SlideShare uma empresa Scribd logo
1 de 26
PREPARED BY:
PRANAY ADHIKARI (01)

KAUSTUBH BARVE (11)

KRITI AGRAWAL (03)

MEET BHADRA (13)

MONICA ANGANE (05)

REWAT BHARSAKLE (15)

RUCHITA BADRUKA (07)

ADITYA BHIMANWAR (17)

MEGHA BANSAL (09)

AMOL BHOLE (19)
Accord legal sanctity to electronic records

Provide legal recognition of electronic
records, e-transactions, digital signature etc.
Facilitate e-governance
Establish a regulatory body supervising
certifying authorities
Amend IPC, 1860, Indian Evidence Act, 1872 , RBI
Act, 1934 & Banker’s Books Evidence Act, 1891
Increasing use of
ICTs in
conducting
business
transactions

Adoption of
model law by
UNICTRAL

WTO likely to
conduct
transactions
only in
electronic
medium

Reasons
for
enactment
of IT act

No legal
protection
under the
existing laws

Growing
international
trade through
electronic
means


Need for amendment
Increased use of internet and computer
Rise in the number of cyber crimes.



Structure of IT act
Functions:


Authentication & verification of electronic records by use of asymmetric

crypto system and hash function



Identify the sender



Make contents of the document binding on person putting digital
signature.


Various methods by which one can sign an electronic record.



Electronic sound, symbol, or process



Example: Typed name or a digitized image of a handwritten signature.



Legalized as valid mode of signature in ITAA 2008


Application of ICTs to the processes of government functioning



Government at your fingertips



4 basic models are G to C, G to E, G to G and G to B.



Example: Railway ticket booking, Gramdoot (Rajasthan)


Trusted body who has been granted a license to issue Digital Signature
Certificates.



Function equivalent to that of the passport issuing office in the
Government


Unlawful acts where computer is either a tool or target or both



It includes pornography, e-mail, spoofing, forgery, cyber defamation, cyber
stalking, e-mail bombing etc.
HACKING

• Gaining unauthorized access to a
computer system
• Trespassing any computer

PHISHING

• Fraudulently acquiring sensitive
information by camouflaging as a
trustworthy person
• Example:Congratulations you have
won $100,00,000
1. Number of Cyber Crimes recorded in India in last 5 years:
3500
3000
2500
2000
1500

2876

1000

1791

500
0

966
288

420

2008

2009

965

2010

2011

2012

2013
2. State wise count of the cyber-crime in 2012:

500
400
300
200
100
0

429

471

412

269

205
4. Country wise distribution of cyber crimes:
SECTION 43.
Penalty and Compensation for damage to computer, computer system, etc:
Penalty:Pay damages by way of compensation not exceeding 1 crore rupees
to the person so affected.
SECTION 43(A).
Compensation for failure to protect data:
Penalty: Pay damages by way of compensation, not exceeding five crore
rupees, to the person so affected.
Example:
Pune Citibank Mphasis BPO Fraud: 2005
SECTION 65.
Tampering with Computer Source Documents
Penalties: Imprisonment up to three years, or with fine which may extend up
to two lakh rupees, or with both
Example:
Syed Asifuddin Vs. The State of Andhra Pradesh
SECTION 66.
Computer Related Offences
Penalties: Imprisonment up to 3 years and/or fine of five lakh rupees

Example:
Kumar v/s Whitley case
SECTION66(A)
Punishment for sending offensive messages through communication Service
Penalties: Imprisonment up to 3 years and/or fine
Example:
Bomb Hoax mail
SECTION 66 (D): Punishment for cheating by personation by using computer
resource
Penalties: Imprisonment which may extend to 3 years and fine which may extend to
one lakh rupees.
Example:
Samdeep Varghese v/s State of Kerala
SECTION 66 (E):
Punishment for violation of privacy
Penalties: Imprisonment which may extend to 3 years or with fine not exceeding
two lakh rupees, or with both.

Example:
Nagpur Congress leader’s son MMS scandal
SECTION 66 (F):
Punishment for cyber terrorism
Penalties: Imprisonment which may extend to imprisonment for life.
Example:
Parliament attack case





Strengthening and standardizing banks infrastructure
Communication and networking
Inter branch connectivity
‘Cyber Cash’ & ‘cyber books’

E-Banking services:
 ATM
 Electronic fund Transfer
 Electronic clearing service
 Credit card/debit card
 Sms banking
 Internet banking


Trade association of IT and BPO industry



NPO with over 1400 members



Facilitates business and trade in software and services



Encourages advancement of research in software technology.
Initiatives taken by NASSCOM:
• Domestic Market Initiative
• Innovation Initiative
• Education Initiative
• Women in Leadership IT Initiative
1.NMIMS Case

2. Bazee.com case

3.Niraj Ambani’s credit card fraud:
India
1. Freedom of expression is

Brazil
1. Freedom of expression is

wider.
2. Principles of broadcasting not

subject to certain restrictions.
2. Strict principles to be followed

as strict as Brazil.

while broadcasting content in
media.

3. Data protection (DP) rules

3. No data protection law in

– April 2011 enacted

4. Personal data of citizens is
easily accessible

Brazil.

4.

Personal data is accessible
only to citizens and the source
must be safeguarded.
IT ACT 2000

Mais conteúdo relacionado

Mais procurados

It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
 
role of BCI for combact deviance by lawyers
role of BCI for combact deviance by lawyersrole of BCI for combact deviance by lawyers
role of BCI for combact deviance by lawyersChaitanya Limbachiya
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
copyright (under indian cyber law)
copyright (under indian cyber law)copyright (under indian cyber law)
copyright (under indian cyber law)ravindra sharma
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 

Mais procurados (20)

It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
role of BCI for combact deviance by lawyers
role of BCI for combact deviance by lawyersrole of BCI for combact deviance by lawyers
role of BCI for combact deviance by lawyers
 
Cyber law
Cyber lawCyber law
Cyber law
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
E contract
E  contractE  contract
E contract
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
copyright (under indian cyber law)
copyright (under indian cyber law)copyright (under indian cyber law)
copyright (under indian cyber law)
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 

Destaque

IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 

Destaque (8)

It act 2000
It act 2000It act 2000
It act 2000
 
Int509 lec 7-8
Int509 lec 7-8Int509 lec 7-8
Int509 lec 7-8
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Design act 2000
Design act 2000Design act 2000
Design act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
it act 2000
it act 2000it act 2000
it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 

Semelhante a IT ACT 2000

138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Information technology act
Information technology actInformation technology act
Information technology actDeepthiPrabhu9
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final79850
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 

Semelhante a IT ACT 2000 (20)

138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Anil final
Anil finalAnil final
Anil final
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber law11
Cyber law11Cyber law11
Cyber law11
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 

Mais de Kaustubh Barve

Equity Research Report on Banking Sector - A project Report
Equity Research Report on Banking Sector - A project ReportEquity Research Report on Banking Sector - A project Report
Equity Research Report on Banking Sector - A project ReportKaustubh Barve
 
Analysis of a Company on Parameters of Business Model & FInancial Ratios
Analysis of a Company on Parameters of Business Model & FInancial RatiosAnalysis of a Company on Parameters of Business Model & FInancial Ratios
Analysis of a Company on Parameters of Business Model & FInancial RatiosKaustubh Barve
 
AXIS BANK FINANCIAL ANALYSIS
AXIS BANK FINANCIAL ANALYSISAXIS BANK FINANCIAL ANALYSIS
AXIS BANK FINANCIAL ANALYSISKaustubh Barve
 
Listenin Skills and Barriers
Listenin Skills and BarriersListenin Skills and Barriers
Listenin Skills and BarriersKaustubh Barve
 
New Product Development Process
New Product Development ProcessNew Product Development Process
New Product Development ProcessKaustubh Barve
 
Company Analysis - TCS (Tata Consultancy Services)
Company Analysis - TCS (Tata Consultancy Services)Company Analysis - TCS (Tata Consultancy Services)
Company Analysis - TCS (Tata Consultancy Services)Kaustubh Barve
 
Organizational Culture
Organizational CultureOrganizational Culture
Organizational CultureKaustubh Barve
 
Project Report on IPL - Indian Premier League
Project Report on IPL - Indian Premier LeagueProject Report on IPL - Indian Premier League
Project Report on IPL - Indian Premier LeagueKaustubh Barve
 
GLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMY
GLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMYGLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMY
GLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMYKaustubh Barve
 

Mais de Kaustubh Barve (11)

Equity Research Report on Banking Sector - A project Report
Equity Research Report on Banking Sector - A project ReportEquity Research Report on Banking Sector - A project Report
Equity Research Report on Banking Sector - A project Report
 
Analysis of a Company on Parameters of Business Model & FInancial Ratios
Analysis of a Company on Parameters of Business Model & FInancial RatiosAnalysis of a Company on Parameters of Business Model & FInancial Ratios
Analysis of a Company on Parameters of Business Model & FInancial Ratios
 
AXIS BANK FINANCIAL ANALYSIS
AXIS BANK FINANCIAL ANALYSISAXIS BANK FINANCIAL ANALYSIS
AXIS BANK FINANCIAL ANALYSIS
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethics
 
Ratan Tata
Ratan TataRatan Tata
Ratan Tata
 
Listenin Skills and Barriers
Listenin Skills and BarriersListenin Skills and Barriers
Listenin Skills and Barriers
 
New Product Development Process
New Product Development ProcessNew Product Development Process
New Product Development Process
 
Company Analysis - TCS (Tata Consultancy Services)
Company Analysis - TCS (Tata Consultancy Services)Company Analysis - TCS (Tata Consultancy Services)
Company Analysis - TCS (Tata Consultancy Services)
 
Organizational Culture
Organizational CultureOrganizational Culture
Organizational Culture
 
Project Report on IPL - Indian Premier League
Project Report on IPL - Indian Premier LeagueProject Report on IPL - Indian Premier League
Project Report on IPL - Indian Premier League
 
GLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMY
GLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMYGLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMY
GLOBAL FINANCIAL CRISIS & IMPACT ON INDIAN ECONOMY
 

Último

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Último (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 

IT ACT 2000

  • 1.
  • 2. PREPARED BY: PRANAY ADHIKARI (01) KAUSTUBH BARVE (11) KRITI AGRAWAL (03) MEET BHADRA (13) MONICA ANGANE (05) REWAT BHARSAKLE (15) RUCHITA BADRUKA (07) ADITYA BHIMANWAR (17) MEGHA BANSAL (09) AMOL BHOLE (19)
  • 3. Accord legal sanctity to electronic records Provide legal recognition of electronic records, e-transactions, digital signature etc. Facilitate e-governance Establish a regulatory body supervising certifying authorities Amend IPC, 1860, Indian Evidence Act, 1872 , RBI Act, 1934 & Banker’s Books Evidence Act, 1891
  • 4. Increasing use of ICTs in conducting business transactions Adoption of model law by UNICTRAL WTO likely to conduct transactions only in electronic medium Reasons for enactment of IT act No legal protection under the existing laws Growing international trade through electronic means
  • 5.  Need for amendment Increased use of internet and computer Rise in the number of cyber crimes.  Structure of IT act
  • 6. Functions:  Authentication & verification of electronic records by use of asymmetric crypto system and hash function  Identify the sender  Make contents of the document binding on person putting digital signature.
  • 7.
  • 8.  Various methods by which one can sign an electronic record.  Electronic sound, symbol, or process  Example: Typed name or a digitized image of a handwritten signature.  Legalized as valid mode of signature in ITAA 2008
  • 9.  Application of ICTs to the processes of government functioning  Government at your fingertips  4 basic models are G to C, G to E, G to G and G to B.  Example: Railway ticket booking, Gramdoot (Rajasthan)
  • 10.  Trusted body who has been granted a license to issue Digital Signature Certificates.  Function equivalent to that of the passport issuing office in the Government
  • 11.
  • 12.  Unlawful acts where computer is either a tool or target or both  It includes pornography, e-mail, spoofing, forgery, cyber defamation, cyber stalking, e-mail bombing etc.
  • 13. HACKING • Gaining unauthorized access to a computer system • Trespassing any computer PHISHING • Fraudulently acquiring sensitive information by camouflaging as a trustworthy person • Example:Congratulations you have won $100,00,000
  • 14. 1. Number of Cyber Crimes recorded in India in last 5 years: 3500 3000 2500 2000 1500 2876 1000 1791 500 0 966 288 420 2008 2009 965 2010 2011 2012 2013
  • 15. 2. State wise count of the cyber-crime in 2012: 500 400 300 200 100 0 429 471 412 269 205
  • 16. 4. Country wise distribution of cyber crimes:
  • 17. SECTION 43. Penalty and Compensation for damage to computer, computer system, etc: Penalty:Pay damages by way of compensation not exceeding 1 crore rupees to the person so affected. SECTION 43(A). Compensation for failure to protect data: Penalty: Pay damages by way of compensation, not exceeding five crore rupees, to the person so affected. Example: Pune Citibank Mphasis BPO Fraud: 2005
  • 18. SECTION 65. Tampering with Computer Source Documents Penalties: Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both Example: Syed Asifuddin Vs. The State of Andhra Pradesh SECTION 66. Computer Related Offences Penalties: Imprisonment up to 3 years and/or fine of five lakh rupees Example: Kumar v/s Whitley case
  • 19. SECTION66(A) Punishment for sending offensive messages through communication Service Penalties: Imprisonment up to 3 years and/or fine Example: Bomb Hoax mail SECTION 66 (D): Punishment for cheating by personation by using computer resource Penalties: Imprisonment which may extend to 3 years and fine which may extend to one lakh rupees. Example: Samdeep Varghese v/s State of Kerala
  • 20. SECTION 66 (E): Punishment for violation of privacy Penalties: Imprisonment which may extend to 3 years or with fine not exceeding two lakh rupees, or with both. Example: Nagpur Congress leader’s son MMS scandal SECTION 66 (F): Punishment for cyber terrorism Penalties: Imprisonment which may extend to imprisonment for life. Example: Parliament attack case
  • 21.     Strengthening and standardizing banks infrastructure Communication and networking Inter branch connectivity ‘Cyber Cash’ & ‘cyber books’ E-Banking services:  ATM  Electronic fund Transfer  Electronic clearing service  Credit card/debit card  Sms banking  Internet banking
  • 22.  Trade association of IT and BPO industry  NPO with over 1400 members  Facilitates business and trade in software and services  Encourages advancement of research in software technology.
  • 23. Initiatives taken by NASSCOM: • Domestic Market Initiative • Innovation Initiative • Education Initiative • Women in Leadership IT Initiative
  • 24. 1.NMIMS Case 2. Bazee.com case 3.Niraj Ambani’s credit card fraud:
  • 25. India 1. Freedom of expression is Brazil 1. Freedom of expression is wider. 2. Principles of broadcasting not subject to certain restrictions. 2. Strict principles to be followed as strict as Brazil. while broadcasting content in media. 3. Data protection (DP) rules 3. No data protection law in – April 2011 enacted 4. Personal data of citizens is easily accessible Brazil. 4. Personal data is accessible only to citizens and the source must be safeguarded.