SlideShare a Scribd company logo
BY
B.SARANYA(246)
N.NARMADHA(273)
D.PRIYA(243)
The Information Technology Act,2000, is an important law relating to Indian cyber
laws. It aims at promoting E-Commerce and facilitating E-Governance. The Act
strives to achieve the following objectives:
1.To give legal recognition to transactions done by electronic way or by use of the
internet.
2.To grant legal recognition to digital signature for accepting any agreement via
computer.
3.To provide facility of filling documents online.
4.To authorise any undertaking to store their data in electronic storage.
5.To prevent cyber crime by imposing high penalty for such crimes and protect
privacy of internet users.
6.To give legal recognition for keeping books of account by bankers and other
undertaking in electronic form.
• The Act totally has 13 chapters and 90 sections.
• Sections 91 to 94 deal with the amendments to the four Acts namely
Indian Penal Code 1860, The Indian Evidence Act 1872, The Bankers’
Books Evidence Act 1891 and the Reserve Bank of India Act 1934.
• The Act has chapters that deal with authentication of electronic records,
electronic signatures etc.
 Elaborate procedures for certifying authorities and
electronic signatures have been spelt out.
 The civil offence of data theft and the process of
adjudication and appellate procedures have been
described.
 Then the Act goes on to define and describe some of the
well-known cyber crimes and lays down the punishments
therefore.
 Then the concept of due diligence, role of intermediaries
and some miscellaneous provisions have been described.
SECTION 43:
Penalty and Compensation for damage to computer,
computer system, etc
Related Case: Mphasis BPO Fraud: 2005
In December 2004, four call centre employees, working at an
outsourcing facility operated by MphasiS in India, obtained PIN codes
from four customers of MphasiS’ client, Citi Group. These employees
were not authorized to obtain the PINs. In association with others, the
call centre employees opened new accounts at Indian banks using false
identities. Within two months, they used the PINs and account
information gleaned during their employment at MphasiS to transfer
money from the bank accounts of CitiGroup customers to the new
accounts at Indian banks.
By April 2005, the Indian police had tipped off to the scam by a U.S.
bank, and quickly identified the individuals involved in the scam.
Arrests were made when those individuals attempted to withdraw cash
from the falsified accounts, $426,000 was stolen; the amount recovered
was $230,000.
VERDICTS: Court held that Section 43(a) was applicable here due to the
nature of unauthorized access involved to commit transactions.
SECTION 65 - Tampering with Computer Source Documents.
Related Case: Syed Asifuddin and Ors. Vs. The State of Andhra Pradesh
In this case, Tata Indicom employees were arrested for manipulation
of the electronic 32- bit number (ESN) programmed into cell phones
theft were exclusively franchised to Reliance Infocomm.
Verdict: Court held that tampering with source code invokes Section 65 of
the Information Technology Act.
SECTION 66 - Computer Related Offences
Related Case: Kumar v/s Whiteley
In this case the accused gained unauthorized access to the Joint
Academic Network (JANET) and deleted, added files and changed the
passwords to deny access to the authorized users.
Investigations had revealed that Kumar was logging on to the
BSNL broadband Internet connection as if he was the authorized
genuine user and ‘made alteration in the computer database pertaining to
broadband Internet user accounts’ of the subscribers.
The CBI had registered a cyber crime case against Kumar and
carried out investigations on the basis of a complaint by the Press
Information Bureau, Chennai, which detected the unauthorised use of
broadband Internet. The complaint also stated that the subscribers had
incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to
‘hack’ sites from Bangalore, Chennai and other cities too, they said.
Verdict:
The Additional Chief Metropolitan Magistrate, Egmore, Chennai,
sentenced N G Arun Kumar, the techie from Bangalore to undergo a
rigorous imprisonment for one year with a fine of Rs 5,000 under section
420 IPC (cheating) and Section 66 of IT Act (Computer related Offence).
SECTION 66C - Punishment for identity theft
Relevant Cases:
 The CEO of an identity theft protection company, Lifelock, Todd
Davis's social security number was exposed by Matt Lauer on NBC’s
Today Show. Davis’identity was used to obtain a $500 cash advance
loan.
 Li Ming, a graduate student at West Chester University of Pennsylvania
faked his own death, complete with a forged obituary in his local paper.
Nine months later, Li attempted to obtain a new driver’s license with the
intention of applying for new credit cards eventually.
SECTION 66E - Punishment for violation of privacy
Relevant Cases:
1) Jawaharlal Nehru University MMS scandal:
In a severe shock to the prestigious and renowned institute -
Jawaharlal Nehru University, a MMS clip was apparently made in the
campus and transmitted outside the university.
Some media reports claimed that the two accused students
initially tried to extort money from the girl in the video but when they
failed the culprits put the video out on mobile phones, on the internet
and even sold it as a CD.
SECTION 69 - Powers to issue directions for interception or
monitoring or decryption of any information through any computer
resource
Relevant Case:
In August 2007, Lakshmana Kailash K., a techie from Bangalore was
arrested on the suspicion of having posted insulting images of Chhatrapati
Shivaji, a major historical figure in the state of Maharashtra, on the social-
networking site Orkut.
The police identified him based on IP address details obtained from Google
and Airtel -Lakshmana’s ISP. He was brought to Pune and detained for 50
days before it was discovered that the IP address provided by Airtel was
erroneous.The mistake was evidently due to the fact that while requesting
information from Airtel,the police had not properly specified whether the
suspect had posted the content at 1:15 p.m.
Verdict:
Taking cognizance of his plight from newspaper accounts, the State
Human Rights Commission subsequently ordered the company to pay Rs
2 lakh to Lakshmana as damages.
The incident highlights how minor privacy violations by ISPs and
intermediaries could have impacts that gravely undermine other basic
human rights.
COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY
OF LEGAL SECTIONS :
Some common cyber-crime scenarios which can attract prosecution as
per the penalties and offences prescribed in IT Act 2000 (amended via 2008) Act.
a. Harassment via fake public profile on social networking site:
A fake profile of a person is created on a social networking site with the correct address,
residential information or contact details but he/she is labelled as ‘prostitute’ or a
person of ‘loose character’. This leads to harassment of the victim.
Provisions Applicable:- Sections 66A, 67 of IT Act and Section 509 of the Indian Penal
Code.
b. Online Hate Community.
Online hate community is created inciting a religious group to act or pass objectionable
remarks against a country, national figures etc.
Provisions Applicable: Section 66A of IT Act and 153A & 153B of the Indian Penal
Code.
c. Email Account Hacking.
If victim’s email account is hacked and obscene emails are sent to people in victim’s
address book.
Provisions Applicable:- Sections 43, 66, 66A, 66C, 67, 67A and 67B of IT Act..
d. Credit Card Fraud:
Unsuspecting victims would use infected computers to make online transactions.
Provisions Applicable:- Sections 43, 66, 66C, 66D of IT Act and section 420 of the IPC.
e. Web Defacement:
The homepage of a website is replaced with a pornographic or defamatory page.
Government sites generally face the wrath of hackers on symbolic days.
Provisions Applicable:- Sections 43 and 66 of IT Act and Sections 66F, 67 and 70 of IT
Act also apply in some cases.
f. Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs:
All of the above are some sort of malicious programs which are used to
destroy or gain access to some electronic information.
Provisions Applicable:- Sections 43, 66, 66A of IT Act and Section 426 of
Indian Penal Code.
g. Cyber Terrorism :
Many terrorists are use virtual(GDrive, FTP sites) and physical storage
media(USB’s,hard drives) for hiding information and records of their
illicit business.
Provisions Applicable: Conventional terrorism laws may apply along with
Section 69 of IT Act.
h. Online sale of illegal Articles :
Where sale of narcotics, drugs weapons and wildlife is facilitated by the
Internet
Provisions Applicable:- Generally conventional laws apply in these cases.
i. Cyber Pornography:
Among the largest businesses on Internet. Pornography may not be illegal
in many
countries, but child pornography is.
Provisions Applicable:- Sections 67, 67A and 67B of the IT Act.
j. Phishing and Email Scams :
Phishing involves fraudulently acquiring sensitive information through
masquerading a site as a trusted entity. (E.g. Passwords, credit card
information)
Provisions Applicable:- Section 66, 66A and 66D of IT Act and Section
420 of IPC
k. Theft of Confidential Information:
Many business organizations store their confidential information in
computer systems.This information is targeted by rivals, criminals and
disgruntled employees.
Provisions Applicable:- Sections 43, 66, 66B of IT Act and Section 426 of
Indian Penal Code.
l. Source Code Theft :
A Source code generally is the most coveted and important "crown jewel" asset of a
company.
Provisions applicable:- Sections 43, 66, 66B of IT Act and Section 63 of Copyright Act.
m. Tax Evasion and Money Laundering :
Money launderers and people doing illegal business activities hide their information in
virtual as well as physical activities.
Provisions Applicable: Income Tax Act and Prevention of Money Laundering Act. ITAct
may apply case-wise.
n. Online Share Trading Fraud :
It has become mandatory for investors to have their demat accounts linked with their
online banking accounts which are generally accessed unauthorized, thereby leading to
share trading frauds.
Provisions Applicable: Sections 43, 66, 66C, 66D of IT Act and Section 420 of IPC
The information technology act,2000

More Related Content

What's hot

Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
Nitya Nand Pandey
 
IT ACT 2000
IT ACT 2000IT ACT 2000
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
atuljaybhaye
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
Parth Patel
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
Onkar Sule
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 

What's hot (20)

Information technology act
Information technology actInformation technology act
Information technology act
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 

Viewers also liked

WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Lawguest66dc5f
 
Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
Mousmi Pawar
 
EDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 PresentationEDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 Presentation
Paul Gruhn
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
kparthjadhav
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
Adv Prashant Mali
 
Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technology
Dr. Trilok Kumar Jain
 
Consumer protection act, 1986
Consumer protection act, 1986Consumer protection act, 1986
Consumer protection act, 1986tukishah
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Competition Act,2002
Competition Act,2002Competition Act,2002
Competition Act,2002Sharath Alva
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Presentation on Intellectual Property Rights
Presentation on Intellectual Property RightsPresentation on Intellectual Property Rights
Presentation on Intellectual Property Rights
IEI GSC
 
Company law, 1956 vivek parashar
Company law, 1956 vivek parasharCompany law, 1956 vivek parashar
Company law, 1956 vivek parashar
Vivek Parashar
 
Presentation on The competition act(2002)
Presentation on The competition act(2002)Presentation on The competition act(2002)
Presentation on The competition act(2002)
satya pal
 
Indian Law on Sexual Harassment of Women at Workplace - 2013
Indian Law on Sexual Harassment of Women at Workplace - 2013Indian Law on Sexual Harassment of Women at Workplace - 2013
Indian Law on Sexual Harassment of Women at Workplace - 2013
Sukanya Patwardhan
 
Competition act 2002
Competition act 2002 Competition act 2002
Competition act 2002
Vijay Mehta
 
sexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by parameshsexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by paramesh
Parameswar Rao
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection ActAtif Ghayas
 

Viewers also liked (20)

WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
 
Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
 
EDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 PresentationEDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 Presentation
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technology
 
Consumer protection act, 1986
Consumer protection act, 1986Consumer protection act, 1986
Consumer protection act, 1986
 
Consumer protection act, 1986
Consumer protection act, 1986Consumer protection act, 1986
Consumer protection act, 1986
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Competition Act,2002
Competition Act,2002Competition Act,2002
Competition Act,2002
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Presentation on Intellectual Property Rights
Presentation on Intellectual Property RightsPresentation on Intellectual Property Rights
Presentation on Intellectual Property Rights
 
Company law, 1956 vivek parashar
Company law, 1956 vivek parasharCompany law, 1956 vivek parashar
Company law, 1956 vivek parashar
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Presentation on The competition act(2002)
Presentation on The competition act(2002)Presentation on The competition act(2002)
Presentation on The competition act(2002)
 
Indian Law on Sexual Harassment of Women at Workplace - 2013
Indian Law on Sexual Harassment of Women at Workplace - 2013Indian Law on Sexual Harassment of Women at Workplace - 2013
Indian Law on Sexual Harassment of Women at Workplace - 2013
 
Competition act 2002
Competition act 2002 Competition act 2002
Competition act 2002
 
Company law ppt
Company law pptCompany law ppt
Company law ppt
 
sexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by parameshsexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by paramesh
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
 

Similar to The information technology act,2000

Cyber law11
Cyber law11Cyber law11
Cyber law11
maradabudkinsantosh
 
Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
sparun
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)Pruthvi Prince
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber lawPrakash Masagi
 
Anil final
Anil finalAnil final
Anil final
Rakshith Shetty
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
santoshdkamat
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Rini Mahade
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
Rakesh Otari
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Varsha Mali
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
vijayjituri
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Anusha Kadayyanmath
 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases.
Ezra Paul
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
MrVMNair
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
vishalhp123
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentvishalhp123
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
HetaDesai13
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
anveshika thakur
 

Similar to The information technology act,2000 (20)

Cyber law11
Cyber law11Cyber law11
Cyber law11
 
Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
 
Anil final
Anil finalAnil final
Anil final
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases.
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 

Recently uploaded

ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
YashSingh373746
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 

Recently uploaded (20)

ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 

The information technology act,2000

  • 2. The Information Technology Act,2000, is an important law relating to Indian cyber laws. It aims at promoting E-Commerce and facilitating E-Governance. The Act strives to achieve the following objectives: 1.To give legal recognition to transactions done by electronic way or by use of the internet. 2.To grant legal recognition to digital signature for accepting any agreement via computer. 3.To provide facility of filling documents online. 4.To authorise any undertaking to store their data in electronic storage. 5.To prevent cyber crime by imposing high penalty for such crimes and protect privacy of internet users. 6.To give legal recognition for keeping books of account by bankers and other undertaking in electronic form.
  • 3. • The Act totally has 13 chapters and 90 sections. • Sections 91 to 94 deal with the amendments to the four Acts namely Indian Penal Code 1860, The Indian Evidence Act 1872, The Bankers’ Books Evidence Act 1891 and the Reserve Bank of India Act 1934. • The Act has chapters that deal with authentication of electronic records, electronic signatures etc.
  • 4.  Elaborate procedures for certifying authorities and electronic signatures have been spelt out.  The civil offence of data theft and the process of adjudication and appellate procedures have been described.  Then the Act goes on to define and describe some of the well-known cyber crimes and lays down the punishments therefore.  Then the concept of due diligence, role of intermediaries and some miscellaneous provisions have been described.
  • 5. SECTION 43: Penalty and Compensation for damage to computer, computer system, etc Related Case: Mphasis BPO Fraud: 2005 In December 2004, four call centre employees, working at an outsourcing facility operated by MphasiS in India, obtained PIN codes from four customers of MphasiS’ client, Citi Group. These employees were not authorized to obtain the PINs. In association with others, the call centre employees opened new accounts at Indian banks using false identities. Within two months, they used the PINs and account information gleaned during their employment at MphasiS to transfer money from the bank accounts of CitiGroup customers to the new accounts at Indian banks.
  • 6. By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly identified the individuals involved in the scam. Arrests were made when those individuals attempted to withdraw cash from the falsified accounts, $426,000 was stolen; the amount recovered was $230,000. VERDICTS: Court held that Section 43(a) was applicable here due to the nature of unauthorized access involved to commit transactions.
  • 7. SECTION 65 - Tampering with Computer Source Documents. Related Case: Syed Asifuddin and Ors. Vs. The State of Andhra Pradesh In this case, Tata Indicom employees were arrested for manipulation of the electronic 32- bit number (ESN) programmed into cell phones theft were exclusively franchised to Reliance Infocomm. Verdict: Court held that tampering with source code invokes Section 65 of the Information Technology Act.
  • 8. SECTION 66 - Computer Related Offences Related Case: Kumar v/s Whiteley In this case the accused gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users. Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorized genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers.
  • 9. The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet. The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore, Chennai and other cities too, they said. Verdict: The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, the techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (Computer related Offence).
  • 10. SECTION 66C - Punishment for identity theft Relevant Cases:  The CEO of an identity theft protection company, Lifelock, Todd Davis's social security number was exposed by Matt Lauer on NBC’s Today Show. Davis’identity was used to obtain a $500 cash advance loan.  Li Ming, a graduate student at West Chester University of Pennsylvania faked his own death, complete with a forged obituary in his local paper. Nine months later, Li attempted to obtain a new driver’s license with the intention of applying for new credit cards eventually.
  • 11. SECTION 66E - Punishment for violation of privacy Relevant Cases: 1) Jawaharlal Nehru University MMS scandal: In a severe shock to the prestigious and renowned institute - Jawaharlal Nehru University, a MMS clip was apparently made in the campus and transmitted outside the university. Some media reports claimed that the two accused students initially tried to extort money from the girl in the video but when they failed the culprits put the video out on mobile phones, on the internet and even sold it as a CD.
  • 12. SECTION 69 - Powers to issue directions for interception or monitoring or decryption of any information through any computer resource Relevant Case: In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure in the state of Maharashtra, on the social- networking site Orkut. The police identified him based on IP address details obtained from Google and Airtel -Lakshmana’s ISP. He was brought to Pune and detained for 50 days before it was discovered that the IP address provided by Airtel was erroneous.The mistake was evidently due to the fact that while requesting information from Airtel,the police had not properly specified whether the suspect had posted the content at 1:15 p.m.
  • 13. Verdict: Taking cognizance of his plight from newspaper accounts, the State Human Rights Commission subsequently ordered the company to pay Rs 2 lakh to Lakshmana as damages. The incident highlights how minor privacy violations by ISPs and intermediaries could have impacts that gravely undermine other basic human rights.
  • 14. COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF LEGAL SECTIONS : Some common cyber-crime scenarios which can attract prosecution as per the penalties and offences prescribed in IT Act 2000 (amended via 2008) Act. a. Harassment via fake public profile on social networking site: A fake profile of a person is created on a social networking site with the correct address, residential information or contact details but he/she is labelled as ‘prostitute’ or a person of ‘loose character’. This leads to harassment of the victim. Provisions Applicable:- Sections 66A, 67 of IT Act and Section 509 of the Indian Penal Code. b. Online Hate Community. Online hate community is created inciting a religious group to act or pass objectionable remarks against a country, national figures etc. Provisions Applicable: Section 66A of IT Act and 153A & 153B of the Indian Penal Code.
  • 15. c. Email Account Hacking. If victim’s email account is hacked and obscene emails are sent to people in victim’s address book. Provisions Applicable:- Sections 43, 66, 66A, 66C, 67, 67A and 67B of IT Act.. d. Credit Card Fraud: Unsuspecting victims would use infected computers to make online transactions. Provisions Applicable:- Sections 43, 66, 66C, 66D of IT Act and section 420 of the IPC. e. Web Defacement: The homepage of a website is replaced with a pornographic or defamatory page. Government sites generally face the wrath of hackers on symbolic days. Provisions Applicable:- Sections 43 and 66 of IT Act and Sections 66F, 67 and 70 of IT Act also apply in some cases.
  • 16. f. Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs: All of the above are some sort of malicious programs which are used to destroy or gain access to some electronic information. Provisions Applicable:- Sections 43, 66, 66A of IT Act and Section 426 of Indian Penal Code. g. Cyber Terrorism : Many terrorists are use virtual(GDrive, FTP sites) and physical storage media(USB’s,hard drives) for hiding information and records of their illicit business. Provisions Applicable: Conventional terrorism laws may apply along with Section 69 of IT Act.
  • 17. h. Online sale of illegal Articles : Where sale of narcotics, drugs weapons and wildlife is facilitated by the Internet Provisions Applicable:- Generally conventional laws apply in these cases. i. Cyber Pornography: Among the largest businesses on Internet. Pornography may not be illegal in many countries, but child pornography is. Provisions Applicable:- Sections 67, 67A and 67B of the IT Act.
  • 18. j. Phishing and Email Scams : Phishing involves fraudulently acquiring sensitive information through masquerading a site as a trusted entity. (E.g. Passwords, credit card information) Provisions Applicable:- Section 66, 66A and 66D of IT Act and Section 420 of IPC k. Theft of Confidential Information: Many business organizations store their confidential information in computer systems.This information is targeted by rivals, criminals and disgruntled employees. Provisions Applicable:- Sections 43, 66, 66B of IT Act and Section 426 of Indian Penal Code.
  • 19. l. Source Code Theft : A Source code generally is the most coveted and important "crown jewel" asset of a company. Provisions applicable:- Sections 43, 66, 66B of IT Act and Section 63 of Copyright Act. m. Tax Evasion and Money Laundering : Money launderers and people doing illegal business activities hide their information in virtual as well as physical activities. Provisions Applicable: Income Tax Act and Prevention of Money Laundering Act. ITAct may apply case-wise. n. Online Share Trading Fraud : It has become mandatory for investors to have their demat accounts linked with their online banking accounts which are generally accessed unauthorized, thereby leading to share trading frauds. Provisions Applicable: Sections 43, 66, 66C, 66D of IT Act and Section 420 of IPC