SlideShare a Scribd company logo
1 of 4
A NOTE ON INFORMATION TECHNOLOGY ACT,2000(IT Act,2000)
(This is in addition to the Xerox notes handed out)
Objective:- (please read from the Xerox notes)
IT Act, 2000 was enacted to implement the Model Law on Electronic commerce adopted by the “United Nations
Commission on International Trade Law” also known as “UNCITRAL”, in 1996.
IT Act, 2000 extends to whole of India.
IT Act, 2000 is NOT Applicable to the following Instruments or documents, namely:1) a Negotiable Instrument(ie a Bill of Exchange, Promissory Note and Cheque) other than a CHEQUE.
2) a Power of Attorney
3) a Trust
4) a Will
5) a Contract for the sale or conveyance of immovable property or any interest in such property.
6) any class of documents or transactions as may be notified by the Central Government in the Official Gazette.
The Two principal hurdles which stand in the way of facilitating electronic commerce and electronic governance
are the
1) requirement as to writing and
2) signature for legal recognition
Technical Points:- (certain important definitions found in the Zerox notes)
1) Access S.2(1)(a)
2) Affixing digital signature S.2(1)(d)
3)Certifying Authority. S.2(1) (g):- means a person who has been authorized to issue a Digital Signature Certificate
(DSC) under S.24 of the IT Act, 2000 by the CONTROLLER.
4)Controller:- S.2(1)(m) means the Controller of Certifying Authorities appointed by Central Govt.
5) Computer:- S.2(1)(i)
6) Computer Network:- S.2(1)(j)
7) Computer System:- S.2(1)(l)
8) Computer Resource:-S.2(1)(k)
Legal Recognition of Electronic Records:- S.4
Where ANY LAW provides that information or any other matter shall be in writing or in the typewritten or printed
form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been
satisfied if such information is—
(a) rendered or made available in an electronic form and
(b) accessible so as to be usable for a subsequent reference
Legal Recognition of Digital Signatures:- S.5
If any information or any other matter is required by law to be authenticated by affixing the signature, then
such requirement shall be deemed to have been satisfied if such information or matter is AUTHENTICATED
by means of digital signature affixed in the prescribed manner.
What is authentication?
According to S.3 of the IT Act, 2000, any SUBSCRIBER(ie a person in whose name the DSC is issued) may
AUTHENTICATE an electronic record by AFFIXING his Digital Signature.
What is meant by “Affixing the Digital signature”?
It means the adoption of any methodology or procedure by a person for the purpose of authenticating an
electronic record by means of a Digital signature.
How an authentication of the electronic record done?
It shall be done by the use of “asymmetric crypto system” and “hash function”, which ENVELOP AND TRANSFORM
the initial electronic record into another electronic record.(explanation to S.3, describes “Hash function)
S.2(1) defines “asymmetric crypto system” as a system of a secure KEY PAIR consisting of a Private key for
creating a Digital signature and a Public key to verify the Digital signature/record.
Key pair in an asymmetric crypto system means a Private Key and its MATHEMATICALLY RELATED Public
Key which are SO RELATED that the Public Key can verify a digital signature created by the Private Key.
As stated above, the Public Key encryption uses a system of two keys, namely,
a) a Private Key which only the user knows and Protects with a “Pass word” and
b) a Public Key which the other people use which is generally stored on “Public Key server”.
The “ Controller ” appointed by the Central Government under the IT Act, 2000 is the repository(the person with
whom things are kept) of the Public key server.
A document which is ENCRYPTED with one of the keys can be DECRYPTED only with the other key in the
Key pair.
Digital Signature Certificate is the ELECTRONIC equivalent of a physical signature that uses Cryptographic
Technologies to (1)establish the identity and authenticity of the person signing and (2) ensures that the
digitally signed data remains secure. Digital Signature Certificates are ENDORSED (signed) by a trusted
Authority(the Certifying Authority), which is empowered under the IT Act,2000 to issue them. The Certifying
Authority signs the DSCs with his Private Key to ensure its authenticity.
What is a CYBER CRIME?
It Connotes(means)more of crimes using computers as a tool for perpetration (to commit) or those having
as their end result, the “unauthorized access, manipulation etc., of intangible data stored on a computers
drives or other digital storage media.
Classification of Cyber Crime:It is of two broad types, namely:a)The use of computers and the internet as tools/media to perpetrate(commit)a traditional offence like
online fraud, criminal copyright infringement, defamation etc. Further, the new technologies make these
crimes easier to commit and more difficult to identify and prevent.
b) A computer or computer network is the target or subject of the attack.
Some examples where computer is the target are as follows:(i) Unauthorised access to computer files and programmes. This could occur as a result of password theft or
through the use of trapdoors that make it possible to enter a site bypassing or avoiding security protocols.
Trapdoors are built in for code writers to make quick entry and change and update code when there are
Bugs. Often trapdoors are left open and this can result in someone taking it over and changing code.
(ii) Unauthorized disruption of computer system, network. Here, an entity without the permission, interferes
with the FUNCTIONALITY of computer software or hardware. Viruses,worms, logic bombs, salami attacks,
Trojan horses, denial of service attacks are some of the examples.
Virus is a programme that modifies other programmes and the modified programme replicates.
Trojan horse is a computer programme that performs some apparently useful function but also contains
some malicious hidden code, which may introduce a virus or other bug or may permit unauthorized access
to an outsider.
(iii) Identity theft.
This may be simple such as “password sniffing “ or complex, such as “cross-site scripting” where code put
into a website that forces it to send out information against the will of its owners.
What is the effect of not COMPLYING with the Information Technology Act, 2000?
Non Compliance with the IT Act, 2000 results in either CONTRAVENTION OR AN OFFENCE.
What is a Contravention?
Generally contravention means not following the stipulations of an Act. However, S.43 of the IT Act, 2000
stipulates the following as Contraventions, namely:The following Acts IF DONE WITHOUT THE PERMISSION OF THE OWNER OR ANY OTHER PERSON WHO
IS INCHARGE OF A COMPUTER/NETWORK, are Contraventions:a) accessing or securing access to the computer/network
b) down loading any data or information from the computer/network
c) Introducing or causing to be introduced any computer contaminant or computer virus into the
computer/network
d) damaging or causing to be damaged the computer/network, data, computer data base or any other
programmes residing in it
e) disrupting or causing disruption of the computer/network
f) denying or causing the denial of access to any person authorized to access the computer/network by any
means
g) Providing assistance to any person to facilitate access to the computer/network in contravention of
provisions of the Act, rules or regulations made thereunder
h) CHARGING the services availed of by a person to the account of another person by tampering with or
manipulating any computer network.
As regards the consequence of contravention, the philosophy of dispute settlement under the IT Act,2000 is
through Compensation for damages. Thus, strictly no punishment/penalty can be imposed under S.43 of the
IT Act,2000. The person contravening any of the above eight clauses will be liable to pay DAMAGES by way
of compensation NOT EXCEEDING RUPEES ONE CRORE to the person so affected.
What are Offences?
The following are the offences under the IT Act,2000.
(i) Source code attacks:- knowingly concealing, destroying or altering any computer source code use for a
Computer/network and where computer code is required to be kept by law for the time being in force.
Computer Source code means listing of programmes, computer commands, design and layout and programme
Analysis of computer resource in any form.
(ii) Hacking with Computer system:- Destroying, deleting or altering any information residing in a Computer
resource(Computer resource means Computer, computer system, computer network, data, computer data
base or software) or diminishing its value with intent to cause WRONGFUL LOSS OR DAMAGE to the public
or any person.
(iii) PUBLISHING any material which is lustful or obscene in electronic form
(iv) Securing access to computer/network designated by Government as a “Protected Systems”.( like BARC,
DRDO etc)
(v) Offences relating to Digital signatures like making available DSCs for fraudulent purposes etc.
(vi) Penalty for misrepresentation:- It means misrepresentation to or suppression of any material fact
from the Controller or Certifying Authority for obtaining licence or Digital Signature Certificate
(vii) Non Compliance of the order of the Controller by the Certifying Authority or an employee of the
Certifying Authority.
(ix) Non Compliance of the order of the Controller to a Subscriber(of DSC) to extend facilities to
decrypt certain information in the interest of the sovereignty or integrity of India or the security
of the State.
When an offence is committed, there is punishment and NOT compensation as in the case of Contravention.
The punishment is varying punishment of imprisonment or fine or both according the severity of the offence.
S.75 of the IT Act, 2000 states that the IT Act,2000 applies even for an Offence or Contravention committed
Outside India by ANY PERSON irrespective of his NATIONALITY if the act or conduct constituting the
Offence or contravention INVOLVES a COMPUTER OR COMPUTER SYSTEM OR COMPUTER NETWORK
LOCATED IN INDIA.
S.76 of the IT Act deals with CONFISCATION. It states that any Computer, Computer system, floppies,
compact disks etc., in respect of which any provision of the IT Act, 2000, rules, orders or regulations
are contravened, SHALL BE LIABLE TO CONFISCATION.
@@@@@0@@@@@
It act,2000 note

More Related Content

What's hot

Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000Leo Lukose
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
The information technology act
The information technology actThe information technology act
The information technology actDhii Raymond
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

What's hot (20)

Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Class it act
Class it actClass it act
Class it act
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
The information technology act
The information technology actThe information technology act
The information technology act
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Similar to It act,2000 note

Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 

Similar to It act,2000 note (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
It act
It actIt act
It act
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 

More from videoaakash15

Articlesof association
Articlesof associationArticlesof association
Articlesof associationvideoaakash15
 
Allotment of shares vamsi
Allotment of shares vamsiAllotment of shares vamsi
Allotment of shares vamsivideoaakash15
 
Allotment of shares total
Allotment of shares totalAllotment of shares total
Allotment of shares totalvideoaakash15
 
2448661 issue-of-shares
2448661 issue-of-shares2448661 issue-of-shares
2448661 issue-of-sharesvideoaakash15
 
87099 19849-book bulding process
87099 19849-book bulding process87099 19849-book bulding process
87099 19849-book bulding processvideoaakash15
 
Ultravires. cons.notice & indoor
Ultravires. cons.notice & indoorUltravires. cons.notice & indoor
Ultravires. cons.notice & indoorvideoaakash15
 
Procedure for incorporating a public limited company
Procedure for incorporating a public limited companyProcedure for incorporating a public limited company
Procedure for incorporating a public limited companyvideoaakash15
 
Minor as a member of a limited company
Minor as a member of a limited companyMinor as a member of a limited company
Minor as a member of a limited companyvideoaakash15
 
Mergers and amalgamations
Mergers and amalgamationsMergers and amalgamations
Mergers and amalgamationsvideoaakash15
 
Legal environment of business
Legal environment of businessLegal environment of business
Legal environment of businessvideoaakash15
 
Law of special contracts
Law of special contractsLaw of special contracts
Law of special contractsvideoaakash15
 
Introduction to legal frame work
Introduction to legal frame workIntroduction to legal frame work
Introduction to legal frame workvideoaakash15
 
Exhaus comp old form
Exhaus comp old formExhaus comp old form
Exhaus comp old formvideoaakash15
 

More from videoaakash15 (20)

Articlesof association
Articlesof associationArticlesof association
Articlesof association
 
Allotment shares
Allotment sharesAllotment shares
Allotment shares
 
Ca
CaCa
Ca
 
Allotment of shares vamsi
Allotment of shares vamsiAllotment of shares vamsi
Allotment of shares vamsi
 
Allotment of shares total
Allotment of shares totalAllotment of shares total
Allotment of shares total
 
2448661 issue-of-shares
2448661 issue-of-shares2448661 issue-of-shares
2448661 issue-of-shares
 
87099 19849-book bulding process
87099 19849-book bulding process87099 19849-book bulding process
87099 19849-book bulding process
 
Ultravires. cons.notice & indoor
Ultravires. cons.notice & indoorUltravires. cons.notice & indoor
Ultravires. cons.notice & indoor
 
The contract act
The contract actThe contract act
The contract act
 
Procedure for incorporating a public limited company
Procedure for incorporating a public limited companyProcedure for incorporating a public limited company
Procedure for incorporating a public limited company
 
Notes on wto etc
Notes on wto etcNotes on wto etc
Notes on wto etc
 
Mms la12corsout
Mms la12corsoutMms la12corsout
Mms la12corsout
 
Minor as a member of a limited company
Minor as a member of a limited companyMinor as a member of a limited company
Minor as a member of a limited company
 
Mergers and amalgamations
Mergers and amalgamationsMergers and amalgamations
Mergers and amalgamations
 
Legal environment of business
Legal environment of businessLegal environment of business
Legal environment of business
 
Law of special contracts
Law of special contractsLaw of special contracts
Law of special contracts
 
Ipr notes
Ipr notesIpr notes
Ipr notes
 
Introduction to legal frame work
Introduction to legal frame workIntroduction to legal frame work
Introduction to legal frame work
 
Exhaus comp old form
Exhaus comp old formExhaus comp old form
Exhaus comp old form
 
D mat
D matD mat
D mat
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

It act,2000 note

  • 1. A NOTE ON INFORMATION TECHNOLOGY ACT,2000(IT Act,2000) (This is in addition to the Xerox notes handed out) Objective:- (please read from the Xerox notes) IT Act, 2000 was enacted to implement the Model Law on Electronic commerce adopted by the “United Nations Commission on International Trade Law” also known as “UNCITRAL”, in 1996. IT Act, 2000 extends to whole of India. IT Act, 2000 is NOT Applicable to the following Instruments or documents, namely:1) a Negotiable Instrument(ie a Bill of Exchange, Promissory Note and Cheque) other than a CHEQUE. 2) a Power of Attorney 3) a Trust 4) a Will 5) a Contract for the sale or conveyance of immovable property or any interest in such property. 6) any class of documents or transactions as may be notified by the Central Government in the Official Gazette. The Two principal hurdles which stand in the way of facilitating electronic commerce and electronic governance are the 1) requirement as to writing and 2) signature for legal recognition Technical Points:- (certain important definitions found in the Zerox notes) 1) Access S.2(1)(a) 2) Affixing digital signature S.2(1)(d) 3)Certifying Authority. S.2(1) (g):- means a person who has been authorized to issue a Digital Signature Certificate (DSC) under S.24 of the IT Act, 2000 by the CONTROLLER. 4)Controller:- S.2(1)(m) means the Controller of Certifying Authorities appointed by Central Govt. 5) Computer:- S.2(1)(i) 6) Computer Network:- S.2(1)(j) 7) Computer System:- S.2(1)(l) 8) Computer Resource:-S.2(1)(k) Legal Recognition of Electronic Records:- S.4 Where ANY LAW provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information is— (a) rendered or made available in an electronic form and (b) accessible so as to be usable for a subsequent reference Legal Recognition of Digital Signatures:- S.5 If any information or any other matter is required by law to be authenticated by affixing the signature, then such requirement shall be deemed to have been satisfied if such information or matter is AUTHENTICATED by means of digital signature affixed in the prescribed manner. What is authentication? According to S.3 of the IT Act, 2000, any SUBSCRIBER(ie a person in whose name the DSC is issued) may AUTHENTICATE an electronic record by AFFIXING his Digital Signature. What is meant by “Affixing the Digital signature”? It means the adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of a Digital signature. How an authentication of the electronic record done? It shall be done by the use of “asymmetric crypto system” and “hash function”, which ENVELOP AND TRANSFORM the initial electronic record into another electronic record.(explanation to S.3, describes “Hash function)
  • 2. S.2(1) defines “asymmetric crypto system” as a system of a secure KEY PAIR consisting of a Private key for creating a Digital signature and a Public key to verify the Digital signature/record. Key pair in an asymmetric crypto system means a Private Key and its MATHEMATICALLY RELATED Public Key which are SO RELATED that the Public Key can verify a digital signature created by the Private Key. As stated above, the Public Key encryption uses a system of two keys, namely, a) a Private Key which only the user knows and Protects with a “Pass word” and b) a Public Key which the other people use which is generally stored on “Public Key server”. The “ Controller ” appointed by the Central Government under the IT Act, 2000 is the repository(the person with whom things are kept) of the Public key server. A document which is ENCRYPTED with one of the keys can be DECRYPTED only with the other key in the Key pair. Digital Signature Certificate is the ELECTRONIC equivalent of a physical signature that uses Cryptographic Technologies to (1)establish the identity and authenticity of the person signing and (2) ensures that the digitally signed data remains secure. Digital Signature Certificates are ENDORSED (signed) by a trusted Authority(the Certifying Authority), which is empowered under the IT Act,2000 to issue them. The Certifying Authority signs the DSCs with his Private Key to ensure its authenticity. What is a CYBER CRIME? It Connotes(means)more of crimes using computers as a tool for perpetration (to commit) or those having as their end result, the “unauthorized access, manipulation etc., of intangible data stored on a computers drives or other digital storage media. Classification of Cyber Crime:It is of two broad types, namely:a)The use of computers and the internet as tools/media to perpetrate(commit)a traditional offence like online fraud, criminal copyright infringement, defamation etc. Further, the new technologies make these crimes easier to commit and more difficult to identify and prevent. b) A computer or computer network is the target or subject of the attack. Some examples where computer is the target are as follows:(i) Unauthorised access to computer files and programmes. This could occur as a result of password theft or through the use of trapdoors that make it possible to enter a site bypassing or avoiding security protocols. Trapdoors are built in for code writers to make quick entry and change and update code when there are Bugs. Often trapdoors are left open and this can result in someone taking it over and changing code. (ii) Unauthorized disruption of computer system, network. Here, an entity without the permission, interferes with the FUNCTIONALITY of computer software or hardware. Viruses,worms, logic bombs, salami attacks, Trojan horses, denial of service attacks are some of the examples. Virus is a programme that modifies other programmes and the modified programme replicates. Trojan horse is a computer programme that performs some apparently useful function but also contains some malicious hidden code, which may introduce a virus or other bug or may permit unauthorized access to an outsider. (iii) Identity theft. This may be simple such as “password sniffing “ or complex, such as “cross-site scripting” where code put into a website that forces it to send out information against the will of its owners. What is the effect of not COMPLYING with the Information Technology Act, 2000? Non Compliance with the IT Act, 2000 results in either CONTRAVENTION OR AN OFFENCE. What is a Contravention? Generally contravention means not following the stipulations of an Act. However, S.43 of the IT Act, 2000 stipulates the following as Contraventions, namely:The following Acts IF DONE WITHOUT THE PERMISSION OF THE OWNER OR ANY OTHER PERSON WHO IS INCHARGE OF A COMPUTER/NETWORK, are Contraventions:a) accessing or securing access to the computer/network
  • 3. b) down loading any data or information from the computer/network c) Introducing or causing to be introduced any computer contaminant or computer virus into the computer/network d) damaging or causing to be damaged the computer/network, data, computer data base or any other programmes residing in it e) disrupting or causing disruption of the computer/network f) denying or causing the denial of access to any person authorized to access the computer/network by any means g) Providing assistance to any person to facilitate access to the computer/network in contravention of provisions of the Act, rules or regulations made thereunder h) CHARGING the services availed of by a person to the account of another person by tampering with or manipulating any computer network. As regards the consequence of contravention, the philosophy of dispute settlement under the IT Act,2000 is through Compensation for damages. Thus, strictly no punishment/penalty can be imposed under S.43 of the IT Act,2000. The person contravening any of the above eight clauses will be liable to pay DAMAGES by way of compensation NOT EXCEEDING RUPEES ONE CRORE to the person so affected. What are Offences? The following are the offences under the IT Act,2000. (i) Source code attacks:- knowingly concealing, destroying or altering any computer source code use for a Computer/network and where computer code is required to be kept by law for the time being in force. Computer Source code means listing of programmes, computer commands, design and layout and programme Analysis of computer resource in any form. (ii) Hacking with Computer system:- Destroying, deleting or altering any information residing in a Computer resource(Computer resource means Computer, computer system, computer network, data, computer data base or software) or diminishing its value with intent to cause WRONGFUL LOSS OR DAMAGE to the public or any person. (iii) PUBLISHING any material which is lustful or obscene in electronic form (iv) Securing access to computer/network designated by Government as a “Protected Systems”.( like BARC, DRDO etc) (v) Offences relating to Digital signatures like making available DSCs for fraudulent purposes etc. (vi) Penalty for misrepresentation:- It means misrepresentation to or suppression of any material fact from the Controller or Certifying Authority for obtaining licence or Digital Signature Certificate (vii) Non Compliance of the order of the Controller by the Certifying Authority or an employee of the Certifying Authority. (ix) Non Compliance of the order of the Controller to a Subscriber(of DSC) to extend facilities to decrypt certain information in the interest of the sovereignty or integrity of India or the security of the State. When an offence is committed, there is punishment and NOT compensation as in the case of Contravention. The punishment is varying punishment of imprisonment or fine or both according the severity of the offence. S.75 of the IT Act, 2000 states that the IT Act,2000 applies even for an Offence or Contravention committed Outside India by ANY PERSON irrespective of his NATIONALITY if the act or conduct constituting the Offence or contravention INVOLVES a COMPUTER OR COMPUTER SYSTEM OR COMPUTER NETWORK LOCATED IN INDIA. S.76 of the IT Act deals with CONFISCATION. It states that any Computer, Computer system, floppies, compact disks etc., in respect of which any provision of the IT Act, 2000, rules, orders or regulations are contravened, SHALL BE LIABLE TO CONFISCATION. @@@@@0@@@@@