SlideShare a Scribd company logo
1 of 21
The Information
Technology Act,
2000
INTRODUCTION
The Information Technology Act, 2000 (IT Act) was passed which
is based on the UNCITRAL Model Law on Electronic Commerce.
The IT Act deals with the following subjects:
(i) Secure electronic transactions to facilitate e-commerce
(ii) attribution of electronic messages
(iii) legal status to electronic signature and electronic records by
providing for the appointment of a Controller of Certifying Authority.
DEFINITIONS
(a)"access" means gaining entry into, instructing or communicating
with the logical, arithmetical, or memory function resources of a
computer, computer system or computer network;
(b)"addressee" means a person who is intended by the originator to
receive the electronic record but does not include any
intermediary;
(c) "adjudicating officer" means an adjudicating officer appointed
under subsection (1) of section 46;
(d)"affixing digital signature" means adoption of any methodology
or procedure by a person for the purpose of authenticating an
electronic record by means of digital signature;
(e)"asymmetric crypto system" means a system of a secure key pair
consisting of a private key for creating a digital signature and a
public key to verify the digital signature;
(h)”Certifying Authority" means a person who has been
granted a license to issue a Digital Signature Certificate under
section 24;
(g)"certification practice statement" means a statement issued
by a Certifying Authority to specify the practices that the
Certifying Authority employs in issuing Digital Signature
Certificates;
(h)"computer" means any electronic magnetic, optical or other
high-speed data processing device or system which performs
logical, arithmetic, and memory functions by manipulations of
electronic, magnetic or optical impulses, and includes all input,
output, processing, storage, computer software, or
communication facilities which are connected or related to the
computer in a computer system or computer network;
(i)”Controller" means the Controller of Certifying Authorities
appointed under sub-section (l) of section 17;
(j)"Cyber Appellate Tribunal" means the Cyber Regulations
Appellate Tribunal established under sub-section (1) of section 48;
(k)"digital signature" means authentication of any electronic record
by a subscriber by means of an electronic method or procedure in
accordance with the provisions of section 3;
(l)"Digital Signature Certificate" means a Digital Signature
Certificate issued under subsection (4)of section 35;
(m)"electronic form" with reference to information means any
information generated, sent, received or stored in media, magnetic,
optical, computer memory, micro film, computer generated micro
fiche or similar device;
(n)"Electronic Gazette" means the Official Gazette published in the
electronic form;
(o)"electronic record" means data, record or data generated,
image or sound stored, received or sent in an electronic form
or micro film or computer generated micro fiche;
(p)"function” in relation to a computer, includes logic, control
arithmetical process, deletion, storage and retrieval and
communication or telecommunication from or within a
computer;
(q)"intermediary" with respect to any particular electronic
message means any person who on behalf of another person
receives, stores or transmits that message or provides any
service with respect to that message;
(r) "key pair“ in an asymmetric crypto system, means a private
key and its mathematically related public key, which are so
related that the public key can verify a digital signature created
by the private key;
(s)"license" means a license granted to a Certifying Authority
under section 24;
(t)"originator" means a person who sends, generates, stores or
transmits any electronic message or causes any electronic
message to be sent, generated, stored or transmitted to any
other person but does not include an intermediary;
(u)"prescribed" means prescribed by rules made under this Act;
(v)"private key" means the key of a key pair used to create a
digital signature;
(w)"public key" means the key of a key pair used to verify a
digital signature and listed in the Digital Signature Certificate;
SCOPE OF THE ACT
i. to provide legal recognition for transactions carried out by
means of electronic data interchange and other means of
electronic communication, commonly referred to as
“electronic commerce”, which involves the use of
alternatives to paper-based methods of communication and
storage of information;
ii. to facilitate electronic filing of documents with the
government agencies;
iii. to facilitate electronic storage of data in place of paper-based
methods of storage of data.
ELECTRONIC GOVERNANCE
 Legal Recognition of Electronic Records (s.4).
Legal Recognition of Digital Signatures (s.5).
 Use of Electronic Record and Digital Signatures in
Government and its Agencies (s.6).
 Retention of Electronic Records (s.7).
 Publication of Rule, Regulation, etc., in Electronic Gazette
(s.8).
 No Right Conferred to Insist that Document should be
Accepted in Electronic form (s.9).
 Power to make Rules by Central Government in Respect of
Digital Signature (s.10).
DIGITAL SIGNATURE
1. Any subscriber may authenticate an electronic record by
affixing his digital signature.
2. The authentication of the electronic record shall be effected
by the use of asymmetric crypto system and hash
function which envelop and transform the initial electronic
record into another electronic record.
3. Any person by the use of a public key of the subscriber can
verify the electronic record.
4. The private key and the public key are unique to the
subscriber and constitute a functioning key pair.
REGULATION OF CERTIFYING
AUTHORITIES
 Appointment of Controller and other officers (s. 17).
 Functions of Controller (s.18).
 Recognition of Foreign Certifying Authorities (s.19).
 Controller to act as Repository (s.20).
 License to Issue Digital Signature Certificates (s.21).
 Application for License (s.22).
 Renewal of License (s.23).
 Procedure for Grant or Rejection of License (s.24).
 Suspension of License (s.25).
 Notice of Suspension of Revocation of License (s.26).
 Power to Delegate (s.27).
 Power to Investigate Contravention (s.28).
 Access to Computers and Data (s.29).
 Certifying Authority to follow Certain Procedures (s.30).
 Certifying Authority to Ensure Compliance of the Act, etc. (s.31).
 Display of License (s.32).
Cyber Regulations Appellate Tribunal
 Establishment of Cyber Appellate Tribunal (s. 48).
 Composition of Cyber Appellate Tribunal (s. 49).
 Qualifications for Appointment as Presiding Officer of the
Tribunal (s.50).
 Term Office (s.51).
 Salary, Allowances and other Terms and Conditions of
Service of Presiding Officer (s.52).
 Filling up of Vacancies (s.53).
 Resignation and Removal (s.54).
 Orders Constituting Appellate Tribunal to be Final and not to
invalidate its proceedings (s.55).
 Staff of the Cyber Appellate Tribunal (s.56).
 Appeal to Cyber Regulations Appellate Tribunal (s.57).
 Procedure and Powers of the Tribunal (s.58).
 Right to Legal Representation (s.59).
 Limitation (s.60).
 Civil Court not to have Jurisdiction (s.61).
 Appeal to High Court (s.62).
 Compounding of Contraventions (s.63).
 Recovery of Penalty (s.64).
OFFENCES
• Sections 65 to 78 make provisions as regards offences
committed under the Act.
 Tampering with Computer Source Document (s.65).
 Hacking with Computer System (s.66).
 Publishing of Information which is Obscene in Electronic
Form (s.67).
 Power of the Controller to give Directions (s.68).
 Directions of Controller to a Subscriber to Extend Facilities
to Decrypt Information (s. 69).
 Protected System (s.70).
 Penalty for Misrepresentation (s.71).
 Breach of Confidentiality and Privacy (s.72).
 Penalty for Publishing Digital Signature Certificate False in
Certain Particulars. (s.73).
 Publication for Fraudulent Purpose (s.74).
 Act to Apply for Offence or Contravention Committed outside
India (s.75).
 Confiscation (s.76).
 Penalties and Confiscation not to Interfere with other
Punishments
(s.77).
 Power to Investigate Offences (s.78).
Penalties and Adjudication
• Penalty for Damage to Computer, Computer System,
etc. (s.43). A person who without permission of the
owner or any other person who is in charge of a
computer, computer system or computer network shall
be liable to pay damages by way of compensation not
exceeding Rs 10 lakh.
• Penalty for Failure to Furnish Information, Return, etc.
(s.44). furnish any document, return or report to the
controller or the certifying Authority fails to furnish the
same.
.
• Power to Adjudicate (s.46). For the purposes of adjudicating
whether any person has committed a contravention of any of
the provisions of this Act or of any rule, regulation, direction
or order made there under.
• Factors to be Taken into Account by the Adjudicating Officer
(s.47). (a) the amount of gain of unfair advantage, whenever
quantifiable, made as a result of the default; (b) the amount of
loss caused to any person as a result of the default; (c) the
repetitive nature of the default
The information technology act 2000
The information technology act 2000
The information technology act 2000
The information technology act 2000

More Related Content

What's hot

It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Interpretation of Taxing Statutes
Interpretation of Taxing StatutesInterpretation of Taxing Statutes
Interpretation of Taxing StatutesBhavik Dholakia
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Winding up of a company
Winding up of a companyWinding up of a company
Winding up of a companyMidhun_manoj
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]Kamal Thakur
 
Warrants in India
Warrants in IndiaWarrants in India
Warrants in Indiaaruagrawal
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Appeals and Adjudication under Income Tax Act
Appeals and Adjudication under Income Tax ActAppeals and Adjudication under Income Tax Act
Appeals and Adjudication under Income Tax ActDVSResearchFoundatio
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 

What's hot (20)

It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Directors
DirectorsDirectors
Directors
 
It act 2000
It act 2000It act 2000
It act 2000
 
Interpretation of Taxing Statutes
Interpretation of Taxing StatutesInterpretation of Taxing Statutes
Interpretation of Taxing Statutes
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Winding up of a company
Winding up of a companyWinding up of a company
Winding up of a company
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
 
Warrants in India
Warrants in IndiaWarrants in India
Warrants in India
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Appeals and Adjudication under Income Tax Act
Appeals and Adjudication under Income Tax ActAppeals and Adjudication under Income Tax Act
Appeals and Adjudication under Income Tax Act
 
Class it act
Class it actClass it act
Class it act
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 

Similar to The information technology act 2000

Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdfNavarajBaniya1
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 

Similar to The information technology act 2000 (20)

Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
It act 2000
It act 2000It act 2000
It act 2000
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 

Recently uploaded

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

The information technology act 2000

  • 2. INTRODUCTION The Information Technology Act, 2000 (IT Act) was passed which is based on the UNCITRAL Model Law on Electronic Commerce. The IT Act deals with the following subjects: (i) Secure electronic transactions to facilitate e-commerce (ii) attribution of electronic messages (iii) legal status to electronic signature and electronic records by providing for the appointment of a Controller of Certifying Authority.
  • 3. DEFINITIONS (a)"access" means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network; (b)"addressee" means a person who is intended by the originator to receive the electronic record but does not include any intermediary; (c) "adjudicating officer" means an adjudicating officer appointed under subsection (1) of section 46; (d)"affixing digital signature" means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature; (e)"asymmetric crypto system" means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature;
  • 4. (h)”Certifying Authority" means a person who has been granted a license to issue a Digital Signature Certificate under section 24; (g)"certification practice statement" means a statement issued by a Certifying Authority to specify the practices that the Certifying Authority employs in issuing Digital Signature Certificates; (h)"computer" means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network;
  • 5. (i)”Controller" means the Controller of Certifying Authorities appointed under sub-section (l) of section 17; (j)"Cyber Appellate Tribunal" means the Cyber Regulations Appellate Tribunal established under sub-section (1) of section 48; (k)"digital signature" means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3; (l)"Digital Signature Certificate" means a Digital Signature Certificate issued under subsection (4)of section 35; (m)"electronic form" with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device; (n)"Electronic Gazette" means the Official Gazette published in the electronic form;
  • 6. (o)"electronic record" means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche; (p)"function” in relation to a computer, includes logic, control arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer; (q)"intermediary" with respect to any particular electronic message means any person who on behalf of another person receives, stores or transmits that message or provides any service with respect to that message; (r) "key pair“ in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key;
  • 7. (s)"license" means a license granted to a Certifying Authority under section 24; (t)"originator" means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary; (u)"prescribed" means prescribed by rules made under this Act; (v)"private key" means the key of a key pair used to create a digital signature; (w)"public key" means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate;
  • 8. SCOPE OF THE ACT i. to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involves the use of alternatives to paper-based methods of communication and storage of information; ii. to facilitate electronic filing of documents with the government agencies; iii. to facilitate electronic storage of data in place of paper-based methods of storage of data.
  • 9. ELECTRONIC GOVERNANCE  Legal Recognition of Electronic Records (s.4). Legal Recognition of Digital Signatures (s.5).  Use of Electronic Record and Digital Signatures in Government and its Agencies (s.6).  Retention of Electronic Records (s.7).  Publication of Rule, Regulation, etc., in Electronic Gazette (s.8).  No Right Conferred to Insist that Document should be Accepted in Electronic form (s.9).  Power to make Rules by Central Government in Respect of Digital Signature (s.10).
  • 10. DIGITAL SIGNATURE 1. Any subscriber may authenticate an electronic record by affixing his digital signature. 2. The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. 3. Any person by the use of a public key of the subscriber can verify the electronic record. 4. The private key and the public key are unique to the subscriber and constitute a functioning key pair.
  • 11. REGULATION OF CERTIFYING AUTHORITIES  Appointment of Controller and other officers (s. 17).  Functions of Controller (s.18).  Recognition of Foreign Certifying Authorities (s.19).  Controller to act as Repository (s.20).  License to Issue Digital Signature Certificates (s.21).  Application for License (s.22).  Renewal of License (s.23).  Procedure for Grant or Rejection of License (s.24).  Suspension of License (s.25).  Notice of Suspension of Revocation of License (s.26).  Power to Delegate (s.27).  Power to Investigate Contravention (s.28).  Access to Computers and Data (s.29).  Certifying Authority to follow Certain Procedures (s.30).  Certifying Authority to Ensure Compliance of the Act, etc. (s.31).  Display of License (s.32).
  • 12. Cyber Regulations Appellate Tribunal  Establishment of Cyber Appellate Tribunal (s. 48).  Composition of Cyber Appellate Tribunal (s. 49).  Qualifications for Appointment as Presiding Officer of the Tribunal (s.50).  Term Office (s.51).  Salary, Allowances and other Terms and Conditions of Service of Presiding Officer (s.52).  Filling up of Vacancies (s.53).  Resignation and Removal (s.54).  Orders Constituting Appellate Tribunal to be Final and not to invalidate its proceedings (s.55).  Staff of the Cyber Appellate Tribunal (s.56).
  • 13.  Appeal to Cyber Regulations Appellate Tribunal (s.57).  Procedure and Powers of the Tribunal (s.58).  Right to Legal Representation (s.59).  Limitation (s.60).  Civil Court not to have Jurisdiction (s.61).  Appeal to High Court (s.62).  Compounding of Contraventions (s.63).  Recovery of Penalty (s.64).
  • 14. OFFENCES • Sections 65 to 78 make provisions as regards offences committed under the Act.  Tampering with Computer Source Document (s.65).  Hacking with Computer System (s.66).  Publishing of Information which is Obscene in Electronic Form (s.67).  Power of the Controller to give Directions (s.68).  Directions of Controller to a Subscriber to Extend Facilities to Decrypt Information (s. 69).  Protected System (s.70).  Penalty for Misrepresentation (s.71).
  • 15.  Breach of Confidentiality and Privacy (s.72).  Penalty for Publishing Digital Signature Certificate False in Certain Particulars. (s.73).  Publication for Fraudulent Purpose (s.74).  Act to Apply for Offence or Contravention Committed outside India (s.75).  Confiscation (s.76).  Penalties and Confiscation not to Interfere with other Punishments (s.77).  Power to Investigate Offences (s.78).
  • 16. Penalties and Adjudication • Penalty for Damage to Computer, Computer System, etc. (s.43). A person who without permission of the owner or any other person who is in charge of a computer, computer system or computer network shall be liable to pay damages by way of compensation not exceeding Rs 10 lakh. • Penalty for Failure to Furnish Information, Return, etc. (s.44). furnish any document, return or report to the controller or the certifying Authority fails to furnish the same. .
  • 17. • Power to Adjudicate (s.46). For the purposes of adjudicating whether any person has committed a contravention of any of the provisions of this Act or of any rule, regulation, direction or order made there under. • Factors to be Taken into Account by the Adjudicating Officer (s.47). (a) the amount of gain of unfair advantage, whenever quantifiable, made as a result of the default; (b) the amount of loss caused to any person as a result of the default; (c) the repetitive nature of the default