2. INTRODUCTION
Cyber law is a term which refers
to all the legal and regulatory
aspects of Internet and the
World Wide Web. Anything
concerned with or related to,
or emanating from, any legal
aspects or issues concerning
any activity of netizens and
others, in Cyberspace comes
within the ambit of Cyber law.
3. NEED FOR CYBER LAWS
Security of Information
Security of Government Data
Intellectual Property Rights
Privacy and Confidentially of
Information
Legal Status of
Online Transaction
4. IT ACT PASSED IN 2000
• Enacted on 17th May 2000
by the central government.
• India is 12th nation in the
world to adopt cyber laws.
• Information Technology
Act2000 consisted of 94
sections segregated into13
chapters.
• 4 schedules form part of the
Act.
5. SALIENT FEATURES OF THE
ACT
The information technology act 2000 is a
technology intensive act in the sense that it talks
about the use of digital signature to authenticate
electronic records. It is based on UNCITRAL’s
model law on e-commerce which adopts
functional equivalent approach, that accepts
digital signature as an authentication standard.
DIGITAL SIGNATURES
6. ELECTRONIC GOVERNANCE
It is a kind of window of opportunity facilitating a
much faster, convenient, transparent interaction
between the government and its people. It involves
information technology enabled initiatives that are
used for improving
• e-services
• e-administration
• e-society
7. ATTRIBUTION, ACKNOWLEDGEMENT
AND DISPATCH OF ELECTRONIC
RECORDS
The information Technology Act,2000 has not
amended the Indian contract act,1872 in any
manner whatsoever. In order to form a valid
electronic contract one still needs a promisor or a
promisee. The act grants legal recognition to
communication process involving computer,
computer system and computer network by
identifying, attribution, acknowledgement and
dispatch of electronic records as key statutory
provisions.
8. DIGITAL SIGNATURE
CERTIFICATES
It is an important instrument of trust identifying
the subscriber over the networks . It creats a
‘binding linkage’ between the subscriber and the
issuer. ‘binding policies’ are needed for the same.
The policies must define the level of trust of
relying party shall put forth in the issuer’s overall
certificate issuance and management process.
9. DUTIES OF SUBSCRIBERS
The word ‘subscriber’ denotes a person who has
paid subscription amount to avail some kind of
service. A subscriber is in a way a customer or a
buyer. He is a customer with a difference as he
usually pays for a service in advance.
10. SECURE ELECTRONIC
RECORDS AND SECURE
DIGITAL SIGNATURES
• Information is a valuable commodity. It needs
to be confidential, secure and retains its
integrity. Only a secured system leads to secure
transactions. From the user’s perspective, the act
concerns with the application of security
procedures at the user’s level. The aim is to
protect the communication and not the medium.
11. IT ACT PROVISIONS
• email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
• Companies shall now be able to carry out
electronic commerce using the legal infrastructure
provided by the Act.
• Digital signatures have been given legal validity
and sanction in the Act.
12. IT ACT PROVISIONS
• The Act now allows Government to issue
notification on the web thus heralding e-
governance
• Statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies data
13. AMENDMENTS
The major amendment provided that though
cheque is a negotiable instrument yet the
provisions of act would apply to it.
The main focus of new amendments is on
cyber security.
The words digital signature has been replaced
by the words electronic signature.
14. CYBER CRIMES
It is an illegal act that involves a computer,
computer system or computer network, i.e any
illegal act for which knowledge of computer
technology is essential for its perpetration,
investigation or prosecution.
Cyber crime is divided into 2 groups
Crime where Accused is
computer victim is a
computer.
Crime where computer
becomes a part of
evidence for the crime
that has taken place.
15. OFFENCES AND LAWS IN
CYBER SPACE
• TAMPERING WITH
COMPUTER
DOCUMENTS
• HACKING WITH
COMPUTER SYSTEM
• PUBLISHING OBSCENE
MATERIAL ON
INTERNET
• BREACHING OF
CONFIDENTIALITY
AND PRIVACY
16. CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
IN TODAYS WORLD OF INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY