SlideShare a Scribd company logo
1 of 14
Download to read offline
Cyber Security (2150003)
B.E. MECH – Sem Vth
Prepared by,
Patel Shrey B.
(170953119031)
Group :- 5B2
Guided by,
Asst. Prof. Ruchi Maheta
(Computer Science Deptt)
CONTENTS
• Brief History
• Reasons For Amending IT Act
• Objectives
• Definition
• Digital Signature And Electronic Signature (Amended - ITAA 2008)
• Various Regulation &Their Section
2$ɧƦɛƴ ´ƶ
BRIEF HISTORY
$ɧƦɛƴ ´ƶ
3
4$ɧƦɛƴ ´ƶ
REASONS FOR AMENDING IT ACT
• To include new types of Cyber-crimes
• To increase protection of personal data & info. for national security, econ.,
public health & safety
• To provide for alternate technology for e-Signatures as per Model Law
UNCITRAL (UN Commission of Intl.Trade laws)
• To authorize Service Providers providing services to SG/CG
5$ɧƦɛƴ ´ƶ
OBJECTIVES
• Legal recognition for transactions carried out by means of E-data interchange (EDI),
E-Commerce
• Facilitate and legalize E-fund transfers (EFT)
• Facilitate E-storage of data
• Facilitate E-filing of documents with Govt departments
• Legal recognition for keeping of books of accounts by bankers in E-form
• Legal recognition to Digital signatures for authentication of information
• Amend RBI Act, Banker’s Book Evidence Act, Indian Evidence Act, Indian Penal Code
$ɧƦɛƴ ´ƶ 6
DEFINITION
• Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory
function resources of a computer, computer system or computer network
• Addressee means a person who is “intended by the originator to receive” the E-record. Excludes intermediary
• Adjudicating officer (AO) means an adudicating officer appointed under the Act
• Affixing Electronic signature means adoption of any methodology or procedure by a person for
authenticating an E-record via electronic signature
• Asymmetric crypto system means a system of a secure key pair consisting of a private key for creating a digital
signature and a public key to verify the digital signature
• Certifying Authority (CA) means a person who has been granted a licence to issue an ESC under the Act
• Certification practice statement is issued by a CA to specify the practices that it employs in issuing ESCs
• Communication Device means Cell Phones Personal Digital Assistance (PDAs), or combination of both or
any other device used to communicate, send or transmit any text, video, audio, or image
7$ɧƦɛƴ ´ƶ
• Computer (C) means any electronic magnetic, optical or other high-speed data processing device or
system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic
or optical impulses, and includes all IPO, storage, computer software, or communication facilities which
are connected or related to the computer in a computer system or computer network
• Computer network (CN) means the interconnection of one or more computers through - o the use of
satellite, microwave, terrestrial line or other communication media o terminals or a complex consisting
of two or more interconnected computers whether or not the interconnection is continuously
maintained
• Computer resource (CR) means computer, computer system, computer network, data, computer data
base or software
• Controller means the Controller of CA appointed under the Act
• Cyber AppellateTribunal (CAT) means the Cyber Appellate Tribunal established under the Act. (X
“Regulation” or CRAT)
• Cyber Café means any facility from where access to the internet is offered by any person in the ordinary
course of business to the members of the public
8$ɧƦɛƴ ´ƶ
• Cyber Security means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure,
disruption, modification or destruction
• Data means a representation of information, knowledge, facts, concepts or instructions which are being
prepared or have been prepared in formalised manner, and is intended to be processed, is being
processed or has been processed in a computer system or computer network, and may be in any form
(including computer printouts magnetic or optical storage media, punched cards, punched tapes) or
stored internally in the memory of the computer
• Digital signature means authentication of any E-record by a subscriber by means of an electronic
method or procedure in accordance with the Act
• Digital Signature Certificate means a Digital Signature Certificate issued under the Act
• Electronic form with reference to information means any information generated, sent, received or
stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or
similar device
• Electronic Gazette means the Official Gazette published in the electronic form
9$ɧƦɛƴ ´ƶ
DIGITAL SIGNATURE AND ELECTRONIC
SIGNATURE (AMENDED - ITAA 2008)
10$ɧƦɛƴ ´ƶ
• “Hash function” means an algorithm mapping or translation of one sequence
of bits into another, generally smaller set known as “hash result” such that an
E-record yields the same hash result every time the algorithm is executed with
the same E-record as its input, making it computationally infeasible
– to derive or reconstruct the original E-record from the hash result produced by
the algorithm
– that two E-records can produce the same hash result using the algorithm
11$ɧƦɛƴ ´ƶ
The digital signature is created in two distinct steps.
• First, E-record message digest - by using a mathematical function known as “hash function” which
digitally freezes the E-record thus ensuring the integrity of the content of the E-record.
a) Any tampering with the E-record will invalidate the digital signature
• Secondly, the identity of the person affixing the digital signature is authenticated through the use of a
private key which attaches itself to the message digest and which can be verified by anybody who has the
public key corresponding to such private key.
– It helps to verify whether the E-record is retained intact or has been tampered with
– It helps the person with the public key to identify the originator of the message
• Any subscriber may authenticate an e-record by affixing his Digital Signature.
• The authentication of the e-record shall be effected by the use of asymmetric crypto system and
hash function which envelop and transform the initial e-record into another e-record
• Any person by the use of a public key of the subscriber can verify the e-record
• The private key and the public key are unique to the subscriber and constitute a functioning key pair
12$ɧƦɛƴ ´ƶ
Title Section
Digital Signature And Electronic Signature (Amended –
ITAA 2008)
Section 3, Section 3A
Electronic Governance Section 4 to Section 10
Attribution,Acknowledgment And Dispatch Of E-records Section 11 to Section 13
Secure E-records And Secure E-signatures Section 14 to Section 16
Regulation Of CA Section 17 to Section 34
Electronic Signature Certificates Section 35 to Section 39
Duties Of Subscribers Section 40 to Section 42
Penalties And Adjudication Section 43 to Section 47
The Cyber Appellate Tribunal Section 48 to Section 64
Offences Section 65 to Section 78
Intermediaries NotTo Be Liable In Certain Cases Section 79
Examiner Of Electronic Evidence Section 79 A to Section 90
13$ɧƦɛƴ ´ƶ
VARIOUS REGULATION & SECTION
ANY QUESTION ?
14$ɧƦɛƴ ´ƶ

More Related Content

What's hot

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 

What's hot (20)

Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Information technology act
Information technology actInformation technology act
Information technology act
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
it act 2000
it act 2000it act 2000
it act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 

Similar to IT ACT 2008 ALA GTU

Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
Anubhav
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
Diya Mirza
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
Suryadev Maity
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
SuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
shahulgk
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 

Similar to IT ACT 2008 ALA GTU (20)

Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
Class it act
Class it actClass it act
Class it act
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
It act
It actIt act
It act
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 

More from Shrey Patel

More from Shrey Patel (20)

Ala dom vibartion transmibilty and isolation.pptx sem 6th gtu vibration
Ala dom   vibartion transmibilty and isolation.pptx sem 6th gtu vibrationAla dom   vibartion transmibilty and isolation.pptx sem 6th gtu vibration
Ala dom vibartion transmibilty and isolation.pptx sem 6th gtu vibration
 
Ala ie job evaluation and insentives
Ala ie   job evaluation and insentivesAla ie   job evaluation and insentives
Ala ie job evaluation and insentives
 
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioningPsychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
 
Ala pt design of fixture production technology sem 6th gtu production engin...
Ala pt   design of fixture production technology sem 6th gtu production engin...Ala pt   design of fixture production technology sem 6th gtu production engin...
Ala pt design of fixture production technology sem 6th gtu production engin...
 
Cad ala brep, csg and sweep representation gtu
Cad   ala  brep, csg and sweep representation gtuCad   ala  brep, csg and sweep representation gtu
Cad ala brep, csg and sweep representation gtu
 
force transmibility ALA DOM Vibration
force transmibility ALA DOM Vibrationforce transmibility ALA DOM Vibration
force transmibility ALA DOM Vibration
 
Transient response ALA CE
Transient response ALA CETransient response ALA CE
Transient response ALA CE
 
belt drive ALA DME
belt drive ALA DMEbelt drive ALA DME
belt drive ALA DME
 
Types of turbinr FPE ALA
Types of turbinr FPE ALATypes of turbinr FPE ALA
Types of turbinr FPE ALA
 
Ht analysis of conduction through wall OEP
Ht   analysis of conduction through wall OEPHt   analysis of conduction through wall OEP
Ht analysis of conduction through wall OEP
 
Ht - heat transfer through fin ala
Ht - heat transfer through fin alaHt - heat transfer through fin ala
Ht - heat transfer through fin ala
 
Dynamometer Torque /Force Measurement TOM ALA
Dynamometer Torque /Force Measurement TOM ALADynamometer Torque /Force Measurement TOM ALA
Dynamometer Torque /Force Measurement TOM ALA
 
Linear measurement
Linear measurementLinear measurement
Linear measurement
 
Ultrasonic welding
Ultrasonic weldingUltrasonic welding
Ultrasonic welding
 
Flow through orifice
Flow through orificeFlow through orifice
Flow through orifice
 
Complex function
Complex functionComplex function
Complex function
 
Higher Order Differential Equation
Higher Order Differential EquationHigher Order Differential Equation
Higher Order Differential Equation
 
Non destructive testing
Non destructive testingNon destructive testing
Non destructive testing
 
Coplaner concurrent force system
Coplaner concurrent force systemCoplaner concurrent force system
Coplaner concurrent force system
 
Brinell Hardness Testing Method
Brinell Hardness Testing Method Brinell Hardness Testing Method
Brinell Hardness Testing Method
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Recently uploaded (20)

Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

IT ACT 2008 ALA GTU

  • 1. Cyber Security (2150003) B.E. MECH – Sem Vth Prepared by, Patel Shrey B. (170953119031) Group :- 5B2 Guided by, Asst. Prof. Ruchi Maheta (Computer Science Deptt)
  • 2. CONTENTS • Brief History • Reasons For Amending IT Act • Objectives • Definition • Digital Signature And Electronic Signature (Amended - ITAA 2008) • Various Regulation &Their Section 2$ɧƦɛƴ ´ƶ
  • 5. REASONS FOR AMENDING IT ACT • To include new types of Cyber-crimes • To increase protection of personal data & info. for national security, econ., public health & safety • To provide for alternate technology for e-Signatures as per Model Law UNCITRAL (UN Commission of Intl.Trade laws) • To authorize Service Providers providing services to SG/CG 5$ɧƦɛƴ ´ƶ
  • 6. OBJECTIVES • Legal recognition for transactions carried out by means of E-data interchange (EDI), E-Commerce • Facilitate and legalize E-fund transfers (EFT) • Facilitate E-storage of data • Facilitate E-filing of documents with Govt departments • Legal recognition for keeping of books of accounts by bankers in E-form • Legal recognition to Digital signatures for authentication of information • Amend RBI Act, Banker’s Book Evidence Act, Indian Evidence Act, Indian Penal Code $ɧƦɛƴ ´ƶ 6
  • 7. DEFINITION • Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network • Addressee means a person who is “intended by the originator to receive” the E-record. Excludes intermediary • Adjudicating officer (AO) means an adudicating officer appointed under the Act • Affixing Electronic signature means adoption of any methodology or procedure by a person for authenticating an E-record via electronic signature • Asymmetric crypto system means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature • Certifying Authority (CA) means a person who has been granted a licence to issue an ESC under the Act • Certification practice statement is issued by a CA to specify the practices that it employs in issuing ESCs • Communication Device means Cell Phones Personal Digital Assistance (PDAs), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image 7$ɧƦɛƴ ´ƶ
  • 8. • Computer (C) means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all IPO, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network • Computer network (CN) means the interconnection of one or more computers through - o the use of satellite, microwave, terrestrial line or other communication media o terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained • Computer resource (CR) means computer, computer system, computer network, data, computer data base or software • Controller means the Controller of CA appointed under the Act • Cyber AppellateTribunal (CAT) means the Cyber Appellate Tribunal established under the Act. (X “Regulation” or CRAT) • Cyber Café means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public 8$ɧƦɛƴ ´ƶ
  • 9. • Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction • Data means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer • Digital signature means authentication of any E-record by a subscriber by means of an electronic method or procedure in accordance with the Act • Digital Signature Certificate means a Digital Signature Certificate issued under the Act • Electronic form with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device • Electronic Gazette means the Official Gazette published in the electronic form 9$ɧƦɛƴ ´ƶ
  • 10. DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE (AMENDED - ITAA 2008) 10$ɧƦɛƴ ´ƶ
  • 11. • “Hash function” means an algorithm mapping or translation of one sequence of bits into another, generally smaller set known as “hash result” such that an E-record yields the same hash result every time the algorithm is executed with the same E-record as its input, making it computationally infeasible – to derive or reconstruct the original E-record from the hash result produced by the algorithm – that two E-records can produce the same hash result using the algorithm 11$ɧƦɛƴ ´ƶ
  • 12. The digital signature is created in two distinct steps. • First, E-record message digest - by using a mathematical function known as “hash function” which digitally freezes the E-record thus ensuring the integrity of the content of the E-record. a) Any tampering with the E-record will invalidate the digital signature • Secondly, the identity of the person affixing the digital signature is authenticated through the use of a private key which attaches itself to the message digest and which can be verified by anybody who has the public key corresponding to such private key. – It helps to verify whether the E-record is retained intact or has been tampered with – It helps the person with the public key to identify the originator of the message • Any subscriber may authenticate an e-record by affixing his Digital Signature. • The authentication of the e-record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial e-record into another e-record • Any person by the use of a public key of the subscriber can verify the e-record • The private key and the public key are unique to the subscriber and constitute a functioning key pair 12$ɧƦɛƴ ´ƶ
  • 13. Title Section Digital Signature And Electronic Signature (Amended – ITAA 2008) Section 3, Section 3A Electronic Governance Section 4 to Section 10 Attribution,Acknowledgment And Dispatch Of E-records Section 11 to Section 13 Secure E-records And Secure E-signatures Section 14 to Section 16 Regulation Of CA Section 17 to Section 34 Electronic Signature Certificates Section 35 to Section 39 Duties Of Subscribers Section 40 to Section 42 Penalties And Adjudication Section 43 to Section 47 The Cyber Appellate Tribunal Section 48 to Section 64 Offences Section 65 to Section 78 Intermediaries NotTo Be Liable In Certain Cases Section 79 Examiner Of Electronic Evidence Section 79 A to Section 90 13$ɧƦɛƴ ´ƶ VARIOUS REGULATION & SECTION