SlideShare a Scribd company logo
Prepared by
Dr. K.RAJESWARI
Associate Professor
Avinash Degree College
Affiliated by Osmania University
Kukatpally, Hyderabad
BUSINESS LAW
UNIT 3
Information Laws and RTE
Information law and RTE: Right to Information Act, 2005: Objectives of the RTI Act, Scope, SuoMoto disclosure, Method of
seeking information, Eligibility to obtain information, Authorities under the Act.
Syllabus
To have in depth knowledge about RTI AND RTE
LEARNING OBJECTIVES
 Important case reference should be dealt where ever possible
 Latest cyber crime should to discussed either through images or videos
 Important definitions relating to IT and Cyber crimes to be discussed
METHODOLOGY
CYBER LAWS 1999 AND
INFORMATION TECHNOLOGY
ACT, 2000
• GROWTH OF CYBER SPACE
• USES OF INTERNET
• CYBER LAW OR LAW OF INTERNET
INTRODUCTION
• To TACKLE CYBER CRIMES
• INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
NEED FOR CYBER LAWS
 IT ACT PASSED IN 2000
 INTERNET IN INDIA
 IMPLEMENTATION OF CYBER LAW
The IT Act 2000 chiefly covers:
(a) E-Commerce in India.
(b) E-Governance in India.
(c) Cyber Contraventions.
(d) Cyber Crimes.
CYBER LAWS IN INDIA
 To provide for legal recognition of electronic records and digital signatures.
 To prevent the possible mis-use arising out of transactions and other dealings concluded over the electronic medium.
 To create civil and criminal liabilities for contravention of the provisions of the Information Laws and RTE 143 proposed
legislation.
 To provide for the use and acceptance of electronic records and digital signatures in the Government offices and its agencies
 To facilitate electronic storage of information and data.
 To facilitate electronic fund transfers between financial Institutions and banks.
 To give legal sanctity for books of account maintained in the electronic form by the banks.
Objectives of IT Acts
The World Trade Organization defines e-commerce as, “e-commerce is the production, distribution, marketing, sales or delivery of
goods and services by electronic means”.
e-commerce
 Convenience of shopping at home
 Gives freedom to make choices
 Increase in variety of goods
 It gives more choice and alternatives
 Ensure Secrecy
 Time compression
 E-payment system
 Provide Comparison Shopping
Benefits of E-Commerce to Consumers
• It helps to reach Global
• Cost effective
• New Customers With Search Engine Visibility
• It Reduces the Paper Costs
• Reduction in Inventories
• Mass Customization and Competitive advantage
• No Middlemen:
• Reduced Production lead Time:
• Improved Customer relationship
• Lower Sale and Marketing Costs
Benefits of E-Commerce to Businesses
• Enables More Flexible Working Practices
• Connects People
• Facilitates Delivery of Public Services
Benefits of E-Commerce to Society
Advantages of E-Commerce
Lower Transaction Costs
Larger Purchases Per Transaction
Integration into the Business Cycle
Larger Catalogues
Improved Customer Interactions
Disadvantages of Electronic Commerce
Ecommerce Lacks That Personal Touch
System and data integrit
Ecommerce Delays Goods
System scalability
Dependent on internet
Many Goods Cannot Be Purchased Online
Products people won’t buy online
Loyal customers
Shopping is Social Experience
HOW DO E-COMMERCE SITES MAKE MONEY?
PAPERLESS SOCIETY
“Affixing digital signature” has been defined in
section 2(1)(d) of the Act to mean adoption of any methodology
or procedure by a person for the purpose
of authenticating an electronic record by means of “digital signature”.
DIGITAL SIGNATURE AND ITS NEED
PIRACY
Why Piracy takes place
 Provision for Software Patent
 Software copy write
 Infringement of copy rights
Other related provisions under the Act
 Privacy
 Security
 Symantec
Related Offenses under the Act
 Cyber crime
LEGAL ASPECT OF CYBER CRIME
• ATM System Hacked in Kolkata
• In July 2018 fraudsters hacked into Canara bank ATM servers and wiped off almost 20 lakh rupees from different
bank accounts. The number of victims was over 50 and it was believed that they were holding the account details of
more than 300 ATM users across India.
• The hackers used skimming devices on ATMs to steal the information of debit card holders and made a minimum
transaction of INR 10,000 and the maximum of INR 40,000 per account.
• On 5 August 2018, two men were arrested in New Delhi who was working with an international gang that uses
skimming activities to extract the details of bank account.
• Prevention: Enhancement of the security features in ATM and ATM monitoring systems can prevent any misuse of
data.
• Another way to prevent the fraudulent activity is to minimize the risk of skimming by using lockbox services to
receive and transfer money safely.
• This uses an encrypted code which is safer than any other payments.
• ‘Friendship 'on Facebook ends in blackmail plot against
woman
GHAZIABAD: A 31-year-old woman has filed a complaint against a man, who introduced himself as an
Indian living in Austria of blackmailing her by posting some personal photographs and videos which she
shared with him on social media website.
The complainant, a resident of Raj Nagar Extension, told old police that the man identified himself
as Aniket Sharma and she met him through Facebook.
he woman, who is married, also said that she started talking to him out of sympathy after he told her that he was
suffering from cancer
.
OFFENCES AND LAWS IN CYBER SPACE
 Section 65: Tampering with computer source documents
 Section 66: Hacking with computer system
 Section 67: Publishing of information which is obscene in electronic form
 Section 68: Power of controller to give directions
 Section 69: Directions of Controller to subscriber to extend facilities to decrypt
information –
 Section 70: Protected system
 Section 71: Penalty for misrepresentation
 Section 72: Penalty for breach of confidentiality and privacy
 Section 73: Penalty for publishing Digital Signature Certificate false in certain
particulars
 Section 74: Publication for fraudulent purpose –
 Section 75: Act to apply for offence or contravention committed outside India
 Section 76: Confiscation
 Section 77: Penalties or confiscation not to interfere with other punishments
 Section 78: Power to investigate offences –
 Section 79: Network service providers not to be liable in certain cases
 INDIAN PENAL CODE,1860
 INDIAN EVIDENCE ACT,1872
 BANKER’S BOOK EVIDENCE ACT,1891
 GENERAL CLAUSES ACT,1897
CYBER LAWS AMENDMENTS
 Enacted and came in force on 15th June 2005
 Main aim is to provide a right information for citizens
 It is replacement of Freedom of Information Act, 2002
INFORMATION TECHNOLOGY (IT)
Meaning
Information is any material in any form. It includes records, documents, memos, emails, opinions, advices, press releases,
circulars, orders, logbooks, contracts, reports, papers, samples, models, data material held in any electronic form. It also includes
information relating to any private body which can be accessed by the public authority under any law for the time being in force.
Scope
The Act covers the whole of India except Jammu and Kashmir, where J&K Right to Information Act is in force. It is applicable to all
constitutional authorities, including the executive, legislature and judiciary; any institution or body established or constituted by an
act of Parliament or a state legislature.
Suo Motu Disclosure
The Act makes it obligatory for every public authority to make suo-motu disclosure in respect of the particulars of its organization,
functions, duties etc. as provided in section 4 of the Act. Besides, some public authorities under the Central Government have
published other information and have posted them on their websites.
Information
 Suo motu disclosure of more items under Section 4 Sub-section 4(2) of the RTI Act, 2005
• Information related to Procurement
• Public Private Partnerships
• Transfer Policy and Transfer Orders
• RTI Applications
• CAG & PAC paras
• Citizens Charter
• Discretionary and Non-discretionary grants
• Foreign Tours of PM/Ministers
 Guidelines for digital publication of proactive disclosure under Section 4
 Guidelines for certain clauses of Sec. 4(1)(b) to make disclosure more effective
 Compliance with Provisions of suo motu (proactive) disclosure under the RTI Act
 Nodal Officer
 Annual Reports to Parliament/Legislatures
GUIDELINES ON SUO MOTU DISCLOSURE UNDER SEC. 4 OF THE RTI ACT
 All citizen have the right
 Sections 8 and 9 of the Act enumerate the categories of information which are exempt from disclosure.
 Central Public Information Officers
 Assistance Available From CPIOs
 Format of Application
 Disposal of the Request
 First Appeal
 Second Appeal
 Complaints
 Disposal of Appeals and Complaints by the CIC
 Important Web-sites
Who is eligible to get information?/ Exemptions from Disclosure
RIGHT TO EDUCATION (RTE)
“Education has a characteristic quality that enables it
to be present in and to nourish all areas of life. The
interconnectedness of human rights is nowhere more
obvious than in educational processes, so the right to
education is, moreover, an individual guarantee and a
social right which is fully expressed by the individual
in the exercise of his or her citizenship”.
OBJECTIVES OF RTE
Acknowledgement
Special thanks to Dr. R.G Saha, Vision Book House

More Related Content

What's hot

Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docxDr. Arun Verma
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 

What's hot (20)

Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Class it act
Class it actClass it act
Class it act
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
it act
it act it act
it act
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Information technology act
Information technology actInformation technology act
Information technology act
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 

Similar to Raji unit3 ppt_blaw_bba.ppt

Similar to Raji unit3 ppt_blaw_bba.ppt (20)

INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
IT Act
IT ActIT Act
IT Act
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Information and Technology Act
Information and Technology ActInformation and Technology Act
Information and Technology Act
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Pre itact
Pre itactPre itact
Pre itact
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber
CyberCyber
Cyber
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismDeeptiGupta154
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationDelapenabediema
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasGeoBlogs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativePeter Windle
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 

Recently uploaded (20)

B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Raji unit3 ppt_blaw_bba.ppt

  • 1. Prepared by Dr. K.RAJESWARI Associate Professor Avinash Degree College Affiliated by Osmania University Kukatpally, Hyderabad BUSINESS LAW
  • 3. Information law and RTE: Right to Information Act, 2005: Objectives of the RTI Act, Scope, SuoMoto disclosure, Method of seeking information, Eligibility to obtain information, Authorities under the Act. Syllabus
  • 4. To have in depth knowledge about RTI AND RTE LEARNING OBJECTIVES
  • 5.  Important case reference should be dealt where ever possible  Latest cyber crime should to discussed either through images or videos  Important definitions relating to IT and Cyber crimes to be discussed METHODOLOGY
  • 6. CYBER LAWS 1999 AND INFORMATION TECHNOLOGY ACT, 2000
  • 7. • GROWTH OF CYBER SPACE • USES OF INTERNET • CYBER LAW OR LAW OF INTERNET INTRODUCTION
  • 8. • To TACKLE CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT NEED FOR CYBER LAWS
  • 9.  IT ACT PASSED IN 2000  INTERNET IN INDIA  IMPLEMENTATION OF CYBER LAW The IT Act 2000 chiefly covers: (a) E-Commerce in India. (b) E-Governance in India. (c) Cyber Contraventions. (d) Cyber Crimes. CYBER LAWS IN INDIA
  • 10.  To provide for legal recognition of electronic records and digital signatures.  To prevent the possible mis-use arising out of transactions and other dealings concluded over the electronic medium.  To create civil and criminal liabilities for contravention of the provisions of the Information Laws and RTE 143 proposed legislation.  To provide for the use and acceptance of electronic records and digital signatures in the Government offices and its agencies  To facilitate electronic storage of information and data.  To facilitate electronic fund transfers between financial Institutions and banks.  To give legal sanctity for books of account maintained in the electronic form by the banks. Objectives of IT Acts
  • 11. The World Trade Organization defines e-commerce as, “e-commerce is the production, distribution, marketing, sales or delivery of goods and services by electronic means”. e-commerce
  • 12.  Convenience of shopping at home  Gives freedom to make choices  Increase in variety of goods  It gives more choice and alternatives  Ensure Secrecy  Time compression  E-payment system  Provide Comparison Shopping Benefits of E-Commerce to Consumers
  • 13. • It helps to reach Global • Cost effective • New Customers With Search Engine Visibility • It Reduces the Paper Costs • Reduction in Inventories • Mass Customization and Competitive advantage • No Middlemen: • Reduced Production lead Time: • Improved Customer relationship • Lower Sale and Marketing Costs Benefits of E-Commerce to Businesses
  • 14. • Enables More Flexible Working Practices • Connects People • Facilitates Delivery of Public Services Benefits of E-Commerce to Society
  • 15. Advantages of E-Commerce Lower Transaction Costs Larger Purchases Per Transaction Integration into the Business Cycle Larger Catalogues Improved Customer Interactions Disadvantages of Electronic Commerce Ecommerce Lacks That Personal Touch System and data integrit Ecommerce Delays Goods System scalability Dependent on internet Many Goods Cannot Be Purchased Online Products people won’t buy online Loyal customers Shopping is Social Experience
  • 16. HOW DO E-COMMERCE SITES MAKE MONEY?
  • 18. “Affixing digital signature” has been defined in section 2(1)(d) of the Act to mean adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of “digital signature”. DIGITAL SIGNATURE AND ITS NEED
  • 19. PIRACY Why Piracy takes place  Provision for Software Patent  Software copy write  Infringement of copy rights Other related provisions under the Act  Privacy  Security  Symantec Related Offenses under the Act  Cyber crime
  • 20. LEGAL ASPECT OF CYBER CRIME
  • 21. • ATM System Hacked in Kolkata • In July 2018 fraudsters hacked into Canara bank ATM servers and wiped off almost 20 lakh rupees from different bank accounts. The number of victims was over 50 and it was believed that they were holding the account details of more than 300 ATM users across India. • The hackers used skimming devices on ATMs to steal the information of debit card holders and made a minimum transaction of INR 10,000 and the maximum of INR 40,000 per account. • On 5 August 2018, two men were arrested in New Delhi who was working with an international gang that uses skimming activities to extract the details of bank account. • Prevention: Enhancement of the security features in ATM and ATM monitoring systems can prevent any misuse of data. • Another way to prevent the fraudulent activity is to minimize the risk of skimming by using lockbox services to receive and transfer money safely. • This uses an encrypted code which is safer than any other payments.
  • 22. • ‘Friendship 'on Facebook ends in blackmail plot against woman GHAZIABAD: A 31-year-old woman has filed a complaint against a man, who introduced himself as an Indian living in Austria of blackmailing her by posting some personal photographs and videos which she shared with him on social media website. The complainant, a resident of Raj Nagar Extension, told old police that the man identified himself as Aniket Sharma and she met him through Facebook. he woman, who is married, also said that she started talking to him out of sympathy after he told her that he was suffering from cancer .
  • 23. OFFENCES AND LAWS IN CYBER SPACE  Section 65: Tampering with computer source documents  Section 66: Hacking with computer system  Section 67: Publishing of information which is obscene in electronic form  Section 68: Power of controller to give directions  Section 69: Directions of Controller to subscriber to extend facilities to decrypt information –  Section 70: Protected system  Section 71: Penalty for misrepresentation  Section 72: Penalty for breach of confidentiality and privacy  Section 73: Penalty for publishing Digital Signature Certificate false in certain particulars  Section 74: Publication for fraudulent purpose –  Section 75: Act to apply for offence or contravention committed outside India  Section 76: Confiscation  Section 77: Penalties or confiscation not to interfere with other punishments  Section 78: Power to investigate offences –  Section 79: Network service providers not to be liable in certain cases
  • 24.  INDIAN PENAL CODE,1860  INDIAN EVIDENCE ACT,1872  BANKER’S BOOK EVIDENCE ACT,1891  GENERAL CLAUSES ACT,1897 CYBER LAWS AMENDMENTS
  • 25.  Enacted and came in force on 15th June 2005  Main aim is to provide a right information for citizens  It is replacement of Freedom of Information Act, 2002 INFORMATION TECHNOLOGY (IT)
  • 26. Meaning Information is any material in any form. It includes records, documents, memos, emails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, data material held in any electronic form. It also includes information relating to any private body which can be accessed by the public authority under any law for the time being in force. Scope The Act covers the whole of India except Jammu and Kashmir, where J&K Right to Information Act is in force. It is applicable to all constitutional authorities, including the executive, legislature and judiciary; any institution or body established or constituted by an act of Parliament or a state legislature. Suo Motu Disclosure The Act makes it obligatory for every public authority to make suo-motu disclosure in respect of the particulars of its organization, functions, duties etc. as provided in section 4 of the Act. Besides, some public authorities under the Central Government have published other information and have posted them on their websites. Information
  • 27.  Suo motu disclosure of more items under Section 4 Sub-section 4(2) of the RTI Act, 2005 • Information related to Procurement • Public Private Partnerships • Transfer Policy and Transfer Orders • RTI Applications • CAG & PAC paras • Citizens Charter • Discretionary and Non-discretionary grants • Foreign Tours of PM/Ministers  Guidelines for digital publication of proactive disclosure under Section 4  Guidelines for certain clauses of Sec. 4(1)(b) to make disclosure more effective  Compliance with Provisions of suo motu (proactive) disclosure under the RTI Act  Nodal Officer  Annual Reports to Parliament/Legislatures GUIDELINES ON SUO MOTU DISCLOSURE UNDER SEC. 4 OF THE RTI ACT
  • 28.  All citizen have the right  Sections 8 and 9 of the Act enumerate the categories of information which are exempt from disclosure.  Central Public Information Officers  Assistance Available From CPIOs  Format of Application  Disposal of the Request  First Appeal  Second Appeal  Complaints  Disposal of Appeals and Complaints by the CIC  Important Web-sites Who is eligible to get information?/ Exemptions from Disclosure
  • 29. RIGHT TO EDUCATION (RTE) “Education has a characteristic quality that enables it to be present in and to nourish all areas of life. The interconnectedness of human rights is nowhere more obvious than in educational processes, so the right to education is, moreover, an individual guarantee and a social right which is fully expressed by the individual in the exercise of his or her citizenship”.
  • 31.
  • 32. Acknowledgement Special thanks to Dr. R.G Saha, Vision Book House