SlideShare a Scribd company logo
L E T ’ S F A C E I T : T H E F U T U R E I S N O W
Cyber Laws
FIRST THOUGHT
What is cyber crime
Cybercrime is a crime that involves a
computer and a network.
The computer may have been used in the
commission of a crime, or it may
be the target. Cybercrime may harm
someone's security and financial health.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
It may use a device to access user’s
Personal information
Confidential business information
Government information and
 disable a device
It also a cyber crime when the above information is being sold.
HISTORY OF CYBER CRIME
The first recorded cyber crime was in year 1820
The 1st case of use of computer theft in 1973. A
teller at local New York bank used a computer
to embezzle over$2 million dollars.
 The first spam email took place in 1978 when
it was sent over the Arpanet.
The first virus was installed on apple computer
in 1982
First person to convicted a cyber crime
In 1981 LAN MURPHY KNOWN AS CAPTAIN ZAP TO
HIS FANS BEEN 1ST to convicted crime
He hacked into the AT&T network and changed
the internal clock to change off the hours rates of
peak times
He received 1000hours of community service and
2.5 years of probation, a mere slap on the wrist
compared to today’s penalties , and was the
inspiration for the movie sneakers.
Categories of cyber crime
The computer as a
target – using a
computer ,e.g.
Hacking,
virus/worms
attacks ,Dos attack
etc.
The computer as
weapon- using a
computer to
commit real world
crime e.g. cyber
terrorism , credit
card fraud and
pornography etc.,
TYPES OF CYBER CRIME
Hacking – Illegal intrusion into a computer system and
network known as CRACKING. Though hackers enjoy the
media coverage.
Motive behind the hackers - Greed, Publicity, revenge ,
adventure to access forbidden information.
OTHER TYPES OF CYBER CRIME
>Dental and service attacks
>Virus dissemination
>Computer vandalism
>Cyber terrorism >Software piracy
Law that uses to protect cyber assets is cyber law or
cyber security.
Cyber security is
to protect system
or cyber assets
Cyber law is to
protect system or
cyber assets in legal
way
Roles of Cyber law in India
FRAUD
COPYRIGHT
HARASSMENT AND
STALKING
FREEDOM OF SPEECH
Trade secrets
s
In India cyber law was
contained in the
information technology
Act, 2000 (“IT Act)” NO21
of 2000 notified notified
on 17 October 2000.
It is the primary law in India dealing with dealing with cyber
crime and electronic commerce
ETHICAL HACKING
Citation Information
Technology Act, 2000
Enacted by Parliament of India
Enacted 9 June 2000
Assented to 9 June 2000
Signed 9 May 2000
 Commenced 17 October 2000
Introduced by Pramod Mahajan Minister
of Communications and Information Technology
What are the key points of IT Act 2000?
The Act provides a legal framework for electronic
governance by giving recognition to electronic
records and digital signatures. It also defines cyber
crimes and prescribes penalties for them. The Act
directed the formation of a Controller of Certify
Authorities to regulate the issuance of digital
signatures.
Information Technology Amendment Act 2008 (IT 2008)
The Information Technology Amendment Act, 2008
(IT Act 2008) is a substantial addition to India's
Information Technology Act (ITA- 2000). The IT
Amendment Act was passed by the Indian
Parliament in October 2008 and came into force a
year later.
WHY WAS IT Act, 2000 amended in 2008?
• The IT Amendment Act was passed by the Indian Parliament in
October 2008 and came into force a year later.
• The Amendment was created to address issues that the original
bill failed to cover and to accommodate further development of
IT and related security concerns
since the original law was passed.
What are the major changes made in the amendment of
IT Act in 2008?
Section 66A - Sending of offensive or false
messages
Section 66B - receiving
stolen computer resource
S
Section 66C - Identity theft
Section 66D - Cheating by personation
Section 66E - violation of privacy
Monitor
any
DISCREEPANCY
ssssssssss
Facility in E-Filing of
Document
For restricting electronic crime where power in
hands of RBI,IPO and Indiance evidence act
Provisions of information
technology act 2000
Provisions of Information Technology
Act 2000
Section
65 Destroy of
computer
source code
Section 67,67A,67B Publishing obscene
Section 67C Failure
to maintain records
Punishment
(Imprisonment up
to 3 years or with
fine or both)
Section 69
Decrypt of
data
Section 72 and 72A Breach of Confidentiality
and Privacy
Final Thoughts
Final Thoughts
ppt cyber law 1.pptx
ppt cyber law 1.pptx

More Related Content

Similar to ppt cyber law 1.pptx

Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
AshutoshNegi29
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
ManoharManu993491
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
It legislation
It legislationIt legislation
It legislation
doogstone
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
AashiGupta46
 
Introduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) Fundamentals
Toño Herrera
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
100688767-barrett
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
Mayuresh Patil
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
mohdadil02912
 

Similar to ppt cyber law 1.pptx (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
It legislation
It legislationIt legislation
It legislation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Introduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) Fundamentals
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 

Recently uploaded

V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 

Recently uploaded (20)

V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 

ppt cyber law 1.pptx

  • 1. L E T ’ S F A C E I T : T H E F U T U R E I S N O W Cyber Laws
  • 3. What is cyber crime Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.
  • 4. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. It may use a device to access user’s Personal information Confidential business information Government information and  disable a device It also a cyber crime when the above information is being sold.
  • 5. HISTORY OF CYBER CRIME The first recorded cyber crime was in year 1820 The 1st case of use of computer theft in 1973. A teller at local New York bank used a computer to embezzle over$2 million dollars.  The first spam email took place in 1978 when it was sent over the Arpanet. The first virus was installed on apple computer in 1982
  • 6. First person to convicted a cyber crime In 1981 LAN MURPHY KNOWN AS CAPTAIN ZAP TO HIS FANS BEEN 1ST to convicted crime He hacked into the AT&T network and changed the internal clock to change off the hours rates of peak times He received 1000hours of community service and 2.5 years of probation, a mere slap on the wrist compared to today’s penalties , and was the inspiration for the movie sneakers.
  • 7. Categories of cyber crime The computer as a target – using a computer ,e.g. Hacking, virus/worms attacks ,Dos attack etc.
  • 8. The computer as weapon- using a computer to commit real world crime e.g. cyber terrorism , credit card fraud and pornography etc.,
  • 9. TYPES OF CYBER CRIME Hacking – Illegal intrusion into a computer system and network known as CRACKING. Though hackers enjoy the media coverage. Motive behind the hackers - Greed, Publicity, revenge , adventure to access forbidden information.
  • 10. OTHER TYPES OF CYBER CRIME >Dental and service attacks >Virus dissemination >Computer vandalism >Cyber terrorism >Software piracy
  • 11. Law that uses to protect cyber assets is cyber law or cyber security.
  • 12. Cyber security is to protect system or cyber assets Cyber law is to protect system or cyber assets in legal way
  • 13. Roles of Cyber law in India FRAUD
  • 14.
  • 16.
  • 20. s In India cyber law was contained in the information technology Act, 2000 (“IT Act)” NO21 of 2000 notified notified on 17 October 2000. It is the primary law in India dealing with dealing with cyber crime and electronic commerce ETHICAL HACKING
  • 21. Citation Information Technology Act, 2000 Enacted by Parliament of India Enacted 9 June 2000 Assented to 9 June 2000 Signed 9 May 2000  Commenced 17 October 2000 Introduced by Pramod Mahajan Minister of Communications and Information Technology
  • 22. What are the key points of IT Act 2000? The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certify Authorities to regulate the issuance of digital signatures.
  • 23. Information Technology Amendment Act 2008 (IT 2008) The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA- 2000). The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later.
  • 24. WHY WAS IT Act, 2000 amended in 2008? • The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. • The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed.
  • 25. What are the major changes made in the amendment of IT Act in 2008? Section 66A - Sending of offensive or false messages Section 66B - receiving stolen computer resource
  • 26. S Section 66C - Identity theft Section 66D - Cheating by personation Section 66E - violation of privacy
  • 27.
  • 28.
  • 29.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Facility in E-Filing of Document
  • 39. For restricting electronic crime where power in hands of RBI,IPO and Indiance evidence act
  • 40. Provisions of information technology act 2000 Provisions of Information Technology Act 2000
  • 43. Section 67C Failure to maintain records Punishment (Imprisonment up to 3 years or with fine or both)
  • 45. Section 72 and 72A Breach of Confidentiality and Privacy
  • 46.