This document outlines penalties under Indian law for various cybercrimes and offenses related to unauthorized access and damage to computers and networks. It discusses 5 major points: 1) Penalties for damaging computers or introducing viruses without permission, up to 1 crore rupees. 2) Penalties for failing to provide information to authorities, up to 1.5 lakh rupees. 3) A general residual penalty up to 25,000 rupees for violating rules. 4) The process for adjudicating violations and imposing penalties or compensation. 5) Factors adjudicating officers must consider like any unfair gains or losses caused.
Pre 1990: People are not connected
1990: Connecting People to Information1990: Connecting People to Information
2000: Connecting People to People2000: Connecting People to Peopl
In this, you will learn about the competition act, its feature and some cases on competition act,2002.
I hope, this presentation will help you in your work or helps you to enhance your knowledge.
This is and Corporate Law topic which I have covered.
Objectives & Agenda :
To understand the procedure involved in search and seizure carried out by the Income Tax Department. To know the powers conferred onto the authorised officers during the search and seizure. To gain knowledge about the rights and duties of the assessee in the event of search and seizure. To throw some light with regards to the dos and don'ts during the search and seizure.
Pre 1990: People are not connected
1990: Connecting People to Information1990: Connecting People to Information
2000: Connecting People to People2000: Connecting People to Peopl
In this, you will learn about the competition act, its feature and some cases on competition act,2002.
I hope, this presentation will help you in your work or helps you to enhance your knowledge.
This is and Corporate Law topic which I have covered.
Objectives & Agenda :
To understand the procedure involved in search and seizure carried out by the Income Tax Department. To know the powers conferred onto the authorised officers during the search and seizure. To gain knowledge about the rights and duties of the assessee in the event of search and seizure. To throw some light with regards to the dos and don'ts during the search and seizure.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Here is a brief overview of the Arbitration Act with a simple and easy to understand language. Very useful for beginners who are finding difficulty in learning alternative methods of dispute resolution.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
Objectives & Agenda :
To know when income will be taxable in India and to understand the determination of residential status for individuals, HUF, Firms, AOP/BOI and Companies. To analyse the concept of POEM in relation to determination of residential status of Company.
Key Takeaways:
- Provisions dealing with set-off and carry forward
- Inter-head and Inter-Source Set-off of Losses
- Carry Forward and Set-off of Losses in Special Cases
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Here is a brief overview of the Arbitration Act with a simple and easy to understand language. Very useful for beginners who are finding difficulty in learning alternative methods of dispute resolution.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
Objectives & Agenda :
To know when income will be taxable in India and to understand the determination of residential status for individuals, HUF, Firms, AOP/BOI and Companies. To analyse the concept of POEM in relation to determination of residential status of Company.
Key Takeaways:
- Provisions dealing with set-off and carry forward
- Inter-head and Inter-Source Set-off of Losses
- Carry Forward and Set-off of Losses in Special Cases
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. www.QuestionsBank4BScIT.Blogspot.Com
Five Major Points of Focus:
1. Penalty of damage of Computer, Computer
System, etc.
If any person without permission of the owner or any other person
who is incharge of a Computer, Computer or Computer Network –
(a) Accesses or secures access to such computer, computer system
or computer network;
(b) Downloads, copies or extracts any Data, Computer Database or
information from such Computer, Computer System or Computer
Network including information or data held or stored in any
removable Storage Medium;
(c) Introduces or causes to be introduced any Computer
Contaminant or Computer Virus into Any Computer, Computer
System or Computer Network;
(d) Damages or causes to be damaged any Computer, Computer
System or Computer Network, Data, Computer Database or other
Programmes residing in such Computer, Computer System or
Computer Network;
(e) Disrupts or causes disruption of any Computer, Computer System
or Computer Network;
(f) Denies or causes the denial of access to any person authorised to
access any Computer, or computer network by any means;
(g) Provides any assistance to any person to facilitate access to a
Computer, Computer System or Computer Network in
contravention of the Provisions of this Act, rules or regulations
made thereunder;
(h) Charges the services availed of by a person to the account of
another person by tampering with or manipulating any
Computer, Computer System, or Computer Network, he shall be
liable to pay damages by way of compensation not exceeding one
crore rupees to the person so affected.
3. www.QuestionsBank4BScIT.Blogspot.Com
Explanation: For the purpose of this section –
(i) "Computer Contaminant" means any set of computer
instructions that are designed –
(a) To modify, destroy, record, transmit data or programme
residing within a computer, computer system or computer
network; or
(b) By any means to usurp the normal operation of the
computer, computer system, or computer network;
(ii) "Computer Data Base" means a representation of information,
knowledge, facts, concepts or instructions in text, image, audio
video that are being prepared or have been prepared in a
formalised manner or have been produced by a computer,
computer system or computer network and are intended for use
in a computer, computer system or computer network;
(iii) "Computer Virus" means any computer instruction,
information, data or programme that destroys, damages,
degrades or adversely affects the performance of a computer
resource or attaches itself to another computer resource and
operates when a programme, data or instruction is executed
some other event takes place in that computer resource;
(iv) "Damage" means to destroy, alter, delete, add, modify or
rearrange any computer resource by any means.
2. Penalty for failure to furnish information,
return, etc.
If any person who is required under this Act or any rules or regulations
made there under to –
(a) Furnish any document, return or report to the Controller or the
Certifying Authority fails to furnish the same, he shall be liable to
a penalty not exceeding one lakh and fifty thousand rupees for
each such failure;
4. www.QuestionsBank4BScIT.Blogspot.Com
(b) File any return or furnish any information, books or other
documents within the time specified therefore in the regulation
fails to file return or furnish the same within the time specified
therefor in the regulations, he shall be liable to a penalty not
exceeding five thousand rupees for every day during which such
failure continues;
(c) Maintain books of account or records, fails to maintain the same,
he shall be liable to a penalty not exceeding ten thousand rupees
for every day during which the failure continues.
3. Residuary Penalty:
Whoever contravenes any rules or regulations made under this Act,
for the contravention of which no penalty has been separately
provided, shall be liable to pay a compensation not exceeding twenty-
five thousand rupees to the person affected by such contravention or
a penalty not exceeding twenty-five thousand rupees.
4. Power To Adjudicate:
(1) For the purpose of adjudging under this Chapter whether any
person has committed a contravention of any of the Provisions of
this Act or of any rule, regulation, direction or order made
thereunder the Central Government shall, subject to the
provisions of sub-section (3), appoint any officer not below the
rank of a Director to the Government of India or an equivalent
officer of a State Government to be an adjudicating officer for
holding an inquiry in the manner prescribed by the Central
Government.
(2) The adjudicating officer shall, after giving the person referred to
in sub-section (1) a reasonable opportunity for making
representation in the matter and if, on such inquiry, he is satisfied
that the person has committed the contravention, he may impose
5. www.QuestionsBank4BScIT.Blogspot.Com
such penalty or award such compensation as he thinks fit in
accordance with the provisions of that section.
(3) No person shall be appointed as an adjudicating officer unless he
possesses such experience in the field of Information Technology
and legal or judicial experience as may be prescribed by the
Central Government.
(4) Where more than one adjudicating officers are appointed, the
Central Government shall specify by order the matters and places
with respect to which such officers shall exercise their
jurisdiction.
(5) Every adjudicating officer shall have the powers of a civil court
which are conferred on the Cyber Appellate Tribunal under sub-
section (2) of section 58, and-
(6) All proceedings before it shall be deemed to be judicial
proceedings within the meaning of sections 193 and 228 of the
Indian Penal Code;
(7) Shall be deemed to be a civil court for the purpose of section 345
and .46 of the Code of Criminal Procedure, 1973.
5. Factors to be taken into account by the
adjudicating officer:
While adjudging the quantum of compensation under this Chapter,
the adjudicating officer shall have due regard to the following factors,
namely –
(a) The amount of gain of unfair advantage, wherever quantifiable,
made as a result of the default;
(b) The amount of loss caused to any person as a result of the default;
(c) The repetitive nature of the default.