Date post: | 06-Jul-2018 |
Category: |
Documents |
Upload: | gaurav-singh |
View: | 221 times |
Download: | 0 times |
of 86
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
1/86
Information Technology Act 2000- Anoverview
Date: 27th November 2008Venue: National Intitute of !inancial "anagement!ari#aba# $ector-%8& 'ali (oa#
Karnika Seth Partner and Cyber Lawyer
SETH ASSOCIATESADVOCATES AND CONSULTANTS
All rights Reserved Seth Ass!"iates #$$%
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
2/86
IT Act& 2000
)nacte# on *7th "ay2000- In#ia i *2th
nation in the worl# toa#o+t cyber law
IT Act i bae# on"o#el law on e-
commerce a#o+te#by ,NIT(A.
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
3/86
/bective of the IT Act
To +rovi#e legal recognition for tranaction:- arrie# out by mean of electronic #ata interchange& an#
other mean of electronic communication& commonlyreferre# to a 1electronic commerce
To facilitate electronic filing of #ocument with3overnment agencie an# )-'ayment
To amen# the In#ian 'enal o#e& In#ian )vi#ence
Act&*872& the 4an5er6 4oo5 )vi#ence Act*8*&(eerve 4an5 of In#ia Act &*%
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
4/86
)9tent of a++lication
)9ten# to whole of In#ia an# alo a++lie to any offenceor contravention there un#er committe# outi#e In#ia byany +eron ection * ;2- Act
a++lie to offence or contravention committe# outi#eIn#ia by any +eron irre+ective of hi nationality& if uchact involve a com+uter& com+uter ytem or networ5locate# in In#ia
$ection 2 ;*< ;a< ?@ Acce@ mean gaining entry into&intructing or communicating with the logical& arithmeticor memory function reource of a com+uter& com+uterreource or networ5
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
5/86
Definition ; ection 2<
1com+uter 1 mean electronic& magnetic& o+tical or other high-+ee##ate +roceing #evice or ytem which +erform logical& arithmetican# memory function by mani+ulation of electronic& magnetic oro+tical im+ule& an# inclu#e all in+ut& out+ut& +roceing& torage&
com+uter oftware or communication facilitie which are connecte#or relate to the com+uter in a com+uter ytem or com+uternetwor5
1com+uter networ51 mean the inter-connection of one or morecom+uter through-
;i< the ue of atellite& microwave& terretrial lime or other
communication me#ia an# ;ii< terminal or a com+le9 coniting of two or more interconnecte#
com+uter whether or not the interconnection i continuoulymaintaine#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
6/86
Definition ; ection 2<
1com+uter ytem1 mean a #evice or collection of #evice&inclu#ing in+ut an# out+ut u++ort #evice an# e9clu#ing calculatorwhich are not +rogrammable an# ca+able being ue# in conunctionwith e9ternal file which contain com+uter +rogramme& electronic
intruction& in+ut #ata an# out+ut #ata that +erform logic&arithmetic& #ata torage an# retrieval& communication control an#other function
1#ata1 mean a re+reentation of information& 5nowle#ge& fact&conce+t or intruction which are being +re+are# or have been+re+are# in a formalie# manner& an# i inten#e# to be +rocee#&
i being +rocee# or ha been +rocee# in a com+uter ytem orcom+uter networ5& an# may be in any form ;inclu#ing com+uter+rintout magnetic or o+tical torage me#ia& +unche# car#&+unche# ta+e< or tore# internally in the memory of the com+uterB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
7/86
Definition ; ection 2<
1electronic recor#1 mean #ate& recor# or #ate generate#& image or oun#tore#& receive# or ent in an electronic form or micro film or com+utergenerate# micro fiche
ecure ytem@ mean com+uter har#ware& oftware& an# +roce#ure that-
;a< are reaonably ecure from unauthoriCe# acce an# miue;b< +rovi#e a reaonable level of reliability an# correct o+eration;c< are reaonably uite# to +erforming the inten#e# function an#;#< a#here to generally acce+te# ecurity +roce#ure
ecurity +roce#ure@ mean the ecurity +roce#ure +recribe# by theentral 3overnment un#er the IT Act& 2000B
ecure electronic recor# ? where any ecurity +roce#ure ha been a++lie#to an electronic recor# at a +ecific +oint of time& then uch recor# hall be#eeme# to be a ecure electronic recor# from uch +oint of time to the timeof verification
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
8/86
Act i in a++licable to
(a) a negotiable instrument (Other than acheque) as defined in section 13 of the
Negotiable Instruments Act, *88* (b) a power-of-attorne as defined in
section 1A of the !owers-of-Attorne Act,
1""#$ ;c< a trut a #efine# in ection of theIn#ian Trut Act& *882
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
9/86
Act i in a++licable to
(d) a will as defined in clause (h) of section # of theIndian %uccession Act, 1' inclu#ing any othertetamentary #i+oition
(e) an contract for the sale or coneance ofimmoable propert or an interest in uch +ro+erty
(f) an such class of documents or transactions asma be notified b the entral 3overnment
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
10/86
E&C!''er"e
,niveral Internet acce Total Internet economy in 200%
,$ E %B%8 trillion
)-ommerce +en#ing in 200% ,$ E 2B> trillion
)-ommerce in In#ia in 200> (B *&>&000 rore
)-ommerce in Aia in 200>
28F of worl# total
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
11/86
Ele"tr!ni" C!''er"e
) tranaction over theInternet inclu#e !ormation of ontract
Delivery of Information an#$ervice Delivery of ontent
!uture of )lectronicommerce #e+en# on
*the trust that the transacting parties place in the securitof the transmission andcontent of theircommunications+
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
12/86
Ele"tr!ni" (!rld )lectronic #ocument +ro#uce# by a
com+uterB $tore# in #igital form& an#cannot be +erceive# without uing acom+uter It can be #elete#& mo#ifie# an#
rewritten without leaving a mar5 Integrity of an electronic #ocument igenetically@ im+oible to verify
A co+y i in#itinguihable from theoriginal
It can6t be eale# in the tra#itional way&where the author affi9e hi ignature
The function of i#entification&
#eclaration& +roof of electronic#ocument carrie# out uing a #igitalignature bae# on cry+togra+hyB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
13/86
Ele"tr!ni" (!rld
Digital ignature create# an# verifie# uingcry+togra+hy
'ublic 5ey $ytem bae# on Aymmetric
5ey An algorithm generate two #ifferent an# relate#
5ey 'ublic 5ey
'rivate Gey
'rivate 5ey ue# to #igitally ignB
'ublic 5ey ue# to verifyB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
14/86
P)bli" Key *n+rastr)"t)re
Allow +artie to have free acce to the igner6+ublic 5ey
Thi aure that the +ublic 5ey corre+on# tothe igner6 +rivate 5ey Trut between +artie a if they 5now one another
'artie with no tra#ing +artner agreement&
o+erating on o+en networ5& nee# to havehighet level of trut in one another
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
15/86
3overnment ha to +rovi#e the #efinition of the tructure of 'GI the number of level of authority an# their uri#ical
form ;+ublic or +rivate certification<
which authoritie are allowe# to iue 5ey +air the e9tent to which the ue of cry+togra+hy houl#be authorie# for confi#entiality +ur+oe
whether the entral Authority houl# have acceto the encry+te# information when an# how
the 5ey length& it ecurity tan#ar# an# it timevali#ity
Role of the Government
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
16/86
$ection Define Digital
$ignature The authentication to be affecte# by ue of
aymmetric cry+to ytem an# hah
function The +rivate 5ey an# the +ublic 5ey are
uniHue to the ubcriber an# contitute
functioning 5ey +air Verification of electronic recor# +oible
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
17/86
$ecure #igital ignature-$B*>
If by a++lication of a ecurity +roce#ure agree# to by the +artieconcerne#& it can be verifie# that a #igital ignature& at the time itwa affi9e#& wa:;a< uniHue to the ubcriber affi9ing it
;b< ca+able of i#entifying uch ubcriber;c< create# in a manner or uing a mean un#er the e9cluivecontrol of the ubcriber an# i lin5e# to the electronic recor# towhich it relate in uch a manner that if the electronic recor# waaltere# the #igital ignature woul# be invali#ate#&then uch #igital ignature hall be #eeme# to be a ecure #igitalignature
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
18/86
Certi+i"ate based Key
,anage'ent/+erate# by trute#-thir#
+arty - A
'rovi#e Tra#ing 'artnerertificateNotarie the relationhi+
between a +ublic 5ey an#
it owner
CA
User A User -
CA A -
CA A CA -
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
19/86
Essential steps of the digital signature process
STEP 1 The signatory is the authorized holder a unique cryptographic key pair;
STEP 2 The signatory prepares a data message (for example, in the form of an
electronic mail message) on a computer;
STEP 3 The signatory prepares a “message digest”, using a secure hash algorithm.
igital signature creation uses a hash result deri!ed from and unique to the signed
message;
STEP 4 The signatory encrypts the message digest "ith the pri!ate key. The pri!ate
key is applied to the message digest text using a mathematical algorithm. The digital
signature consists of the encrypted message digest,
STEP 5 The signatory typically attaches or appends its digital signature to themessage;
STEP 6 The signatory sends the digital signature and the (unencrypted or encrypted)
message to the relying party electronically;
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
20/86
Essential steps of the digital signature process
STEP 7 The relying party uses the signatory#s pu$lic key to !erify the signatory#sdigital signature. %erification using the signatory#s pu$lic key pro!ides a le!el oftechnical assurance that the message came exclusi!ely from the signatory;
STEP 8 The relying party also creates a “message digest” of the message, using the
same secure hash algorithm; STEP 9 The relying party compares the t"o message digests. &f they are the same, then
the relying party kno"s that the message has not $een altered after it "as signed. '!enif one $it in the message has $een altered after the message has $een digitally signed,the message digest created $y the relying party "ill $e different from the messagedigest created $y the signatory;
STEP 10 here the certification process is resorted to, the relying party o$tains acertificate from the certification ser!ice pro!ider (including through the signatory orother"ise), "hich confirms the digital signature on the signatory#s message. Thecertificate contains the pu$lic key and name of the signatory (and possi$ly additionalinformation), digitally signed $y the certification ser!ice pro!ider.
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
21/86
$ection %- .egal recognition of
)lectronic (ecor# If any information i reHuire# in +rinte# or
written form un#er any law the Information
+rovi#e# in electronic form& which iacceible o a to be uable forubeHuent ue& hall be #eeme# to
atify the reHuirement of +reenting the#ocument in writing or +rinte# formB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
22/86
$ection >& J 7
.egal recognition of Digital $ignature ,e of )lectronic (ecor# in 3overnment J It Agencie
'ublication of rule an# regulation in the )lectronic
3aCetteB
(etention of )lectronic (ecor# Acceibility of information& ame format& +articular of
#i+atch& origin& #etination& time tam+ &etc
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
23/86
CCA has t! reg)late the
+)n"ti!ning !+ CAs in the
"!)ntry by& .icening ertifying Authoritie ;A< un#er ection 2*
of the IT Act an# e9erciing u+erviion over their
activitieB ertifying the +ublic 5ey of the A& iBeB their Digital
$ignature ertificate more commonly 5nown a 'ublicGey ertificate ;'G
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
24/86
The li"ensing .r!"ess
)9amining the a++lication an# accom+anying#ocument a +rovi#e# in ection 2* to 2% of the IT
Act& an# all the (ule an# (egulation there- un#er
A++roving the ertification 'ractice$tatement;'$
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
25/86
A)dit Pr!"ess
A#eHuacy of ecurity +olicie an# im+lementation thereof )9itence of a#eHuate +hyical ecurity
)valuation of functionalitie in technology a it u++ort Ao+eration
A6 ervice a#minitration +rocee an# +roce#ure
om+liance to relevant '$ a a++rove# an# +rovi#e# by theontroller
A#eHuacy to contractKagreement for all outource# Ao+eration
A#herence to Information Technology Act 2000& the rule an#regulation thereun#er& an# gui#eline iue# by the ontrollerfrom time-to-timeB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
26/86
A)dit!rs Panel "K Deloitee La5in J $ell
"K $yman om+uter ;'< .t#B "K 'rice Mater Loue "K yber onultancy 'vtB "K "ahin#ra-4ritih Telecom .t#B
"K Le9aware Technologie .t#B "K e$ecure424Bcom .t#B "K ovany .t#B "K Arthur An#eron
"K Mi+ro Infotech $olution J $ervice "K Tata onultancy $ervice "K )rnt J Ooung 'vtB .t#B "K $B(B 4atliboi J oB
PK* S d d
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
27/86
PK* StandardsPublic Key Cryptography• RSA - Asymmetric Cryptosystem• Dife-Hellman - Asymmetric Cryptosystem
• Elliptic Curve Discrete Logarithm Cryptosystem
igital Signature Stan!ar!"
• RSA, DSA and EC Signature Algorithms
• MD, SHA-! - Hashing Algorithms
irectory Service" #$AP ver %&• "#$$ %or pu&lication o% 'u&lic (ey Certi)cates and Certi)cateRevocation Lists
• "#$* version + 'u&lic (ey Certi)cates
• "#$* version Certi)cate Revocation Lists
PKCS family of "tan!ar!" for Public Key Cryptography from RSA• '(CS! . '(CS!+
'e!eral Information Proce""ing Stan!ar!" #'IPS&• /0'S !1$-! level + and a&ove %or Security Re2uirement o% Cryptographic
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
28/86
Key Si/e 'andated by the
CCA A20%8-bit ($A-5ey
,er *02%-bit ($A-5ey
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
29/86
Li"ensed Certi+ying
A)th!rities
'rovi#e ervice to it ubcriber an# relying +artie a+er it certification +ractice tatement ;'$< which ia++rove# by the A a +art of the licening +roce#ureB
I#entification an# authentication ertificate iuance
ertificate u+enion an# revocation
ertificate renewal
Notification of certificate-relate# information Di+lay of all thee on it webite
Time-tam+ing
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
30/86
*
* **
+elying
arty-u$scri$er -u$scri$er -u$scri$er
irectory of
ertificates
+s
irectory of
ertificates
+s
PKI Hierarchy
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
31/86
$ecuring communication
A in +oition : (oot of trut& National(e+oitory
.icene# A Digital ignature for igning #ocument ertificate& (. for acce by relying +artie 'GI o+erational /ther +roviion of the IT Act ? ybercrime not
to go un+unihe#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
32/86
$ection *>- $ecure Digital
$ignature If Digital ignature are a++lie# in uch a
manner that if )( wa altere# the Digital
$ignature woul# be invali#ate# then it icalle# $ecure# Digital ignature
,niHue to ubcriber
I#entifie the ubcriber
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
33/86
Reg)lati!n !+ Certi+yingA)th!rities 0Cha.ter *V1 The entral 3overnment may a++oint a ontroller of ertifying Authority who hall e9ercie u+erviion over the activitie ofertifying AuthoritieB
ertifying Authority mean a +eron who ha been grante# a licence
to iue a Digital $ignature ertificateB The ontroller of ertifying Authority hall have +ower to lay #own rule& regulation& #utie&re+onibilitie an# function of the ertifying Authority iuingDigital $ignature ertificateB The ertifying Authority em+owere# toiue a Digital $ignature ertificate hall have to +rocure a licenefrom the ontroller of ertifying Authority to iue Digital $ignatureertificateB The ontroller of ertifying Authority ha +recribe##etaile# rule an# regulation in the Act& a to the a++lication forlicene& u+enion of licene an# +roce#ure for grant or reectionof liceneB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
34/86
Digital Signat)re Certi+i"ate
0Cha.ter V**1 Any +eron may ma5e an a++lication to the ertifying Authority for
iue of Digital $ignature ertificateB The ertifying Authority whileiuing uch certificate hall certify that it ha com+lie# with the
+roviion of the ActB The ertifying Authority ha to enure that the ubcriber ;iBeB& a+eron in whoe name the Digital $ignature ertificate i iue#<hol# the +rivate 5ey corre+on#ing to the +ublic 5ey lite# in theDigital $ignature ertificate an# uch +ublic an# +rivate 5eycontitute a functioning 5ey +airB The ertifying Authority ha the+ower to u+en# or revo5e Digital $ignature ertificateB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
35/86
IT Act ?overview of other relevant
+roviion $ection *- entral 3overnment to +recribe
ecurity +roce#ure
$ec *7 to %- A++ointment an# (egulation ofontroller an# certifying authority
$ec > to - /btaining D$
$ec %0 to %2- Dutie of $ubcriber of D$-e9ercie #ue care to retain the +rivate 5ey
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
36/86
$ection *2- Ac5nowle#gement of
(ecei+t If /riginator ha not +ecifie# +articular metho#- Any
communication automate# or otherwie or con#uctto in#icate the recei+t
If +ecifie# that the recei+t i neceary- Thenunle ac5nowle#gement ha been receive#)lectronic (ecor# hall be #eeme# to have beennever ent
Mhere ac5B not receive# within time +ecifie# orwithin reaonable time the originator may give noticeto treat the )lectronic recor# a though never ent
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
37/86
$ection *- Di+atch of )lectronic
recor# ,nle otherwie agree# #i+atch occur when )( enter reource
outi#e the control of originator If a##reee ha a #eignate# com+uter reource & recei+t occur at
time )( enter the #eignate# com+uter& if electronic recor# i ent
to a com+uter reource of a##reee that i not #eignate# & recei+toccur when )( i retrieve# by a##reee If no om+uter (eource #eignate#- when )( enter om+uter
(eource of A##reeeB
$hall be #eeme# to be #i+atche# an# receive# where originator
ha their +rinci+al +lace of buine otherwie at hi uual +lace ofrei#ence
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
38/86
Civil (r!ngs )nder *T A"t
ha+ter IP of IT Act& $ection % Mhoever without +ermiion of owner of the com+uter
$ecure acce ;mere ,KA acce< Not necearily through a networ5
Downloa#& co+ie& e9tract any #ata Intro#uce or caue to be intro#uce# any virue or
contaminant Damage or caue to be #amage# any com+uter reource
Detroy& alter& #elete& a##& mo#ify or rearrange hange the format of a file
Diru+t or caue #iru+tion of any com+uter reource 'reventing normal continuance of com+uter
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
39/86
Denie or caue #enial of acce by any mean Denial of ervice attac5
Ait any +eron to #o any thing above (ogue Mebite& $earch )ngine& Ini#er +rovi#ing
vulnerabilitie
harge the ervice availe# by a +eron to the account ofanother +eron by tam+ering or mani+ulating any com+uterreource re#it car# frau#& Internet time theft
.iable to +ay #amage not e9cee#ing (B /ne crore to theaffecte# +arty
Invetigation by ADR,DIATIN3 /!!I)( 'ower of a civil court
Civil (r!ngs )nder *T A"t
2C!ntd34
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
40/86
Data diddling5 changing #ata +rior or
#uring in+ut into a com+uter $ection an# %;#< of the IBTB Act cover the offenceof #ata #i##ling
'enalty: Not e9cee#ing (B * crore
Case in .!int 5
NDMC Electricity Billing Fraud Case5 A +rivatecontractor who wa to #eal with recei+t an# accountingof electricity bill by the ND"& DelhiB ollection ofmoney& com+uteriCe# accounting& recor# maintenancean# remittance in hi ban5 who mia++ro+riate# hugeamount of fun# by mani+ulating #ata file to how lerecei+t an# ban5 remittanceB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
41/86
Se"ti!n 67 *T A"t
%ection of the IT Act tate that an a#u#icating officerhall be a#u#ging whether a +eron ha committe# acontravention of any of the +roviion of the ai# Act& byhol#ing an inHuiryB 'rinci+le of Au#i alterum +artum an# natural
utice are enhrine# in the ai# ection which ti+ulate thata reaonable o++ortunity of ma5ing a re+reentation hall begrante# to the concerne# +eron who i allege# to haveviolate# the +roviion of the IT ActB The ai# Act ti+ulatethat the inHuiry will be carrie# out in the manner a +recribe#by the entral 3overnment
All +rocee#ing before him are #eeme# to be u#icial+rocee#ing& every A#u#icating /fficer ha all +ower conferre#on civil court
A++eal to cyber A++ellate Tribunal- from #eciion of ontroller& A#u#icating /fficer ection >7 IT Act=
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
42/86
Section 47, IT Act
$ection %7 of the Act lay #own that while a#u#ging theHuantum of com+enation un#er thi Act& the a#u#icatingofficer hall have #ue regar# to the following factor&namely-
;a< the amount of gain of unfair a#vantage& whereverHuantifiable& ma#e a a reult of the #efault
;b< the amount of lo caue# to any +eron a a reult ofthe #efault
;c< the re+etitive nature of the #efault
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
43/86
Cyber"ri'e .r!visi!ns )nder *TCyber"ri'e .r!visi!ns )nder *T
A"t8#$$$A"t8#$$$ O++en"es 9 Relevant Se"ti!ns )nder *T A"t
Tam+ering with om+uter ource #ocument $ecB>Lac5ing with om+uter ytem& Data alteration $ecB'ublihing obcene information $ecB7
,n-authoriCe# acce to +rotecte# ytem $ecB70
4reach of onfi#entiality an# 'rivacy $ecB72'ublihing fale #igital ignature certificate $ecB7
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
44/86
T:PES O; C:-ER CR*,ES yber terrorim
yber +ornogra+hy Defamation
yber tal5ing ;ection >0 I'<
$ale of illegal article-narcotic&wea+on& wil#life
/nline gambling Intellectual 'ro+erty crime- oftware
+iracy& co+yright infringement&tra#emar5 violation& theft of com+uterource co#e
)mail +oofing !orgery
'hiing
re#it car# frau#
rime againt +ro+erty
rime againt 3overnment
rime againt +eron
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
45/86
T:PES O; C:-ER CR*,ES
yber crime
Lac5ing
Information
Theft
bombing
$alami
attac5
Denial of
$erviceattac5
Troan
attac5
Meb ac5ing
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
46/86
;re
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
47/86
Se"ti!n 7=5 S!)r"e C!de
"ot im+ortant aet of oftware com+anie om+uter $ource o#e1 mean the liting of
+rogramme& com+uter comman#& #eignan# layout
Ingre#ientGnowle#ge or intentiononcealment& #etruction& alterationcom+uter ource co#e reHuire# to be 5e+t or
maintaine# by law
'unihment im+rionment u+ to three year an# K or fine u+ to (B 2 la5h
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
48/86
Se"ti!n 775 >a"king
S *ngredients ? *ntenti!n !r Kn!wledge t! "a)se wr!ng+)l l!ss
!r da'age t! the .)bli" !r any .ers!n
? Destr)"ti!n8 deleti!n8 alterati!n8 di'inishing
val)e !r )tility !r in?)ri!)sly a++e"ting in+!r'ati!n residing in a "!'.)ter res!)r"e
S P)nish'ent ? i'.ris!n'ent ). t! three years8 and @ !r
?+ine ). t! Rs3 # lakh
S C!gni/able8 N!n -ailable8
%ection coers data theft aswell as data alteration%ection coers data theft aswell as data alteration
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
49/86
Se"3 73 P!rn!gra.hy
Ingre#ient 'ublihing or tranmitting or cauing to be +ublihe# in the electronic form& /bcene material
'unihment /n firt conviction
im+rionment of either #ecri+tion u+ to five year an# fine u+ to (B * la5h
/n ubeHuent conviction im+rionment of either #ecri+tion u+ to ten year an# fine u+ to (B 2 la5h
$ection cover Internet $ervice 'rovi#er& $earch engine& 'ornogra+hic webite
ogniCable& Non-4ailable& R"IK ourt of $eion
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
50/86
Cyber P!rn!gra.hy Cases
D'$ mm cae
Air !orce 4al bharati $chool cae "i Rammu mm cae
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
51/86
State !+ Tamil Nadu Vs Suas
!atti C!nvi"ti!n within
'!nthsThe cae relate# to +oting of obcene& #efamatory an# annoying meageabout a #ivorcee woman in the yahoo meage grou+B )-"ail were aloforwar#e# to the victim for information by the accue# through a fale e-mailaccount o+ene# by him in the name of the victimB The +oting of the meagereulte# in annoying +hone call to the la#y in the belief that he wa olicitingB
The accue# wa a 5nown family frien# of the victim an# wa re+orte#lyinterete# in marrying herB $he however marrie# another +eronB Thi marriagelater en#e# in #ivorce an# the accue# tarte# contacting her once againB /nher reluctance to marry him& the accue# too5 u+ the harament through theInternetB
The accue# i foun# guilty an# convicte# for offence un#er ection %& >0I' an# 7 of IT Act 2000 B Thi i coni#ere# a the firt cae convicte# un#erection 7 of Information Technology Act 2000 in In#iaB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
52/86
The verdi"t eBtra"t
The accue# i foun# guilty of offence un#er ection %& >0 I' an# 7of IT Act 2000 an# the accue# i convicte# an# i entence# for the offenceto un#ergo (I for 2 year un#er % I' an# to +ay fine of (B>00K-an# forthe offence uK >0 I' entence# to un#ergo * year $im+le im+rionment
an# to +ay fine of (B>00K- an# for the offence uK 7 of IT Act 2000 toun#ergo (I for 2 year an# to +ay fine of (B%000K- All entence to runconcurrentlyB@
The accue# +ai# fine amount an# he wa lo#ge# at entral 'rion&hennaiB Thi i coni#ere# a the firt cae convicte# un#er ection 7 of
Information Technology Act 2000 in In#iaB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
53/86
Se" 75 De"ry.ti!n !+
in+!r'ati!n Ingre#ient
ontroller iue or#er to 3overnment agency to interce+tany information tranmitte# through any com+uter reourceB
/r#er i iue# in the interet of the overeignty or integrity of In#ia&
the ecurity of the $tate& frien#ly relation with foreign $tate& +ublic or#er or +reventing incitement for commiion of a cogniCable offence
'eron in charge of the com+uter reource fail to e9ten# all
facilitie an# technical aitance to #ecry+t the information-+unihment u+ to 7 yearB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
54/86
Se" $ Pr!te"ted Syste'
Ingre#ient $ecuring unauthorie# acce or attem+ting to ecure
unauthorie# acce to +rotecte# ytem6
Act covere# by thi ection: $witching com+uter on K off,ing intalle# oftware K har#ware Intalling oftware K har#ware 'ort canning
'unihment Im+rionment u+ to *0 year an# fine
ogniCable& Non-4ailable& ourt of $eion
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
55/86
$ection 7* J 72
Section – 71: Offence Name / 0isrepresentation to the ontroller or the ertifying *uthority Descrition / 0aking any misrepresentation to, or suppression of any material fact from, the
ontroller or the ertifying *uthority for o$taining any licence or igital -ignatureertificate, as the case may $e.
Pena!t" / &mprisonment for a term "hich may extend to 1 years, or "ith fine up to 2 lakh+upees, or "ith $oth
section – 72: Offence Name / enalty for $reach of confidentiality and pri!acy Descrition / *ny person "ho, in pursuance of any of the po"ers conferred under &T *ct, has
secured access to any electronic record, $ook, register, correspondence, information or
document "ithout the consent of the person concerned discloses such electronic record, $ook.,register, correspondence, information, document to any other person. Pena!t" / &mprisonment for a term "hich may extend to 1 years, or "ith fine up to 2 lakh
+upees, or "ith $oth.
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
56/86
$ection 7 J 7%
Section – 73: Offence Name / u$lishing igital -ignature ertificate false in certain particulars Descrition / u$lishing a igital -ignature ertificate or other"ise making it a!aila$le to
any other person "ith the kno"ledge that the ertifying *uthority listed in the certificate hasnot issued it or the su$scri$er listed in the certificate has not accepted it or the certificate has
$een re!oked or suspended, unless such pu$lication is for the purpose of !erifying a digitalsignature created prior to such suspension or re!ocation.
Pena!t" / &mprisonment for a term "hich may extend to 1 years, or "ith fine "hich mayextend to 2 lakh +upees.
Section – 743 Offence Name / u$lication for fraudulent purpose Descrition / reation, pu$lication or other"ise making a!aila$le a igital -ignature ertificate for any fraudulent or unla"ful purpose Pena!ty / &mprisonment for a term "hich may extend to 1 years, or "ith fine up to 2 lakh
+upees, or "ith $oth. .
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
57/86
Cyber "ri'es .)nishable )nder
vari!)s *ndian laws
$en#ing +ornogra+hic or obcene email are +unihable un#er $ection 7 of the IT ActBAn offence un#er thi ection i +unihable on firt conviction with im+rionmentfor a term&which may e9ten# to five year an# with fine& which may e9ten# to /nela5h ru+eeB
In the event of a econ# or ubeHuent conviction the recommen#e# +unihment iim+rionment for a term& which may e9ten# to ten year an# alo with fine which may
e9ten# to Two la5h ru+eeB
)mail that are #efamatory in nature are +unihable un#er $ection >00 of theIn#ian 'enal o#e ;I'
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
58/86
Sending threatening 'essages bye'ail
Se" =$ *PC
Sending de+a'at!ry 'essagesby e'ail
Se" 68 =$$ *PC
;!rgery !+ ele"tr!ni" re"!rds Se" 678 6$8 6F*PC
-!g)s websites8 "yber +ra)ds Se" 6#$ *PC
E'ail s.!!+ing Se" 6F78 6F8 67*PC
Online sale !+ Dr)gs NDPS A"t
(eb & Ga"king Se"3 % *PC
Online sale !+ Ar's Ar's A"t
C!'.)ter Related Cri'es )nder *PC
and S.e"ial Laws
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
59/86
S!'e '!re !++en"es dealt with
)nder *PC
riminal breach of trutK!rau#- $ecB%0>&%0&%08&%0 I'
Detruction of electronic evi#ence-$ecB20%&%77 I'
!ale electronic evi#ence-$ecB* I'
/ffence by or againt +ublic ervant-
$ecB*7&*72&*7&*7> I'
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
60/86
C!gni/ability and -ailability
S N!t 'enti!ned in the A"t& Rely !n Part ** !+ S"hed)le * !+ CrPC
If +unihable with #eath& im+rionment for life orim+rionment for more than 7 year: cogniCable&Non- 4ailable& ourt of $eion
If +unihable with im+rionment for year an#u+war# but not more than 7 year: ogniCable&Non-4ailable& "agitrate of !irt la
If +unihable with im+rionment of le than year:Non-ogniCable& 4ailable& Any "agitrate ; orontroller of A<
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
61/86
P!wer !+ P!li"e t! *nvestigate
• $ection *> rB'BB : 'ower to invetigatecogniCable offenceB
• $ection *>> rB'BB : 'ower to invetigate non
cogniCable offenceB• $ection * rB'BB : $ummon to +ro#uce
#ocumentB• $ection *0 rB'BB : $ummon to reHuire
atten#ance of witneeB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
62/86
P!wer !+ P!li"e t! investigate
2"!ntd34
• $ection *> rB'BB : $earch by +olice officerB• $ection rB'B : 3eneral +roviion a to earch
warrantB•
$ection %7 rB'BB : $earch to arret the accue#B• $ection 78 of IT Act& 2000 : 'ower to invetigate
offence-not below ran5 of D$'B• $ection 80 of IT Act& 2000 : 'ower of +olice officer
to enter any +ublic +lace an# earch J arretB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
63/86
E'ail s.!!+ing5 'ranab "itra & former e9ecutive of 3uarat Ambua ement
+oe# a a woman& (ita 4au& an# create# a fa5e e-mail IDthrough which he contacte# one VB(B Ninawe an Abu Dhabibuinemen B After long cyber relationhi+ an# emotionalmaage "itra ent an e-mail that he woul# commit
uici#e66 if Ninawe en#e# the relationhi+B Le alo gave himanother frien# (uchira $engu+ta666 e-mail ID which wa infact hi econ# bogu a##reB Mhen Ninawe maile# at theother ID he wa hoc5e# to learn that "itra ha# #ie# an#+olice i earching NinaweB "itra e9torte# few lac (u+ee aa#vocate fee etcB "itra even ent e-mail a high court an#
+olice official to e9tort more moneyB Ninawe finally came#own to "umbai to lo#ge a +olice caeB
Q $eth Aociate& 2008 All (ight (eerve#
L l i i t t id tit
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
64/86
Legal .r!visi!ns t! "!)nter identity
the+t The IT Act 2000 in it +reent form #oe not have any +ecific
+roviion to #eal with i#entity theftB Lowever& the )9+ertommittee on Amen#ment to the IT Act 2000 ;whoe re+orti +reently un#er coni#eration by the government fora#o+tion< ha recommen#e# amen#ing the In#ian 'enal o#e;I'< by inerting in it two new ection:
ection %*7A which +recribe +unihment of u+ to yearim+rionment an# fine for Ucheating by uing any uniHuei#entification feature of any other +eronU an#
ection %*A that +recribe +unihment of u+ to > yearim+rionment an# fine for Ucheating by im+eronationU uing anetwor5 or com+uter reourceB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
65/86
;!rgery
Andhra Pradesh TaB Case
In the e9+lanation of the (B 22 rore which warecovere# from the houe of the owner of a +latic firm
by the leuth of vigilance #e+artment& the accue#+eron ubmitte# 000 voucher to legitimiCe theamount recovere#& but after careful crutiny of voucheran# content of hi com+uter it reveale# that all ofthem were ma#e after the rai# were con#ucte# B All
voucher were fa5e com+uteriCe#voucherB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
66/86
Cyber stalking
(itu Gohli ;firt la#y to regiter the cybertal5ing cae< i a victim of cyber-tal5ingB Afrien# of her huban# gave her +hone
number an# name on a chat ite for immoral+ur+oeB A com+uter e9+ert& Gohli wa ableto trace the cul+ritB Now& the latter i beingtrie# for 1outraging the mo#ety of a woman1&
un#er $ection >0 of I'B
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
67/86
Cyber de+a'ati!n
SMC "neumatics #India$ "%t& 'td& %& (oges !)atra5 In#ia6 firt caeof cyber #efamation wa re+orte# when a com+any6 em+loyee;#efen#ant< tarte# en#ing #erogatory& #efamatory an#obcene e-mail about it "anaging DirectorB The e-mail wereanonymou an# freHuent& an# were ent to many of theirbuine aociate to tarnih the image an# goo#will of the
+laintiff com+anyB
The +laintiff wa able to i#entify the #efen#ant with the hel+ of a+rivate com+uter e9+ert an# move# the Delhi Ligh ourtB Thecourt grante# an a#-interim inunction an# retraine# theem+loyee from en#ing& +ublihing an# tranmitting e-mail&
which are #efamatory or #erogatory to the +laintiffB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
68/86
Online ga'bling5 virt)al "asin!s8
Cases !+ '!ney la)ndering
yber lotto cae: In An#hra 'ra#eh one Gola "ohancreate# a webite an# an email a##re on the Internet withthe a##re UeurolotteryuaBnetBU which how hi own
name a beneficiary of *2B> million +oun# in )uro lotteryB After getting confirmation with the email a##re a telgunew+a+er +ublihe# thi a newB
Le gathere# huge um from the +ublic a well a from ome
ban5B The frau# came to light only when a cheHueamounting ( *B7 million #icounte# by him with An#hraban5 got #ihonore#B
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
69/86
Case St)dy& -PO Data The+t
The recently re+orte# cae of a 4an5 !rau# in 'une inwhich ome e9 em+loyee of 4'/ arm of "'hai .t#"ourc)& #efrau#e# ,$ utomer of iti 4an5 to thetune of ($ *B> crore ha raie# concern of many
5in# inclu#ing the role of 1Data 'rotection1B
The crime wa obviouly committe# uing1,nauthoriCe# Acce1 to the 1)lectronic Account$+ace1 of the cutomerB It i therefore firmly within the
#omain of 1yber rime1B
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
70/86
-PO data the+t &Case St)dy
2"!ntd34 ITA-2000 i veratile enough to accommo#ate the
a+ect of crime not covere# by ITA-2000 but covere#by other tatute ince any I' offence committe# withthe ue of 1)lectronic Document1 can be coni#ere#a a crime with the ue of a 1Mritten Document1B1heating1& 1on+iracy1& 14reach of Trut1 etc are
therefore a++licable in the above cae in a##ition toection in ITA-2000B
,n#er ITA-2000 the offence i recogniCe# both un#er$ection an# $ection %B Accor#ingly& the +eroninvolve# are liable for im+rionment an# fine a well a
a liability to +ay #amage to the victim to the ma9imume9tent of ( * crore +er victim for which the1A#u#ication 'roce1 can be invo5e#B
Q $eth Aociate& 2007 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
71/86
-PO data the+t &Case
St)dy 2"!ntd34 The 4'/ i liable for lac5 of ecurity that enable# the commiion
of the frau# a well a becaue of the vicariou re+onibility forthe e9-em+loyeeU involvementB The +roce of getting the 'INnumber wa #uring the tenure of the +eron a 1)m+loyee1 an#hence the organiCation i re+onible for the crimeB
$ome of the +eron who have aite# other in the commiion
of the crime even though they may not be #irectly involve# abeneficiarie will alo be liable un#er $ection % of ITA-2000B ,n#er $ection 7 an# $ection 8> of ITA-2000& vicariou
re+onibilitie are in#icate# both for the 4'/ an# the 4an5 onthe groun# of 1.ac5 of Due Diligence1B
At the ame time& if the crime i invetigate# in In#ia un#er ITA-
2000& then the fact that the 4an5 wa not uing #igital ignaturefor authenticating the cutomer intruction i a matter whichwoul# amount to gro negligence on the +art of the 4an5B
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
72/86
Case St)dy& Case !+ EBt!rti!n !+
,!ney Thr!)gh *nternet
S The com+lainant ha receive# athreatening email an# #eman#e# +rotection
from un5nown +eron claiming to be themember of Lalala 3ang& DubaiB 'oliceregitere# a cae uKB 8%K>0K>** I'B
S The en#er of the email ue# the email ID
9yCyahooBcom J abcyahooBcom an#igne# a hengeC 4abarB
Q $eth Aociate& 2008 All (ight (eerve#
C + E t ti + ,
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
73/86
Case !+ EBt!rti!n !+ ,!ney
Thr!)gh *nternet &Case
St)dy 2"!ntd34S 4oth the email account were trac5e#& #etail
collecte# from I$'6 J location were i#entifie#B
S The yber cafe from which the email habeen ma#e were monitore# an# the accue#
+eron wa nabbe# re# han#e#B
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
74/86
;*R NO 7@$# PS PARL*A,ENT
STREET
,rs3 SON*A HAND>* RECE*VED T>REAT*NH E&,A*LS
E& ,A*L ;RO,
'iss!nrevenge%6Ikhalsa3"!' 'issi!nrevenge%6Ih!t'ail3"!'
T>E CASE (AS RE;ERRED
ACCUSED PERSON LOST >*S PARENTS DUR*NH
F%6 R*OTS
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
75/86
/ther im+ortant +roviion of
the IT Act& 2000 Se" 6% t! 76& +recribe for etablihment of A++ellate tribunal etc an# com+oun#ing ofcontravention& A++eal to Ligh court within 0 #ay from #eciion of yber a++ellate tribunal B
Net w!rk servi"e .r!vider -$ection 7- +rovi#e for non liability of networ5 ervice +rovi#er incertain cae if he +rove that the offence or contravention wa committe# without hi 5nowle#geor that he ha# e9ercie# all #ue #iligence to +revent the commiion of uch offence or
contravention
./planation0!or the +ur+oe of thi ection& W
(a) 1networ5 ervice +rovi#er1 mean an interme#iary
(b) 1thir# +arty information1 mean any information #ealt with by a networ5 ervice +rovi#er in hi
ca+acity a an interme#iary
Se"ti!n %=& cor+orate re+onibility-offence by com+anie ?#irector manager liable unle he+rove that the offence or contravention wa committe# without hi 5nowle#ge or that he ha#e9ercie# all #ue #iligence to +revent the commiion of uch offence or contravention
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
76/86
Amen#ment- In#ian )vi#ence
Act *872 $ection of the )vi#ence
Act amen#e# to ta5e careof a#miibility of )( a
evi#ence along with the+a+er bae# recor# a+art of the #ocumentwhich can be +ro#uce#
before the court forin+ectionB
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
77/86
'reum+tion in law
In any +rocee#ing involving a ecureelectronic recor#& the court hall +reume&
unle contrary i +rove#& that the ecureelectronic recor# ha not been altere#ince the +ecific +oint of time& to which
the ecure tatu relate
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
78/86
'reum+tion in law
The law alo +reume that in any+rocee#ing& involving ecure #igital
ignature& the court hall +reume& unlethe contrary i +rove#& that the ecure#igital ignature i affi9e# by the
ubcriber with the intention of igning ora++roving the electronic recor#
% i t 2 d t N tl %A 200 ;
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
79/86
%ociete 2es products Nestle %A case 200 ; <'T % J %tate ohd Af4al,
200 ;7< AD ;Delhi
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
80/86
Im+ortant iue to +on#erBBIT Acti incom+leteXX
D$ $houl# not be technology +ecific buttechnology neutral- namely aymmetric
cry+to ytem an# hah function Domain Name an# right of #omain
name owner an# Huatting
I'( iue not a##ree# $'A" iue
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
81/86
I IT Act incom+leteX
New form of cyber crime Internet 4an5ing& )-fun# tranfer an# e-
+ayment lawB yber Ta9ation iue:-
Ruri#ictional +roblem ')- iue whether a webite a ') 'roblem of uri#iction an# e9traterritorial uri#iction
India 56,Independent News %erice !t ltd India7roadcast lie 88, #99:(1')28 '#1
'rivacy concern
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
82/86
Re.!rt !+ the EB.ert C!''ittee
Pr!.!sed A'end'ents t!
*n+!r'ati!n Te"hn!l!gy A"t #$$$%;A
'ro+oal to a## $ecB %;2< relate# to han#ling of enitive +eronal#ata or information with reaonable ecurity +ractice an# +roce#urethereto
;ii< 3ra#ation of everity of com+uter relate# offence un#er $ection& committe# #ihonetly or frau#ulently an# +unihment thereof
;iii< 'ro+oe# a##itional $ection 72 ;2< for breach of confi#entialitywith intent to caue inury to a ubcriberB
A new ection on $ection 7 ;2< ha been a##e# to a##re chil#+ornogra+hy with higher +unihment& a globally acce+te# offene
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
83/86
$uggetion from (e+ort of the )9+ertommittee ;cont#BB<
A new +henomenon of vi#eo voyeurim ha emerge# inrecent time where image of +rivate area of anin#ivi#ual are ca+ture# without hi 5nowle#ge an# thentranmitte# wi#ely without hi conent thu violating
+rivacy rightB Thi ha been +ecifically a##ree# ina new +ro+oe# ub-ection 72;
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
84/86
POS*T*VE *N*T*AT*VES 9
RECO,,ENDAT*ONS
"umbai yber lab i a oint initiative of "umbai +olice an# NA$$/" ha beenet u+B
$uggete# amen#ment to the IT Act&2000-new +roviion for chil# +ornogra+hy&etcB
%tricter proisions for online offences required as compared to offline mode since
qualitatie impact of online offences is much more than offline offences and punishments need to be commensurate with negatie impact suffered b ictim B "ore 'ublic awarene cam+aign Training of +olice officer to effectively combat cyber crime-In a +ublic-+rivate
+artnerhi+& +ublic ector anara 4an5& the Garnata5a 'olice #e+artment an#NA$$/" have ointly et u+ the lab& which woul# train *&000 official everyyearB The traine# officer woul# be able to analye an# crutinie #ata on har##i5& trac5 e-mail& e9tract evi#ence uing internet an# mobile +hone an# cybercrime-relate# legilationB
Q $eth Aociate& 2008 All (ight (eerve#
POS*T*VE *N*T*AT*VES 9
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
85/86
POS*T*VE *N*T*AT*VES 9
RECO,,ENDAT*ONS 2C!ntd34
"ore yber crime +olice cell et u+ acro the country
)ffective )-urveillance
Mebite ai# in creating awarene an# encouraging
re+orting of cyber crime caeB $+ecialiCe# Training of forenic invetigator an# e9+ert
Active coor#ination between +olice an# other lawenforcement agencie an# authoritie i reHuire#B
NA$$/"& in aociation with the han#igarh
a#minitration& inaugurate# a tate- of-the-art (egional yber$ecurity an# (eearch entre ;($(< at han#igarhB
Q $eth Aociate& 2008 All (ight (eerve#
8/17/2019 Information Technology Act2000 Anoverview Sethassociatesppt 130310085756 Phpapp02 (1)
86/86
In cae you have any Huerie +leae feel free to write in at
Garni5aethaociateBcom
SETH ASSOCIATES AD34CA5ES A6D LE7AL C46S8L5A65S
Cor*orate 'a) +ice:4-*0& $ector %0& N/IDA-20*0*& NBB(& In#ia
Tel: Y* ;*20< %>28%& Y* 8*0*>>7
!a9: Y* ;*20< %*0%
)-mail: mailethaociateBcom
mailto:[email protected]:[email protected]:[email protected]:[email protected]