control ( behavioral, technical)
Monitor system, enforcement of saction (rewards, penalties)
25. Pending Cases
Indian Social Action ... vs The Union Of India on 16 September, 2011
Booked under clause(r) of section 2 of the InformationTechnology Act, 2000
(21 of 2000) for misuse of medium, dismissed without any order as to costs.
KARNAVATI SCHOOL OF DENTISTRY versus UNION OF INDIA 30
August, 2011
Petitioner forwarded documents to start PG courses, ambiguous response
from Dental Council of India, followed by rejection.
Respondent claimed that published documents were flawed
Court found petitioner at mistake under under the Regulations as electronic
form as defined u/Sec.2(r), and dismissed without penalty
26. Pending Cases
Case No.99/2008 under Section 66 of the IT Act also relates to purchase of
airline tickets in four transactions of Rs.7200/- each and is still under
investigation.
Case No.29/2009 under Section 66(A) of the IT Act is regarding insult to the
complainant and hurt the integrity in her individual and professional capacity
and is still under investigation.
Case No.Cr.No.131/10 under Section 379 IPC & 66(c), 66(d), 67(a) of the IT Act
is a complaint of hacking, theft and cheating. In this case the accused was
arrested on 16.4.2010 and the case is still under investigation.
Case No.Cr.No.126/10 under Section 66(C) of the IT Act is a complaint filed
on 6.5.2010 by Ms.Sandhya Pandurang Naik stating that some unknown
accused person created false E-mail ID of the complainant lady as Sandhya
Naik @Gmau.com and thereby committed theft of e-mail. The case is under
investigation.
Recent case of Jilted lover from Gandhidham creates fake Facebook profile,
just got arrested.
27. Pending Cases
The Complaint in Cr.No.74/2009 relates to the Section 420 IPC read with
Section 66 of the IT Act,2000 where a false e-mail was sent directing the
complainant to deposit an amount of Rs.1,69,420/- as he has won the COCO
COLA contest of one lakh Pounds. On the investigation he was arrested at
Imphal East Manipal. This case is still under investigation.
Similar complaint under Section 420 IPC read with Section 66 of IT Act,2000
was filed for depositing a sum of Rs.35000/- towards custom charges to Elite
Creative with PAN No.AMGPA2286A, ICICI Bank branch New Delhi. This case
is still under investigation.
In the another complaint under Section 67 IT Act,2000, the complaint was
lodged when husband has transmitted SMS having vulgar and malicious text
on his wife’s mobile and the husband was arrested and was released on bail.
This case is still under investigation.
Case No.72/2009 is under Section 66 of the IT Act,2000. In this complaint the
complainant complained that some unknown accused person gained access
without permission to the computer system of HDFC Bank and purchased
tickets for travel worth Rs.30,000/-. This case is still under investigation.
28. I.T laws in UK
Various laws for different aspects of IT
requirement
Much older and mature laws compared to
Indian
Different laws for different region
Scottish law has developed separately from English
criminal law
Freedom of Information (Scotland) Act, 2002, differs
significantly from the UK FoI Act 2000
Scottish, Welsh and Northern Ireland parliaments and
assemblies have some different law making powers
29. I.T laws in UK
Copyright Act 1956
Misrepresentation Act 1967 (Hardware)
Sale of Goods Act 1979 (Hardware)
Supply of Goods and Services Act 1982
(Software)
Copyright (Computer Software)
Amendment Act 1985
Computer Misuse Act 1990
Data Protection Act(s) 1984 & 1998
The Privacy and Electronic
Communications Regulations 2003 – EC
Directive
30. I.T laws in UK
Outlawing criminal behaviour and computer misuse
Unlawful access to data and systems
Hacking and viruses
Criminal Damage Act 1971 was insufficient and replaced
Computer Misuse Act 1990 is now in reform
Unlawful data use and data publication
Obscenity and pornography
Obscene Publications Act 1959
Protection of Children Act 1978
Criminal Justice Act 1988 e.g. Harassment
Telecommunications Act 1984
Protection from Harassment Act 1997
ACE2159
31. References
Information Technology ACT 2000
CYBER APPELLATE TRIBUNAL
Ministry of Communications & Information
Technology
Asian School of Cyber Laws, Pune
National Institute of Financial
Management
Gujarat Police
Archives from various courts
University of SouthHampton, UK
32. “Justice that love gives is a
surrender, justice that law gives is
a punishment. “
-Mohandas Gandhi