SlideShare uma empresa Scribd logo
1 de 17
IT ACT, 2000
SUDARSAN SUBRAMANIAN
MBA-ABM
KERALA AGRICULTURAL UNIVERSITY
IT Act, 2000
 Enacted on 17th May 2000-
India is 12th nation in the
world to adopt cyber laws
 IT Act is based on Model law
on e-commerce adopted by
UNCITRAL ( United Nations
Commission on International Trade
Law)
2
Objectives of the IT Act
 To provide legal recognition for transactions:-
Carried out by means of electronic data interchange, and other
means of electronic communication, commonly referred to as
"electronic commerce“
 To facilitate electronic filing of documents with Government agencies
and E-Payments
 To amend the Indian Penal Code, Indian Evidence Act,1872, the
Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
3
Extent of application
 Extends to whole of India and also applies to any offence or
contravention there under committed outside India by any
person {section 1 (2)} read with Section 75- Act applies to
offence or contravention committed outside India by any
person irrespective of his nationality, if such act involves a
computer, computer system or network located in India
 Section 2 (1) (a) –”Access” means gaining entry into
,instructing or communicating with the logical, arithmetic or
memory function resources of a computer, computer
resource or network
4
IT Act –overview of relevant provisions
 Section 16- Central Government to prescribe security
procedures
 Sec 17 to 34- Appointment and Regulation of
Controller and certifying authority
 Sec 35 to 39- Obtaining DSC
 Sec 40 to 42- Duties of Subscriber of DSC- exercise
due care to retain the private key
5
 Chapter IX of IT Act, Section 43
 Whoever without permission of owner of the computer
o Secures access
• Not necessarily through a network
o Downloads, copies, extracts any data
o Introduces or causes to be introduced any viruses or
contaminant
o Damages or causes to be damaged any computer
resource
• Destroy, alter, delete, add, modify or rearrange
• Change the format of a file
o Disrupts or causes disruption of any computer resource
Civil crimes under IT Act 6
 Denies or causes denial of access by any means
o Denial of service attacks
 Assists any person to do any thing above
o Rogue Websites, Search Engines, Insiders providing vulnerabilities
 Charges the services availed by a person to the account of another
person by tampering or manipulating any computer resource
o Credit card frauds, Internet time thefts
Civil crimes under IT Act (Contd.) 7
Offences & Relevant Sections
under IT Act
Tampering with Computer source documents
Sec.65
Hacking with Computer systems, Data alteration
Sec.66
Publishing obscene information
Sec.67
Un-authorized access to protected system
Sec.70
Breach of Confidentiality and Privacy
Sec.72
Publishing false digital signature certificates
Sec.73
8
Types of cyber crimes
 Cyber terrorism
 Phishing
 Credit card frauds
 Sale of illegal articles-narcotics, weapons, wildlife
 Online gambling
 Intellectual Property crimes- software piracy, copyright
infringement, trademarks violations, theft of computer
source code
 Cyber pornography
 Cyber stalking (section 509 IPC)
 Email spoofing
Crime
against
persons
Crime
against
Govt
Crime
against
property
9
10
Cases
Case-1 11
BK Associates
V/S
Roopesh Ramamoorthy
12
Plaintiff : B.K. Associates, Mumbai
Defender : Roopesh Ramamoorthy, an employee of
B.K.Associates
Case:
On August 26 2012, the plaintiff came to know that the defender, an employee
of themselves had an unauthorized access to the company’s database. The
CCTV footages support the statement of the plaintiff. On the further
investigation it is found that the defender had hacked the company’s database
and stolen the personal details of all the employees and sold it to a third party.
13
Judgement:
The court had found that the defender is guilty under sec 66-A. The court
had noted following allegations by the defender and punished him
accordingly.
1) Unauthorized access to company
2) Hacking the computer system
3) Selling one’s property to another without adequate permission.
Case-2 14
Umashankar Siva Subramanian
v/s
ICICI Bank
15
Plaintiff : Umashankar Siva Subramanian
Defender : ICICI Bank
16
Thank You 
17

Mais conteúdo relacionado

Mais procurados

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
avinashmsy
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

Mais procurados (20)

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
It act 2000
It act 2000It act 2000
It act 2000
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
It act 2000
It act 2000It act 2000
It act 2000
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 

Semelhante a IT ACT 2000

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 

Semelhante a IT ACT 2000 (20)

cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 

Último

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

IT ACT 2000

  • 1. IT ACT, 2000 SUDARSAN SUBRAMANIAN MBA-ABM KERALA AGRICULTURAL UNIVERSITY
  • 2. IT Act, 2000  Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws  IT Act is based on Model law on e-commerce adopted by UNCITRAL ( United Nations Commission on International Trade Law) 2
  • 3. Objectives of the IT Act  To provide legal recognition for transactions:- Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934 3
  • 4. Extent of application  Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India  Section 2 (1) (a) –”Access” means gaining entry into ,instructing or communicating with the logical, arithmetic or memory function resources of a computer, computer resource or network 4
  • 5. IT Act –overview of relevant provisions  Section 16- Central Government to prescribe security procedures  Sec 17 to 34- Appointment and Regulation of Controller and certifying authority  Sec 35 to 39- Obtaining DSC  Sec 40 to 42- Duties of Subscriber of DSC- exercise due care to retain the private key 5
  • 6.  Chapter IX of IT Act, Section 43  Whoever without permission of owner of the computer o Secures access • Not necessarily through a network o Downloads, copies, extracts any data o Introduces or causes to be introduced any viruses or contaminant o Damages or causes to be damaged any computer resource • Destroy, alter, delete, add, modify or rearrange • Change the format of a file o Disrupts or causes disruption of any computer resource Civil crimes under IT Act 6
  • 7.  Denies or causes denial of access by any means o Denial of service attacks  Assists any person to do any thing above o Rogue Websites, Search Engines, Insiders providing vulnerabilities  Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource o Credit card frauds, Internet time thefts Civil crimes under IT Act (Contd.) 7
  • 8. Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73 8
  • 9. Types of cyber crimes  Cyber terrorism  Phishing  Credit card frauds  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code  Cyber pornography  Cyber stalking (section 509 IPC)  Email spoofing Crime against persons Crime against Govt Crime against property 9
  • 12. 12 Plaintiff : B.K. Associates, Mumbai Defender : Roopesh Ramamoorthy, an employee of B.K.Associates Case: On August 26 2012, the plaintiff came to know that the defender, an employee of themselves had an unauthorized access to the company’s database. The CCTV footages support the statement of the plaintiff. On the further investigation it is found that the defender had hacked the company’s database and stolen the personal details of all the employees and sold it to a third party.
  • 13. 13 Judgement: The court had found that the defender is guilty under sec 66-A. The court had noted following allegations by the defender and punished him accordingly. 1) Unauthorized access to company 2) Hacking the computer system 3) Selling one’s property to another without adequate permission.
  • 14. Case-2 14 Umashankar Siva Subramanian v/s ICICI Bank
  • 15. 15 Plaintiff : Umashankar Siva Subramanian Defender : ICICI Bank
  • 16. 16