SlideShare a Scribd company logo
1 of 11
Scope & Objectives of
IT Act 2000
Presented By
Anjali Singh
Poonam Nishad
Introduction
• The electronic transaction like other parts of the globe, are in
popular in India, however they were without legal security before
the establishment of IT Act 2000.
• The increasing growth of the electronic commerce, popularity called
E-Commerce, made it compulsory to have legal protection to such
transaction.
• The Indian parliaments took a important step by passing the
Information Technology Act, 2000.
Objective of IT Act
This IT Act has the following Objects:
• Granting legal recognition to all transactions done through
electronic data exchange, other means of electronic communication
or e-commerce in place of the earlier paper-based communication.
• To give legal recognition to digital signature for accepting any
agreement via computer.
• Facilitate the electronic filing of documents with Government
agencies and also departments.
Objective Conti…
• According to I.T. Act 2000, any company can store their data in
electronic storage.
• To stop computer crime and protect privacy of internet users.
• To give legal recognition for keeping books of accounts by bankers
and other companies in electronic form.
• To provide facility of filling document online relating to school
admission or registration in employment exchange.
Features of IT Act 2000
Following are the features of IT Act, 2000:
• All electronic contracts made through secure electronic channels
are legally valid.
• Legal recognition for digital signatures.
• Security measures for electronic records and also digital signatures
are in place
• The Act applies to offences or contraventions committed outside
India
Scope of IT Act 2000
• Information Technology Act 2000 is not applicable on the attestation
for creating trust via electronic way. Physical attestation is must.
• IT Act 2000 is not applicable on the attestation for making will of
any body. Physical attestation by two witness is must.
• A contract of sale of any immovable property.
• Attestation for giving power of attorney of property is not possible
via electronic record.
Applicability of Act
• According to Section 1 (2), the Act extends to the entire country, which
also includes Jammu and Kashmir.
• Section 1 (2) along with Section 75, specifies that the Act is applicable to
any offence or contravention committed outside India as well.
• If the conduct of person constituting the offence involves a computer or a
computerized system or network located in India, then irrespective of
his/her nationality, the person is punishable under the Act.
Non-applicability of Act
This Act is not applicable to the following documents:
• Execution of a Power of Attorney under the Powers of Attorney Act,
1882.
• Creation of Trust under the Indian Trust Act, 1882.
• Execution of Negotiable Instrument under Negotiable Instruments
Act, 1881, except cheques.
• Entering into a contract for the sale of conveyance of immovable
property or any interest in such property.
Advantages
• Helpful to promote e-commerce.
• Enhance the corporate business.
• High penalty for cyber crime.
• Filling online forms.
Shortcoming of IT Act 2000
• Infringement of copyright has not been included in this law.
• No protection for domain names.
• Act is silent on taxation.
• The act is not applicable on the power of attorney, trust and will.
References:
https://www.tutorialspoint.com/information_security_cyber_law/information_technolo
gy_act.htm
https://www.toppr.com/guides/business-laws-cs/cyber-laws/information-technology-
act-2000/
THANK YOU!

More Related Content

What's hot

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Doctrine of Indoor Management
Doctrine of Indoor ManagementDoctrine of Indoor Management
Doctrine of Indoor ManagementBhargav Dangar
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Drafting And Conveyancing: An overview
Drafting And Conveyancing: An overviewDrafting And Conveyancing: An overview
Drafting And Conveyancing: An overviewPrerna Foundation
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Transfer of property act 1882 who can transfer
Transfer of property  act 1882 who can transferTransfer of property  act 1882 who can transfer
Transfer of property act 1882 who can transferDr. Vikas Khakare
 
Admissibility of electronic evidence in india
Admissibility of electronic evidence in indiaAdmissibility of electronic evidence in india
Admissibility of electronic evidence in indiaAltacit Global
 

What's hot (20)

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
It act 2000
It act 2000It act 2000
It act 2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Rights of surety
Rights of suretyRights of surety
Rights of surety
 
Doctrine of Indoor Management
Doctrine of Indoor ManagementDoctrine of Indoor Management
Doctrine of Indoor Management
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Drafting And Conveyancing: An overview
Drafting And Conveyancing: An overviewDrafting And Conveyancing: An overview
Drafting And Conveyancing: An overview
 
It act 2000
It act 2000It act 2000
It act 2000
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Transfer of property act 1882 who can transfer
Transfer of property  act 1882 who can transferTransfer of property  act 1882 who can transfer
Transfer of property act 1882 who can transfer
 
Admissibility of electronic evidence in india
Admissibility of electronic evidence in indiaAdmissibility of electronic evidence in india
Admissibility of electronic evidence in india
 

Similar to Scope & Objectives of IT Act 2000.pptx

IT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptxIT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptx227Stijisp
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfroystoncdsouza7
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfroystoncdsouza7
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docxDr. Arun Verma
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 

Similar to Scope & Objectives of IT Act 2000.pptx (20)

It act 2000
It act 2000It act 2000
It act 2000
 
IT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptxIT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptx
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber
CyberCyber
Cyber
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Scope & Objectives of IT Act 2000.pptx

  • 1. Scope & Objectives of IT Act 2000 Presented By Anjali Singh Poonam Nishad
  • 2. Introduction • The electronic transaction like other parts of the globe, are in popular in India, however they were without legal security before the establishment of IT Act 2000. • The increasing growth of the electronic commerce, popularity called E-Commerce, made it compulsory to have legal protection to such transaction. • The Indian parliaments took a important step by passing the Information Technology Act, 2000.
  • 3. Objective of IT Act This IT Act has the following Objects: • Granting legal recognition to all transactions done through electronic data exchange, other means of electronic communication or e-commerce in place of the earlier paper-based communication. • To give legal recognition to digital signature for accepting any agreement via computer. • Facilitate the electronic filing of documents with Government agencies and also departments.
  • 4. Objective Conti… • According to I.T. Act 2000, any company can store their data in electronic storage. • To stop computer crime and protect privacy of internet users. • To give legal recognition for keeping books of accounts by bankers and other companies in electronic form. • To provide facility of filling document online relating to school admission or registration in employment exchange.
  • 5. Features of IT Act 2000 Following are the features of IT Act, 2000: • All electronic contracts made through secure electronic channels are legally valid. • Legal recognition for digital signatures. • Security measures for electronic records and also digital signatures are in place • The Act applies to offences or contraventions committed outside India
  • 6. Scope of IT Act 2000 • Information Technology Act 2000 is not applicable on the attestation for creating trust via electronic way. Physical attestation is must. • IT Act 2000 is not applicable on the attestation for making will of any body. Physical attestation by two witness is must. • A contract of sale of any immovable property. • Attestation for giving power of attorney of property is not possible via electronic record.
  • 7. Applicability of Act • According to Section 1 (2), the Act extends to the entire country, which also includes Jammu and Kashmir. • Section 1 (2) along with Section 75, specifies that the Act is applicable to any offence or contravention committed outside India as well. • If the conduct of person constituting the offence involves a computer or a computerized system or network located in India, then irrespective of his/her nationality, the person is punishable under the Act.
  • 8. Non-applicability of Act This Act is not applicable to the following documents: • Execution of a Power of Attorney under the Powers of Attorney Act, 1882. • Creation of Trust under the Indian Trust Act, 1882. • Execution of Negotiable Instrument under Negotiable Instruments Act, 1881, except cheques. • Entering into a contract for the sale of conveyance of immovable property or any interest in such property.
  • 9. Advantages • Helpful to promote e-commerce. • Enhance the corporate business. • High penalty for cyber crime. • Filling online forms.
  • 10. Shortcoming of IT Act 2000 • Infringement of copyright has not been included in this law. • No protection for domain names. • Act is silent on taxation. • The act is not applicable on the power of attorney, trust and will.