SlideShare uma empresa Scribd logo
1 de 17
PRESENTATION ON
CYBER LAWS
INTRODUCTION
Cyber law is a term which refers
to all the legal and regulatory
aspects of Internet and the
World Wide Web. Anything
concerned with or related to,
or emanating from, any legal
aspects or issues concerning
any activity of netizens and
others, in Cyberspace comes
within the ambit of Cyber law.
NEED FOR CYBER LAWS
 Security of Information
 Security of Government Data
 Intellectual Property Rights
 Privacy and Confidentially of
Information
 Legal Status of
Online Transaction
IT ACT PASSED IN 2000
• Enacted on 17th May 2000
by the central government.
• India is 12th nation in the
world to adopt cyber laws.
• Information Technology
Act2000 consisted of 94
sections segregated into13
chapters.
• 4 schedules form part of the
Act.
SALIENT FEATURES OF THE
ACT
The information technology act 2000 is a
technology intensive act in the sense that it talks
about the use of digital signature to authenticate
electronic records. It is based on UNCITRAL’s
model law on e-commerce which adopts
functional equivalent approach, that accepts
digital signature as an authentication standard.
DIGITAL SIGNATURES
ELECTRONIC GOVERNANCE
It is a kind of window of opportunity facilitating a
much faster, convenient, transparent interaction
between the government and its people. It involves
information technology enabled initiatives that are
used for improving
• e-services
• e-administration
• e-society
ATTRIBUTION, ACKNOWLEDGEMENT
AND DISPATCH OF ELECTRONIC
RECORDS
The information Technology Act,2000 has not
amended the Indian contract act,1872 in any
manner whatsoever. In order to form a valid
electronic contract one still needs a promisor or a
promisee. The act grants legal recognition to
communication process involving computer,
computer system and computer network by
identifying, attribution, acknowledgement and
dispatch of electronic records as key statutory
provisions.
DIGITAL SIGNATURE
CERTIFICATES
It is an important instrument of trust identifying
the subscriber over the networks . It creats a
‘binding linkage’ between the subscriber and the
issuer. ‘binding policies’ are needed for the same.
The policies must define the level of trust of
relying party shall put forth in the issuer’s overall
certificate issuance and management process.
DUTIES OF SUBSCRIBERS
The word ‘subscriber’ denotes a person who has
paid subscription amount to avail some kind of
service. A subscriber is in a way a customer or a
buyer. He is a customer with a difference as he
usually pays for a service in advance.
SECURE ELECTRONIC
RECORDS AND SECURE
DIGITAL SIGNATURES
• Information is a valuable commodity. It needs
to be confidential, secure and retains its
integrity. Only a secured system leads to secure
transactions. From the user’s perspective, the act
concerns with the application of security
procedures at the user’s level. The aim is to
protect the communication and not the medium.
IT ACT PROVISIONS
• email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
• Companies shall now be able to carry out
electronic commerce using the legal infrastructure
provided by the Act.
• Digital signatures have been given legal validity
and sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
notification on the web thus heralding e-
governance
• Statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies data
AMENDMENTS
The major amendment provided that though
cheque is a negotiable instrument yet the
provisions of act would apply to it.
The main focus of new amendments is on
cyber security.
The words digital signature has been replaced
by the words electronic signature.
CYBER CRIMES
It is an illegal act that involves a computer,
computer system or computer network, i.e any
illegal act for which knowledge of computer
technology is essential for its perpetration,
investigation or prosecution.
Cyber crime is divided into 2 groups
Crime where Accused is
computer victim is a
computer.
Crime where computer
becomes a part of
evidence for the crime
that has taken place.
OFFENCES AND LAWS IN
CYBER SPACE
• TAMPERING WITH
COMPUTER
DOCUMENTS
• HACKING WITH
COMPUTER SYSTEM
• PUBLISHING OBSCENE
MATERIAL ON
INTERNET
• BREACHING OF
CONFIDENTIALITY
AND PRIVACY
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
IN TODAYS WORLD OF INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY
THANK YOU

Mais conteúdo relacionado

Mais procurados

Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docxDr. Arun Verma
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-CommerceMamta Bhola
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 

Mais procurados (20)

Information technology act
Information technology actInformation technology act
Information technology act
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
E commerce PPT
E commerce PPTE commerce PPT
E commerce PPT
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 

Destaque

MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016Colin Zick
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 

Destaque (8)

MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Ip address
Ip addressIp address
Ip address
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 

Semelhante a Presentation on Cyber Laws and IT Act 2000: Essential Features in Today's Digital World

INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Article on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfArticle on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfRISHAVBHARDWAJ12
 
Informtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptxInformtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptxbharathwajkatta1
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptxsambaba17
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 

Semelhante a Presentation on Cyber Laws and IT Act 2000: Essential Features in Today's Digital World (20)

Cyber
CyberCyber
Cyber
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
 
It act 2000
It act 2000It act 2000
It act 2000
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Article on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfArticle on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdf
 
Informtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptxInformtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptx
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 

Último

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Presentation on Cyber Laws and IT Act 2000: Essential Features in Today's Digital World

  • 2. INTRODUCTION Cyber law is a term which refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned with or related to, or emanating from, any legal aspects or issues concerning any activity of netizens and others, in Cyberspace comes within the ambit of Cyber law.
  • 3. NEED FOR CYBER LAWS  Security of Information  Security of Government Data  Intellectual Property Rights  Privacy and Confidentially of Information  Legal Status of Online Transaction
  • 4. IT ACT PASSED IN 2000 • Enacted on 17th May 2000 by the central government. • India is 12th nation in the world to adopt cyber laws. • Information Technology Act2000 consisted of 94 sections segregated into13 chapters. • 4 schedules form part of the Act.
  • 5. SALIENT FEATURES OF THE ACT The information technology act 2000 is a technology intensive act in the sense that it talks about the use of digital signature to authenticate electronic records. It is based on UNCITRAL’s model law on e-commerce which adopts functional equivalent approach, that accepts digital signature as an authentication standard. DIGITAL SIGNATURES
  • 6. ELECTRONIC GOVERNANCE It is a kind of window of opportunity facilitating a much faster, convenient, transparent interaction between the government and its people. It involves information technology enabled initiatives that are used for improving • e-services • e-administration • e-society
  • 7. ATTRIBUTION, ACKNOWLEDGEMENT AND DISPATCH OF ELECTRONIC RECORDS The information Technology Act,2000 has not amended the Indian contract act,1872 in any manner whatsoever. In order to form a valid electronic contract one still needs a promisor or a promisee. The act grants legal recognition to communication process involving computer, computer system and computer network by identifying, attribution, acknowledgement and dispatch of electronic records as key statutory provisions.
  • 8. DIGITAL SIGNATURE CERTIFICATES It is an important instrument of trust identifying the subscriber over the networks . It creats a ‘binding linkage’ between the subscriber and the issuer. ‘binding policies’ are needed for the same. The policies must define the level of trust of relying party shall put forth in the issuer’s overall certificate issuance and management process.
  • 9. DUTIES OF SUBSCRIBERS The word ‘subscriber’ denotes a person who has paid subscription amount to avail some kind of service. A subscriber is in a way a customer or a buyer. He is a customer with a difference as he usually pays for a service in advance.
  • 10. SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES • Information is a valuable commodity. It needs to be confidential, secure and retains its integrity. Only a secured system leads to secure transactions. From the user’s perspective, the act concerns with the application of security procedures at the user’s level. The aim is to protect the communication and not the medium.
  • 11. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 12. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • Statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 13. AMENDMENTS The major amendment provided that though cheque is a negotiable instrument yet the provisions of act would apply to it. The main focus of new amendments is on cyber security. The words digital signature has been replaced by the words electronic signature.
  • 14. CYBER CRIMES It is an illegal act that involves a computer, computer system or computer network, i.e any illegal act for which knowledge of computer technology is essential for its perpetration, investigation or prosecution. Cyber crime is divided into 2 groups Crime where Accused is computer victim is a computer. Crime where computer becomes a part of evidence for the crime that has taken place.
  • 15. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 16. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY