SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Cyber Law
Prepared By 
Manu Melwin Joy 
Assistant Professor 
Ilahia School of Management Studies 
Kerala, India. 
Phone – 9744551114 
Mail – manu_melwinjoy@yahoo.com 
Kindly restrict the use of slides for personal purpose. 
Please seek permission to reproduce the same in public forms and presentations.
Introduction 
• In discharge of its 
international responsibility, 
the Government of India 
enacted a Law in 2000 
known as Information 
Technology Act 2000. 
• The Act extends to the 
whole of India and it applies 
also to any offence or 
contravention thereon 
committed outside India by 
any person.
Objects of the Act 
• To grant legal recognition to 
electronic records. 
• To grant legal recognition to 
digital signatures. 
• To permit retention of 
information, documents and 
records in electronic forms. 
• To foster use and acceptance of 
electronic records and digital 
signatures in the Government 
offices and its agencies. 
• To prevent possible misuse of 
electronic medium. 
• To prevent and arrest offences as 
well as deter the abuse of 
information Technology.
Digital signature 
• Digital signature is 
authentication of an 
electronic record by a 
subscriber by means of an 
electronic method or 
procedure.
Digital signature 
• Digital signature is created in two 
distinct steps. 
– Electronic record is converted into a 
message digest by using a 
mathematical function known as 
‘hash function’ which digitally 
freezes the electronic record thus 
ensuring the integrity of the content 
of the intended communication 
contained in the electronic record. 
– Identity of the person affixing the 
digital signature is authenticated 
through the use of a private key 
which attaches itself to the message 
digest and which can be verified by 
any person who has the public key 
corresponding to the private key.
Electronic governance 
• Legal recognition of electronic records. 
• Legal recognition of digital signature. 
• Use of electronic records and digital 
signatures in government. 
• Retention of electronic records. 
• Publication of rules, regulations etc in 
Electronic Gazette. 
• Power to make rules by Central 
government in respect of digital signature.
Attribution of electronic records 
• An electronic record shall be 
attributed to the originator 
– If it was sent by the originator 
himself. 
– By a person who had the 
authority to act on behalf of 
the originator in respect of that 
electronic record. 
– By an information system 
programmed by or on behalf of 
the originator to operate 
automatically.
Acknowledgment of electronic records 
• Where the originator has not 
agreed with the addressee that 
the acknowledgment of receipt 
of electronic record be given in 
a particular form or by a 
particular method, an 
acknowledgement may be 
given by 
– Any communication by the 
addressee, automated or 
otherwise. 
– Any conduct of addressee, 
sufficient to indicate to the 
originator that the electronic 
record has been received.
Dispatch of electronic records 
– The dispatch of an electronic record 
occurs when it enters a computer 
resource outside the control of the 
originator. 
– The time of receipt of an electronic 
record shall be determined as 
follows: (a) if the addressee has 
designated a computer resource for 
the purpose of receiving electronic 
records (b) if the addressee has not 
designated a computer resource 
along with specified timings, receipt 
occurs when the electronic record 
enters the computing resource and 
(3) an electronic record is deemed 
to be dispatched from the place of 
business of the originator.
Security of electronic records and 
digital signatures 
• Secure electronic record. 
• Secure digital signature. 
• Security procedure.
Regulation of certifying authorities 
• Certifying authority is a 
person who has granted a 
license to issue a digital 
signature. 
• Appointment of controller 
certifying authorities – The 
central government by 
notification in the official 
gazette appoints a controller 
of certifying authorities.
Regulation of certifying authorities 
• Power to investigate 
contravention and making 
access to computer – The 
controller or any officer 
authorized by him shall 
investigate any contravention 
of the provision of this act, 
regulates or rules made 
thereunder. Those officers in 
such cases, shall have access 
to any computer system or 
data.
Regulation of certifying authorities 
• Functions of Controller. 
– Exercising supervision over the 
activities of the certifying 
authorities. 
– Certifying public keys of the 
certifying authorities. 
– Laying down the standards to 
be maintained by the certifying 
authorities. 
– Specifying the qualification and 
experience which employees of 
the certifying authorities 
should possess.
Digital signature certificates 
• Issue of Digital signature certificate 
– Any person may make an 
application to the certifying 
authority for the issue of a digital 
signature certificate which is 
accompanied by a fee and 
certification practice statement. On 
receipt of an application, the 
certifying authority may, after 
consideration of the certification 
practice statement and after 
making such enquiries it may deem 
fit (a) grand the digital signature 
certificate or (b) for reasons to be 
recorded in writing rejection of 
application.
Digital signature certificates 
• Suspension of Digital 
signature certificate – The 
certifying authority which has 
issued a digital signature 
certificate may suspend such 
certificate (a) on receipt of a 
request to that effect from 
the subscriber or any person 
authorized by him and (b) if it 
is of opinion that the 
certificate should be 
suspended in the public 
interest.
Digital signature certificates 
• Revocation of Digital 
signature certificate - – The 
certifying authority may 
revoke a digital signature 
certificate issued by it (a) 
where the subscriber or any 
other person authorized by 
him makes a request to that 
effect or (b) upon the death 
of the subscriber or (c) upon 
the dissolution of the firm.
Penalty 
• Penalty for damage of 
computer systems – If any 
person without permission of 
owner or any other person 
who is in-charge of the 
computer access, download 
or disrupt the functions, he 
shall be liable to pay damages 
by way of compensation not 
exceeding one crore rupees 
to the person so affected.
Penalty 
• Penalty for failure to furnish 
information – If any person 
who is required to under this 
act fail to furnish any 
document, he shall be liable 
to a penalty not exceeding 
one lakh and fifty thousand 
rupees for each such failure.
Adjudication 
• Power of adjudication – For the 
purpose of adjudication, central 
government shall appoint any 
officer not below the rank of 
director as the adjudicating 
officer. If he is satisfied that the 
person has committed the 
contravention, he may impose 
such penalty as he thinks fit.
Cyber Regulations Appellate Tribunal 
• A cyber appellate tribunal 
shall consists of one person 
only referred to as the 
presiding officer, appointed 
by the central government.
Cyber Regulations Appellate Tribunal 
• Any person aggrieved by an 
order made my controller may 
prefer an appeal to a cyber 
Appellate Tribunal within a 
period of 45 days from the date 
on which a copy of order made 
by the controller is received by 
the person aggrieved. On 
receipt of an appeal, Tribunal 
may after giving the parties an 
opportunity of being heard, pas 
such order thereon as it thinks 
fit.
Cyber Regulations Appellate Tribunal 
• A penalty imposed under this 
act, if it is not paid, shall be 
recovered as an arrear of land 
revenue and the license or 
the digital signature 
certificate, as the case may 
be, shall be suspended till the 
penalty is paid.
Offences 
• Tampering with computer 
source documents – Three 
years imprisonment or fine 
worth two lakhs. 
• Hacking with computer system 
- Three years imprisonment or 
fine worth two lakhs. 
• Publishing of information which 
is obscene in electronic form - 
Ten years imprisonment or fine 
worth two lakhs.
Offences 
• Securing access to protected 
system - Ten years 
imprisonment or fine. 
• Misrepresentation - Two years 
imprisonment or fine of one 
lakh. 
• Breach of confidentiality and 
privacy - Two years 
imprisonment or fine of one 
lakh. 
• Publishing of false digital 
signature certificate - Two years 
imprisonment or fine of one 
lakh.
Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy

Weitere ähnliche Inhalte

Was ist angesagt?

Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Dr. Prashant Vats
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 

Was ist angesagt? (20)

It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 

Andere mochten auch

Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer indiacyberjure
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliAdv Prashant Mali
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 

Andere mochten auch (8)

Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 

Ähnlich wie Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy

IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptxshrutiganpule74
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesDr. Prashant Vats
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
 

Ähnlich wie Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy (20)

IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
Class it act
Class it actClass it act
Class it act
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
 
Cyber
CyberCyber
Cyber
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 

Mehr von manumelwin

Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin JoyVolkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joymanumelwin
 
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...manumelwin
 
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin JoyIKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joymanumelwin
 
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin JoyBletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joymanumelwin
 
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...manumelwin
 
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...manumelwin
 
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...manumelwin
 
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...manumelwin
 
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...manumelwin
 
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...manumelwin
 
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...manumelwin
 
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...manumelwin
 
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...manumelwin
 
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...manumelwin
 
Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...manumelwin
 
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...manumelwin
 
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
 Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joymanumelwin
 
B2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin JoyB2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin Joymanumelwin
 
Industrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin JoyIndustrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin Joymanumelwin
 
Green marketing - Manu Melwin Joy
Green marketing - Manu Melwin JoyGreen marketing - Manu Melwin Joy
Green marketing - Manu Melwin Joymanumelwin
 

Mehr von manumelwin (20)

Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin JoyVolkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
 
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
 
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin JoyIKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
 
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin JoyBletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
 
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
 
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
 
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
 
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
 
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
 
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
 
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
 
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
 
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
 
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
 
Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...
 
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
 
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
 Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
 
B2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin JoyB2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin Joy
 
Industrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin JoyIndustrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin Joy
 
Green marketing - Manu Melwin Joy
Green marketing - Manu Melwin JoyGreen marketing - Manu Melwin Joy
Green marketing - Manu Melwin Joy
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Kürzlich hochgeladen (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy

  • 2. Prepared By Manu Melwin Joy Assistant Professor Ilahia School of Management Studies Kerala, India. Phone – 9744551114 Mail – manu_melwinjoy@yahoo.com Kindly restrict the use of slides for personal purpose. Please seek permission to reproduce the same in public forms and presentations.
  • 3. Introduction • In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. • The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
  • 4. Objects of the Act • To grant legal recognition to electronic records. • To grant legal recognition to digital signatures. • To permit retention of information, documents and records in electronic forms. • To foster use and acceptance of electronic records and digital signatures in the Government offices and its agencies. • To prevent possible misuse of electronic medium. • To prevent and arrest offences as well as deter the abuse of information Technology.
  • 5. Digital signature • Digital signature is authentication of an electronic record by a subscriber by means of an electronic method or procedure.
  • 6. Digital signature • Digital signature is created in two distinct steps. – Electronic record is converted into a message digest by using a mathematical function known as ‘hash function’ which digitally freezes the electronic record thus ensuring the integrity of the content of the intended communication contained in the electronic record. – Identity of the person affixing the digital signature is authenticated through the use of a private key which attaches itself to the message digest and which can be verified by any person who has the public key corresponding to the private key.
  • 7. Electronic governance • Legal recognition of electronic records. • Legal recognition of digital signature. • Use of electronic records and digital signatures in government. • Retention of electronic records. • Publication of rules, regulations etc in Electronic Gazette. • Power to make rules by Central government in respect of digital signature.
  • 8. Attribution of electronic records • An electronic record shall be attributed to the originator – If it was sent by the originator himself. – By a person who had the authority to act on behalf of the originator in respect of that electronic record. – By an information system programmed by or on behalf of the originator to operate automatically.
  • 9. Acknowledgment of electronic records • Where the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, an acknowledgement may be given by – Any communication by the addressee, automated or otherwise. – Any conduct of addressee, sufficient to indicate to the originator that the electronic record has been received.
  • 10. Dispatch of electronic records – The dispatch of an electronic record occurs when it enters a computer resource outside the control of the originator. – The time of receipt of an electronic record shall be determined as follows: (a) if the addressee has designated a computer resource for the purpose of receiving electronic records (b) if the addressee has not designated a computer resource along with specified timings, receipt occurs when the electronic record enters the computing resource and (3) an electronic record is deemed to be dispatched from the place of business of the originator.
  • 11. Security of electronic records and digital signatures • Secure electronic record. • Secure digital signature. • Security procedure.
  • 12. Regulation of certifying authorities • Certifying authority is a person who has granted a license to issue a digital signature. • Appointment of controller certifying authorities – The central government by notification in the official gazette appoints a controller of certifying authorities.
  • 13. Regulation of certifying authorities • Power to investigate contravention and making access to computer – The controller or any officer authorized by him shall investigate any contravention of the provision of this act, regulates or rules made thereunder. Those officers in such cases, shall have access to any computer system or data.
  • 14. Regulation of certifying authorities • Functions of Controller. – Exercising supervision over the activities of the certifying authorities. – Certifying public keys of the certifying authorities. – Laying down the standards to be maintained by the certifying authorities. – Specifying the qualification and experience which employees of the certifying authorities should possess.
  • 15. Digital signature certificates • Issue of Digital signature certificate – Any person may make an application to the certifying authority for the issue of a digital signature certificate which is accompanied by a fee and certification practice statement. On receipt of an application, the certifying authority may, after consideration of the certification practice statement and after making such enquiries it may deem fit (a) grand the digital signature certificate or (b) for reasons to be recorded in writing rejection of application.
  • 16. Digital signature certificates • Suspension of Digital signature certificate – The certifying authority which has issued a digital signature certificate may suspend such certificate (a) on receipt of a request to that effect from the subscriber or any person authorized by him and (b) if it is of opinion that the certificate should be suspended in the public interest.
  • 17. Digital signature certificates • Revocation of Digital signature certificate - – The certifying authority may revoke a digital signature certificate issued by it (a) where the subscriber or any other person authorized by him makes a request to that effect or (b) upon the death of the subscriber or (c) upon the dissolution of the firm.
  • 18. Penalty • Penalty for damage of computer systems – If any person without permission of owner or any other person who is in-charge of the computer access, download or disrupt the functions, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
  • 19. Penalty • Penalty for failure to furnish information – If any person who is required to under this act fail to furnish any document, he shall be liable to a penalty not exceeding one lakh and fifty thousand rupees for each such failure.
  • 20. Adjudication • Power of adjudication – For the purpose of adjudication, central government shall appoint any officer not below the rank of director as the adjudicating officer. If he is satisfied that the person has committed the contravention, he may impose such penalty as he thinks fit.
  • 21. Cyber Regulations Appellate Tribunal • A cyber appellate tribunal shall consists of one person only referred to as the presiding officer, appointed by the central government.
  • 22. Cyber Regulations Appellate Tribunal • Any person aggrieved by an order made my controller may prefer an appeal to a cyber Appellate Tribunal within a period of 45 days from the date on which a copy of order made by the controller is received by the person aggrieved. On receipt of an appeal, Tribunal may after giving the parties an opportunity of being heard, pas such order thereon as it thinks fit.
  • 23. Cyber Regulations Appellate Tribunal • A penalty imposed under this act, if it is not paid, shall be recovered as an arrear of land revenue and the license or the digital signature certificate, as the case may be, shall be suspended till the penalty is paid.
  • 24. Offences • Tampering with computer source documents – Three years imprisonment or fine worth two lakhs. • Hacking with computer system - Three years imprisonment or fine worth two lakhs. • Publishing of information which is obscene in electronic form - Ten years imprisonment or fine worth two lakhs.
  • 25. Offences • Securing access to protected system - Ten years imprisonment or fine. • Misrepresentation - Two years imprisonment or fine of one lakh. • Breach of confidentiality and privacy - Two years imprisonment or fine of one lakh. • Publishing of false digital signature certificate - Two years imprisonment or fine of one lakh.