Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Nächste SlideShare
Presentation1.ppt
Presentation1.ppt
Wird geladen in …3
×

Hier ansehen

1 von 5 Anzeige

Weitere Verwandte Inhalte

Ähnlich wie IT ACT Sec 66.ppt (20)

Aktuellste (20)

Anzeige

IT ACT Sec 66.ppt

  1. 1. Information Technology Act, 2000 Section 66 of the Information Technology Act, 2000 deals with computer-related offenses. Under this section, any person who commits any of the following actions can be punished with imprisonment and/or a fine:
  2. 2. • Tampering with computer source documents: This refers to altering or destroying computer source documents, with the intention to cause damage or to conceal any wrongdoing. Destroying, deleting, or altering computer source documents: This refers to any action that causes damage to computer source documents, with the intention to cause harm or disruption.
  3. 3. • Hacking into a computer system: This refers to unauthorized access to a computer system or network. Accessing computer systems or data without authorization: This refers to accessing a computer system or data without the permission of the owner or authorized user. Obtaining computer resources or services fraudulently: This refers to obtaining computer resources or services by deception or misrepresentation.
  4. 4. • Publishing or transmitting obscene material in electronic form: This refers to the distribution of sexually explicit or offensive material through electronic means, such as email or social media. Publishing or transmitting material which is threatening, abusive, or inflammatory in electronic form: This refers to the distribution of material that is intended to incite violence or hatred, or that is likely to cause fear or alarm, through electronic means. • Cyberstalking: This refers to the use of electronic means to harass or intimidate someone, such as sending repeated threatening messages or posting personal information online without consent.
  5. 5. • Identity theft: This refers to the unauthorized use of another person's personal information, such as their name, address, or credit card details, for fraudulent purposes. • Cheating by personation using computer resource: This refers to the use of a computer or other electronic device to impersonate someone else, with the intention of defrauding or misleading others. It is important to note that these actions are punishable under the act, and a person found guilty of any of these actions can be imprisoned and/or fined.

×