One of the most extensive and coolest presentations i have made so far on the IT act in India, its implementation and an overview of cyber crimes in India
4. INTRODUCTION
Cyber Crime is any criminal activity done using computers and the
Internet
The focus of the IT Act 2000 was recognition of electronic records and
facilitation of e –commerce
However, the amended IT Act 2008 focuses on Cyber Terrorism and to a
significant extent, Cyber Crime
Issues related to electronic transactions, digital signatures, hacking and
network service providers are covered
5. DEFINITIONS
Access
Computer
Computer Network
Information
Data
Electronic Record
6. MOST COMMON CYBER CRIMES
Phishing
Hacking
Publishing of Obscene Content
Cyber Squatting
Cyber Defamation
7. DIGITAL SIGNATURES
• It is a mathematical scheme for demonstrating the authenticity of a
digital message or document
• Section 3A: Any subscriber may authenticate electronic records by
Electronic Signatures
• Now ‘Digital Signature’ has been made a subset of ‘Electronic Signature’
• Ensures Authentication, Integrity and Non-repudiation
8.
9. LICENSED CAs IN INDIA
Safescrypt (www.safescrypt.com)
NIC (www.nic.in)
IDRBT (www.idrbtca.org.in)
TCS (www.tcs-ca.tcs.co.in)
MTNL Trustline (www.mtnltrustline.com)
GNFC (www.ncodesolutions.com)
e-Mudhra CA (www.e-Mudhra.com)
11. RELEVANT SECTIONS OF THE IT ACT
• Section 66 :
• Hacking and gaining unauthorized access
• Any person who dishonestly, fraudulently indulges in actions as
mentioned in Section 43
• Section 67 :
• Publishing content in electronic form which is obscene
• Any person who circulates/publishes sexually explicit/pornographic
content in electronic form
13. VALIDITY OUTSIDE INDIA
• Section 75 :
• Act to apply for offence or contravention committed outside India
• The provision for the act shall also apply to any offence or
contravention committed outside India by any person irrespective of
his nationality
15. NETWORK PROVIDERS
• Section 79 :
• Network Service providers not to be liable in certain cases
• An intermediary shall not be liable for any third party information data
or communication link made available or hosted by him; subject to
some conditions.
19. STATISTICS
CYBER CRIMES 2009 2010 % change
Cases Arrested Cases Arrested Cases Arrested
1. Tampering computer 21 6 64 79 204 1216.7
source documents
2. Hacking with computer system
a. Loss and damage to 115 63 346 233 200.8 269.8
computer resource
b. Hacking 118 44 164 61 38.9 38.6
3. Publication and 139 141 328 361 135.9 156
transmission of obscene
material
TOTAL (Including Other 420 288 966 799 128.4 177.4
Cases)
20. ADVANTAGES OF THE ACT
Empowers the government departments to accept filing, creating and
retention of official documents in the digital format
The Act legalizes the e-mail as a mode of communication
Digital Signatures and Digital Records can be used as legal and valid
proof for launching litigation in a court of law
Provides statutory remedy to corporates in case the crime against the
accused for breaking into their computer systems or network and
damaging and copying the data is proven
21. LOOPHOLES IN THE ACT
Inapplicability
Digital Signatures: Recognizes only PKI System
Powers of Adjudicating Officers unclear.
Possible Violation of Fundamental Rights
Misuse of Police Powers
No IPR Protection Guaranteed
No mention of ‘Spamming’
22. AWARENESS SURVEY ANALYSIS
Received Spam Mail? What did you do about it?
Deleted
No Marked it after
13% as spam opening
29% it
21%
Deleted
Yes it
87% without
opening
it
50%
Do you check for Secured
Which is NOT a Cyber Crime? Connections?
No
Spamming 10%
13%
Unaware of
Sniffing such a
12% concept
17%
Phishing
5% Biting Yes
67% 73%
Hacking
3%
23. NASSCOM
• Objective:
• To build a growth led and sustainable technology and business services
sector in the country.
• Functions:
• Partnership with the government
• Research on IT and ITES protection of intellectual property
rights
• Reinforce the brand equity of Indian IT and ITES industries
• Increase talent pool in India
• Case-study: Nasscom vs. Ajay Sood & Others
24. ROLE OF IT IN INDIAN BANKING SECTOR
• A paradigm shift.
• Internet has emerged as an important medium for delivery of banking
products & services.
• The Information Technology Act, 2000 has given legal recognition to
creation, transmission and retention of an electronic (or magnetic) data
to be treated as valid proof in a court of law
• Some Technology products in Banking sector include:
• Net Banking
• Online payment of Excise and Service Tax
25. ADVANTAGES TO BANKING SECTOR
• Improved the factors in service quality like:
responsiveness, communication and access.
• It’s generally secure
• Provides 24 hour access
• Allows access to one’s account from virtually
anywhere
• Enhances speed and reliability of financial operations
• Facilitates newer delivery channels like:
• ATMs
• Mobile Banking
• Use of De-mat accounts helps users trade shares online
26. COMBATING CYBER CRIME
• Spam – Filters for E-mails
• Regular Backup of Important data
• Periodic Virus Scan, Malware Scan & Spyware Scan.
• Avoid publishing personal details online.
• While transacting online:
• Check for Valid SSL Certificate
• Check for secured connection (HTTPS)
• In case of any attack or suspicion, do not hesitate to lodge a complaint
with the Cyber Crime Investigation Cell in your city.
• Visit: http://infosecawareness.in/cyber-crime-cells-in-india to find
your nearest CCIC.
27. CONCLUSION
The IT Act is a comprehensive piece of legislation which aims at policing
some of the activities over the Internet
Awareness regarding these cyber laws must be created
Trained law enforcement officials for effective enforcement
Overhaul of judicial system and entire mechanism to deliver justice at
quick speed
Stringent punishments to kill the motive of the criminals
The Act is not the end but only a beginning to a
plethora of legislation that still needs to be formed.