SlideShare a Scribd company logo
YAGYAVALKYA INSTITUTE OF
TECHNOLOGY
Submitted To: Submitted By:
Mr. Manish Dave Abhilasha Agarwal
(Asst. Professor CS & IT) IT- 8t h Sem ( 4th Yr)
Enacted on 17th May
2000- India is 12th nation
in the world to adopt
cyber laws
IT Act is based on Model
law on e-commerce .
To provide legal recognition for transactions:-
 Carried out by means of electronic data
interchange, and other means of electronic
communication, commonly referred to as
"electronic commerce“
 To facilitate electronic filing of documents with
Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act
1891,Reserve Bank of India Act ,1934
Cyber crime is a generic term that refers to all
criminal activities done using the medium of
computers, the Internet, cyber space and the
worldwide web.
It is the act of tricking someone into giving
confidential information (like passwords and
credit card information) on a fake web page or email
form pretending to come from a legitimate company
(like their bank).
 A message is sent from the Phisher to the
user.
 A user provides confidential information to a
Phishing server.
 The Phishers obtains the confidential
information from the server.
 The confidential information is used to
impersonate the user.
 The Phishers obtains illicit monetary gain.
 Man-in-the-middle attacks
 URL Obfuscation Attacks
 The attacker sits between the customer and the
real web-based application, and proxies all
communications between the systems.
 This form of attack is successful for HTTP
communications.
 It involves minor changes to the URL, the fraudster
tricks the user to follow a hyperlink (URL) to the
attacker’s server, without the users realizing that
he has been duped.
 Unawareness among public
 Unawareness of policy
 Technical sophistication
 Lack of awareness regarding the phishing attacks
among the common masses.
 The users are unaware that their personal
information is actively being targeted by criminals.
 They do not take proper precautions when they
conduct online activities.
 Bank/financial institution policies.
 Procedures for contacting customers, particularly
for issues relating to account maintenance and
fraud investigation.
 The policies of an online transaction.
 URL obfuscation to make phishing emails.
 Web sites appear more legitimate.
 Execution of malicious code from a hostile web
site.
 The following Sections of the Information
Technology Act, 2000 are applicable to the
Phishing Activity:
 Section 66
 Section 66A
 Section 66C
 Section 66D
 The account of the victim is compromised by the
phisher which is not possible unless & until the
fraudster fraudulently effects some changes by way
of deletion or alteration of information/data
electronically in the account of the victim residing
in the bank server. Thus, this act is squarely
covered and punishable u/s 66 IT Act.
 The disguised email containing the fake link of the
bank or organization is used to deceive or to
mislead the recipient about the origin of such email
and thus, it clearly attracts the provisions of
Section 66A IT Act, 2000.
 In the phishing email, the fraudster disguises
himself as the real banker and uses the unique
identifying feature of the bank or organization say
Logo, trademark etc. and thus, clearly attracts the
provision of Section 66C IT Act, 2000.
 The fraudsters through the use of the phishing
email containing the link to the fake website of the
bank or organizations personates the Bank or
financial institutions to cheat upon the innocent
persons, thus the offence under Section 66D too is
attracted.
 A petition filed by an Abu Dhabi-based
NRI(Umashankar Sivasubramaniam), who claimed he
received an email in September 2007 from ICICI, asking
him to reply with his internet banking username and
password or else his account would become non-
existent.
 He replied, he found Rs 6.46 lakh transferred from his
account to that of a company, which withdrew Rs 4.6
lakh from an ICICI branch in Mumbai and retained
remaining balance in its account.
 But ICICI Bank claimed that the petitioner had
negligently disclosed the confidential information
such as password and had fallen prey to a phishing
fraud.
 A bank Spokeperson said "Customers are fully
appraised on security aspects of internet banking .
We reassure that our security systems are
continuously audited and neither the security nor
our processes have been breached."
 In his application for adjudication filed section 66,
66A,66C,66D under the IT Act to the state IT
secretary on June 26, 2008, he held the bank
responsible for the loss.
 Further, the Spokesperson said “we have hundreds
types of transactions, which can be completed
online without having to walk into a branch.
Customers get the best experience and a safe
environment while transacting online."
 Techno-legal consultant said “the order may lead
to tightening of cyber laws in the country,
"Phishing fraud is very common but banks are not
accepting the liabilities. It will set a good
precedent.“
 April 12, 2010, Tamil Nadu IT secretary directed
“ICICI Bank to pay Rs 12.85 lakh within 60 days for
the loss suffered by him due to a phishing fraud
incident involving fraudulent transfer of an amount
of Rs 6.46 lakh. “
 The compensation includes not only the loss
suffered by the petitioner, but also interest and
other expenses.
If you have provided account numbers, pin number,
password, login detail to the phisher, immediately
notify the bank with which you have the account so
that your accounts can’t be
compromised.
 Check your credit card and bank account statements
regularly and look for unauthorized transactions, even
small ones. Report discrepancies immediately .
 Ensure that your system has the current security
software applications like; anti-spam, anti-phishing,
anti-virus and anti-spyware etc.
 You must CALL Customer Support Service because in
case you find the email suspicious .
It act

More Related Content

What's hot

Internet banking
Internet bankingInternet banking
Internet banking
SHIVA MOTURI
 
Internet banking
Internet bankingInternet banking
Internet banking
Ranjeet Yadav
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
Ajilal
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
vishalhp123
 
Home banking final
Home banking finalHome banking final
Home banking final
mahesh patil
 
Paper presentation on internet banking
Paper presentation on internet bankingPaper presentation on internet banking
Paper presentation on internet banking
Suresh Kumar
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
Mahyuddin Khalid
 
Internet Banking in Malaysia
Internet Banking in MalaysiaInternet Banking in Malaysia
Internet Banking in Malaysia
yun6098
 
E banking
E bankingE banking
E banking
At home
 
E banking
E   bankingE   banking
E banking
Priyanka Shinde
 
Internet banking.
Internet banking.Internet banking.
Internet banking.
Rahul Prajapati
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
chethu6391
 
e-banking
e-bankinge-banking
e-banking
Anmol Marya
 
It act,2000
It act,2000It act,2000
It act,2000
Priya Kushwah
 
Online banking
Online bankingOnline banking
Online banking
purva kudalkar
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
sonali talkar
 

What's hot (20)

Internet banking
Internet bankingInternet banking
Internet banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Home banking final
Home banking finalHome banking final
Home banking final
 
Paper presentation on internet banking
Paper presentation on internet bankingPaper presentation on internet banking
Paper presentation on internet banking
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
 
Internet Banking in Malaysia
Internet Banking in MalaysiaInternet Banking in Malaysia
Internet Banking in Malaysia
 
E banking
E bankingE banking
E banking
 
E banking
E   bankingE   banking
E banking
 
Internet banking.
Internet banking.Internet banking.
Internet banking.
 
E banking security
E banking securityE banking security
E banking security
 
Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
e-banking
e-bankinge-banking
e-banking
 
It act,2000
It act,2000It act,2000
It act,2000
 
Online banking
Online bankingOnline banking
Online banking
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 

Viewers also liked

Researching the market place
Researching the market placeResearching the market place
Researching the market place
alexmathesonn
 
Question 7
Question 7Question 7
Question 7
alexmathesonn
 
Eventshot Location Based Instant Printing
Eventshot Location Based Instant PrintingEventshot Location Based Instant Printing
Eventshot Location Based Instant Printing
Sebastian Yoon
 
Cpc novo anotado
Cpc novo anotadoCpc novo anotado
Cpc novo anotado
Vanicleide Almeida
 
Primary and secondary research
Primary and secondary research Primary and secondary research
Primary and secondary research
alexmathesonn
 
Optimized Cacao Processing
Optimized Cacao ProcessingOptimized Cacao Processing
Optimized Cacao ProcessingSebastian Yoon
 
Deber tic
Deber ticDeber tic
Deber tic
JOSE LUIS
 
Presentazione gruppo echoes
Presentazione gruppo echoesPresentazione gruppo echoes
Presentazione gruppo echoesTheEchoes
 
Presentazione gruppo echoes
Presentazione gruppo echoesPresentazione gruppo echoes
Presentazione gruppo echoesTheEchoes
 
презентація мо
презентація мопрезентація мо
презентація моaleksvlad
 
бактерии
бактериибактерии
бактерииapanaschik
 
презентация методичного об'єднання вчителів хімії та біології
презентация методичного об'єднання вчителів хімії та біологіїпрезентация методичного об'єднання вчителів хімії та біології
презентация методичного об'єднання вчителів хімії та біологіїaleksvlad
 
Rumah betang (2)
Rumah betang (2)Rumah betang (2)
Rumah betang (2)
Livie Tamariska
 

Viewers also liked (13)

Researching the market place
Researching the market placeResearching the market place
Researching the market place
 
Question 7
Question 7Question 7
Question 7
 
Eventshot Location Based Instant Printing
Eventshot Location Based Instant PrintingEventshot Location Based Instant Printing
Eventshot Location Based Instant Printing
 
Cpc novo anotado
Cpc novo anotadoCpc novo anotado
Cpc novo anotado
 
Primary and secondary research
Primary and secondary research Primary and secondary research
Primary and secondary research
 
Optimized Cacao Processing
Optimized Cacao ProcessingOptimized Cacao Processing
Optimized Cacao Processing
 
Deber tic
Deber ticDeber tic
Deber tic
 
Presentazione gruppo echoes
Presentazione gruppo echoesPresentazione gruppo echoes
Presentazione gruppo echoes
 
Presentazione gruppo echoes
Presentazione gruppo echoesPresentazione gruppo echoes
Presentazione gruppo echoes
 
презентація мо
презентація мопрезентація мо
презентація мо
 
бактерии
бактериибактерии
бактерии
 
презентация методичного об'єднання вчителів хімії та біології
презентация методичного об'єднання вчителів хімії та біологіїпрезентация методичного об'єднання вчителів хімії та біології
презентация методичного об'єднання вчителів хімії та біології
 
Rumah betang (2)
Rumah betang (2)Rumah betang (2)
Rumah betang (2)
 

Similar to It act

NET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptxNET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptx
RohanPanda8
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
sambaba17
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Raja Farhan Saeed
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
Saranya Babu Rajendran
 
Presentation Banking
Presentation BankingPresentation Banking
Presentation Banking
Ria Tandon
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
Rakesh Otari
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Varsha Mali
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
HetaDesai13
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
jaldumanohar manohar
 
Pre itact
Pre itactPre itact
Pre itact
Akash Maheshwari
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
Khushbu Chudasama
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Rini Mahade
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Anusha Kadayyanmath
 
E Banking
E BankingE Banking
E Banking
cssangoram
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
Pooja Rani
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
RithikaD1
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
Rahuljain40418
 

Similar to It act (20)

NET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptxNET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptx
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
 
Presentation Banking
Presentation BankingPresentation Banking
Presentation Banking
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
 
Pre itact
Pre itactPre itact
Pre itact
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
E Banking
E BankingE Banking
E Banking
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 

It act

  • 1. YAGYAVALKYA INSTITUTE OF TECHNOLOGY Submitted To: Submitted By: Mr. Manish Dave Abhilasha Agarwal (Asst. Professor CS & IT) IT- 8t h Sem ( 4th Yr)
  • 2. Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws IT Act is based on Model law on e-commerce .
  • 3. To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 4. Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web.
  • 5. It is the act of tricking someone into giving confidential information (like passwords and credit card information) on a fake web page or email form pretending to come from a legitimate company (like their bank).
  • 6.  A message is sent from the Phisher to the user.  A user provides confidential information to a Phishing server.  The Phishers obtains the confidential information from the server.  The confidential information is used to impersonate the user.  The Phishers obtains illicit monetary gain.
  • 7.  Man-in-the-middle attacks  URL Obfuscation Attacks
  • 8.  The attacker sits between the customer and the real web-based application, and proxies all communications between the systems.  This form of attack is successful for HTTP communications.
  • 9.  It involves minor changes to the URL, the fraudster tricks the user to follow a hyperlink (URL) to the attacker’s server, without the users realizing that he has been duped.
  • 10.  Unawareness among public  Unawareness of policy  Technical sophistication
  • 11.  Lack of awareness regarding the phishing attacks among the common masses.  The users are unaware that their personal information is actively being targeted by criminals.  They do not take proper precautions when they conduct online activities.
  • 12.  Bank/financial institution policies.  Procedures for contacting customers, particularly for issues relating to account maintenance and fraud investigation.  The policies of an online transaction.
  • 13.  URL obfuscation to make phishing emails.  Web sites appear more legitimate.  Execution of malicious code from a hostile web site.
  • 14.  The following Sections of the Information Technology Act, 2000 are applicable to the Phishing Activity:  Section 66  Section 66A  Section 66C  Section 66D
  • 15.  The account of the victim is compromised by the phisher which is not possible unless & until the fraudster fraudulently effects some changes by way of deletion or alteration of information/data electronically in the account of the victim residing in the bank server. Thus, this act is squarely covered and punishable u/s 66 IT Act.
  • 16.  The disguised email containing the fake link of the bank or organization is used to deceive or to mislead the recipient about the origin of such email and thus, it clearly attracts the provisions of Section 66A IT Act, 2000.
  • 17.  In the phishing email, the fraudster disguises himself as the real banker and uses the unique identifying feature of the bank or organization say Logo, trademark etc. and thus, clearly attracts the provision of Section 66C IT Act, 2000.
  • 18.  The fraudsters through the use of the phishing email containing the link to the fake website of the bank or organizations personates the Bank or financial institutions to cheat upon the innocent persons, thus the offence under Section 66D too is attracted.
  • 19.  A petition filed by an Abu Dhabi-based NRI(Umashankar Sivasubramaniam), who claimed he received an email in September 2007 from ICICI, asking him to reply with his internet banking username and password or else his account would become non- existent.  He replied, he found Rs 6.46 lakh transferred from his account to that of a company, which withdrew Rs 4.6 lakh from an ICICI branch in Mumbai and retained remaining balance in its account.
  • 20.  But ICICI Bank claimed that the petitioner had negligently disclosed the confidential information such as password and had fallen prey to a phishing fraud.  A bank Spokeperson said "Customers are fully appraised on security aspects of internet banking . We reassure that our security systems are continuously audited and neither the security nor our processes have been breached."
  • 21.  In his application for adjudication filed section 66, 66A,66C,66D under the IT Act to the state IT secretary on June 26, 2008, he held the bank responsible for the loss.  Further, the Spokesperson said “we have hundreds types of transactions, which can be completed online without having to walk into a branch. Customers get the best experience and a safe environment while transacting online."
  • 22.  Techno-legal consultant said “the order may lead to tightening of cyber laws in the country, "Phishing fraud is very common but banks are not accepting the liabilities. It will set a good precedent.“  April 12, 2010, Tamil Nadu IT secretary directed “ICICI Bank to pay Rs 12.85 lakh within 60 days for the loss suffered by him due to a phishing fraud incident involving fraudulent transfer of an amount of Rs 6.46 lakh. “
  • 23.  The compensation includes not only the loss suffered by the petitioner, but also interest and other expenses.
  • 24.
  • 25. If you have provided account numbers, pin number, password, login detail to the phisher, immediately notify the bank with which you have the account so that your accounts can’t be compromised.
  • 26.  Check your credit card and bank account statements regularly and look for unauthorized transactions, even small ones. Report discrepancies immediately .  Ensure that your system has the current security software applications like; anti-spam, anti-phishing, anti-virus and anti-spyware etc.  You must CALL Customer Support Service because in case you find the email suspicious .