2. INTRODUCTION
• IT Act 2000, was notified on October
17,2000.
• It was opposed by SAVE YOUR
VOICE CAMPAIGN and other civil
society organization in INDIA.
• In that time being, user review and
mouth shut.com a social networking
site had filed a write petition in
supreme court.
• An act to provide legal recognition.
• Referred as ELECTRONIC
RECORDS.
3. ATTRIBUTION OF ELECTRONIC
RECORDS
An electronic record shall be attributed to
the originator:
1. if it was sent by the originator himself.
2. By a person who had the authority to act
on behalf of the originator in respect of
that electronic record
or
3. By an information system programmed
by or on behalf of the orginator to operate
automatically.
4. ACKNOWLEDGEMENT OF
RECEIPT
• Any communication by the addressee,
automated or otherwise or
• Any conduct of the addressee, sufficient to
indicate to the originator that the
electronic record has been received.
• Where the originator has stipulated that
the electronic record shall be binding only
on receipt of an acknowledgement.
5. TIME AND PLACE OF DESPATCH AND
RECEIPT OF ELECTRONIC RECORD
• The time of receipt of an electronic record
shall be determined as follows:
1. If the addressee has designated a
computer resource for the purpose of
receiving electronic records.
2. Receipt occurs at the time when the
electronic, record enters the designated
computer resource.
or
3. If the electronic record is sent to a
computer resource of the addressee that
is not the designated computer resource,
receipt occurs at the time when the
electronic record is retrived by the
addressee.
6. APPOINTMENT OF CONTROLLER
AND OTHER OFFICERS
• Central government may appoint number
of deputy controllers and assistant
controllers as it deems fit.
• Controller shall perform the functions
assigned to them by the controller under
the general superintendence and control of
the controller.
• The qualifications, experience and terms
and conditions of service of controller
shall be such as may be prescribed by the
central government.
• There shall be a seal of the office of the
controller.
7. FUNCTIONS OF CONTROLLER
• Exercising supervision
• Certifying public keys
• Laying down the standards to be
maintained by the certifying authorities.
• Specifying the contents of written, printed
or visual materials and advertisement.
• Specifying the form and manner in which
accounts shall be maintained.
• Specifying the terms and conditions
subject to which auditors may be
appointed.
8. DUTIES OF SUBSCRIBERS
• Generating key pair:
The public key which corresponds to the
private key of the subscribers which is to
be listed in the certificate which the
subscriber would generate the key pair by
applying the security procedure.
• Acceptance of digital signature
certificate:
By accepting the certificate the
subscriber certifies to all who reasonably
rely on the information contained in the
certificate.
9. THE CYBER REGULATIONS
APPELLATE TRIBUNAL
• Establishment of cyber appellate tribunal.
• Composition of cyber appellate tribunal.
• Qualifications for appointment as
presiding officer of the cyber appellate
tribunal.
• Term of officer.
• Filling up of vacancies.
• Orders constituting appellate tribunal to be
final and not to invalidate.
10. DIGITAL SIGNATURE
• Subscriber may authenticate an electronic
record by affixing his digital signature.
• Authentication of the electronic record
shall be affected by the use of asymmetric
crypto system.
• Equivalent to handwritten signature.
• Acknowledgement.
11. ELECTRONIC GOVERNANCE
• Legal recognition of electronic records.
• Legal recognition of digital signature.
• Use of electronic records and digital
signature.
• Retention of electronic records.
• Publication of rules and regulation.
• Power to make rules by central
government.
12. DIGITAL SIGNATURE
CERTIFICATE
• Certifying Authority to issue digital
signature certificate.
• Representation upon issuance of digital
signature certificate.
• Suspension of digital certificate.
• Revocation of Digital Signature
Certificate
• Notice of Suspension or Revocation.
13. SECURE ELECTRONIC RECORDS AND
SECURE DIGITAL SIGNATURES
Secure electronic record.
Secure digital signatures.
Secure procedures.
14. OFFENCES
• Tampering with computer source
document.
• Hacking with computer system.
• Publishing information which is obscene.
• Power of controller.
• Directions of controller.
• Protected system.
15. PENALTIES
• Penalty to damage computer system.
• Penalty for failure to furnish information.
• Penalty for misrepresentation .
• The Gazette of India extra ordinary.
16. CONCLUSIONS
All said and done, the Information Technology Act, 2000 is a great
achievement and a remarkable step ahead in the right achievement and a
remarkable step ahead in the right direction.