Uploaded by Suvi Suvasna

IT ACT,2000

advertisement
Unit 4
• Information Technology Act,2000
Introduction
The Information Technology Act,
2000 provides legal recognition
to the transaction done via
electronic exchange of data and
other electronic means of
communication or electronic
commerce transactions.
This also involves the use of
alternatives to a paper-based
method of communication and
information storage to facilitate
the
electronic
filing
of
documents
with
the
Government agencies.
• 1. To grant legal recognitions for transactions carried out
by means of Electronic Data Interchange and other
means of communication, commonly referred to as ’Electronic Commerce’ in place of paper-based method
of communication.
Objectives of
the act
• 2. To give legal recognitions to Digital Signature, for
authentication of any information or matter that is
subjected to authentication under any law.
• 3. To facilitate Electronic Filing of documents with various
government departments.
• 4. To facilitate electronic storage of data.
• 5. To facilitate and give legal sanctions to Electronic Fund
Transfer between banks and financial institutions.
• 6. To give legal recognitions for maintaining books of
accounts in electronic form by the bankers.
• 7. To Amend the Indian Penal Code, the Indian Evidence
Act of 1872; the Banker’s Book Evidence Act of 1891,
and the Reserve Bank Of India Act of 1934.
SCOPE OF THE ACT
• Information Technology Act, 2000 extend to whole of India. It applies also to any
offence or contravention, thereunder committed outside India. However, the act
does not apply to the following categories of transactions:
• 1. A negotiable instrument other than cheque. It means, the IT Act is applicable to
Cheque.
• 2. A power of attorney.
• 3. A trust as defined in India Trusts Act.
• 4. A will.
• 5. Any contract for sale or conveyance of immovable properties.
• 6. Any such class of documents or transactions as may be notified by the Central
Government in the official Gazette.
DEFINITIONS
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Access—Section
Computer—Section
Computer System
Communication Device
Computer Network
Function—Section
Information—Section
Data—Section
Digital Signature
Electronic Signature
Asymmetric Crypto System
Secure System
Cyber Security
Cyber Café
Intermediary—Section
DIGITAL SIGNATURE
• Digital signature is like a handwritten signature. It should be difficult for the
sender to forge and difficult for the receiver to repudiate (reproduce).
Generation of Digital Signature uses a technology known as Key Pair
(Public Key and Private Key). Users who want to enter into electronic
agreement should have key pair. Public key is for distribution, whereas a
private key is for the user himself.
• For any legal valid electronic document there are two requirements. One is
integrity of document, that is, the document has not been changed and
authentication, i.e., document is signed.
• So, an electronic document to be a legally valid document is two aspects:
• 1. Hash Function is used for integrity of document
• 2. Digital signature used for authentication of documents
• Hash Function
• Electronic Signature
• Reliable Electronic Signature
• Secure Electronic Signature
DIGITAL SIGNATURE CERTIFICATION
• Procedure for Obtaining Digital Certificate
• Suspension of Digital Signature Certificates
• Revocation of Digital Signature Certificates
CYBER APPELLATE TRIBUNAL
• Appellate Tribunal
• Adjudicating Officer
• Powers of Cyber Appellate Tribunal
What Is Cyber Crime And Various Kinds Of Computer Related Offences
• What is a cyber crime?
• Cyber Crime is not defined officially in IT Act or in any other legislation. In fact, it cannot be too.
Offence or crime has been dealt with elaborately listing various acts and the punishments for each,
under the Indian Penal Code, 1860 and related legislations. Hence, the concept of cyber crime is just a
“combination of crime and computer”.
• Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of electronic
operations that targets the security of computer systems and the data processed by them.
• Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means
of, or in relation to, a computer system or network, including such crimes as illegal possession and
offering or distributing information by means of a computer system or network.

Any contract for the sale or conveyance of immovable property or any interest in such property;

Any such class of documents or transactions as may be notified by the Central Government
• KINDS
• Cyber offences are the unlawful acts which are carried in a very
sophisticated manner in which either the computer is the tool or target or
both. Cyber crime usually includes:
(a) Unauthorized access of the computers
(b) Data diddling
(c) Virus/worms attack
(d) Theft of computer system
(e) Hacking
(f) Denial of attacks
(g) Logic bombs
(h) Trojan attacks
(i) Internet time theft
(j) Web jacking
(k) Email bombing
(l) Salami attacks
(m) Physically damaging computer system.
PENALTIES AND ADJUDICATION
• An Adjudicating Officer has the power for holding an inquiry in relation to certain computer crimes and for awarding
compensation. Penalties can be imposed by adjudicating officer for damage of computer or computer network, for:
• 1. Copy or extract any data from database without permission.
• 2. Unauthorized access and downloading.
• 3. Introduction of virus.
• 4. Damage to computer system and computer network.
• 5. Disruption of computer, computer network.
• 6. Denial to authorized person to access computer.
• 7. Providing assistance to any person to facilitate unauthorized access to any computer.
• 8. Charging the service availed by a person to an account of another person by tampering and manipulation of other
computers, etc.
• Section 43 of this act provides for a penalty of compensation to the affected persons for damage to a computer system,
etc. as decided by a Adjudicating Officer.
OFFENCES
• 1. Tampering with computer source documents.
• 2. Damaging a computer or computer system.
• 3. Publishing of information which is obscene in electronic form.
• 4. Electronic forgery, that is, affixing of false digital signature, making false
electronic records.
• 5. Punishment for cyber terrorism.
• 6. Electronic forgery for the purpose of cheating.
• 7. Electronic forgery for the purpose of harming one’s reputation.
• 8. Using as genuine a forged electronic record.
• 9. Publication of digital signature certificate, for fraudulent purpose.
OFFENCES
•
•
•
•
•
10. Offences by companies.
11. Breach of confidentiality and privacy.
12. Publishing false Digital Signature Certificate.
13. Misrepresentation or suppressing of material facts.
14. Destroys, deletes or alters any information residing in a computer
resource or diminishes its value or utility or affects it injuriously by
any means.
• 15. Steal, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code used for a
computer resource with an intention to cause damage
Penalty for Offences
Download