SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Disclaimer
 This presentation is merely a sketch for
 the Cyber law provisions in India. It is
 not to be construed as a verbatim
 narration of the Law.

 This presentation is not to be relied
 upon for any reason whatsoever.



                   shivam387@yahoo.com      2
shivam387@yahoo.com   3
Introduction
The Information Technology Act is the
  Second Law in India governing the field
  of Technology.

The First one was in the year 1885.

That was the Indian Telegraph act 1885



                   shivam387@yahoo.com      4
However, The first recorded Cyber crime
incident is believed to be recorded in the
year 1820 !



Difficult to believe ?

                   shivam387@yahoo.com       5
The 1st reported cyber crime is said to be in the year
  1820. Considering the fact that the Abacus, which is
  thought to be the earliest form of a computer, has
  been around since 3500 B.C. The era of modern
  computers, however, began with the analytical
  engine of Charles Babbage.

In the year 1820, Joseph-Marie Jacquard, happened to
    be a textile manufacturer in France, He created a the
    loom. This device was blended with analogical
    technology in the weaving of special fabrics. This
    resulted in a fear amongst Jacquard's employees
    that their traditional employment and livelihood were
    being threatened. They committed acts of sabotage
    to discourage Jacquard from further use of the new
    technology. This is the first recorded cyber crime!



                          shivam387@yahoo.com               6
IT Act of 2000
 Came in force in India since June 2000
 Amended in 2006 and 2008
 Other Acts that were simultaneously
 amended to complement the IT act are
 the Banker Book Evidence Act, IPC,
 Evidence Act
 et cetera…



                 shivam387@yahoo.com      7
Intention of the Act
  The Act begins with :

  “An Act to provide legal recognition for
  transactions carried out by means of
  electronic data interchange and other
  means of electronic communication,
  commonly referred to as "electronic
  commerce", which involve the use of
  alternatives to paper-based methods of
  communication and storage of information,
  to facilitate electronic filing of documents
  with the Government agencies…”

                     shivam387@yahoo.com         8
Evolution of the Act
The General Assembly of the United Nations by its
  resolution A/RES/51/162, dated the 30th January,
  1997 had adopted the Model Law on E - Commerce
  adopted by the UNCITRAL,

The said resolution recommended that all member
  States give favourable consideration to the said
  Model Law when they enact or revise their laws, in
  view of the need for uniformity of the law applicable
  to alternatives to paper-based methods of
  communication and storage of information;

Hence, the same was adopted and enforced in India.



                         shivam387@yahoo.com              9
Cyber Law in India
 Aided by many other Acts and Statutes.

 1) The Indian Penal code
 2) The Evidence Act
 3) the code of Criminal procedure.
 & many others




                  shivam387@yahoo.com     10
The Information Technology Act
  The Act can be broadly classified into 3
  aspects :

                 IT Act 2000



                                         Criminal and
Administrative   Civil Issues
                                         penal Issues




                   shivam387@yahoo.com                  11
IT Act of 2000
 ADMINISTRATIVE PART :

 Recognizing e-commerce
 Legal enforceability and authentication
 of electronic - Documents
 Methodology and process.
 A special Cyber Law Appellate Tribunal
 The role and duties therein.

                   shivam387@yahoo.com     12
IT Act 2000
 The CIVIL aspect

 Runs parallel to Administrative ventures
 of the IT act.
 Describes what constitutes civil
 infringement of rights.
 Prescribes civil duties and remedies.
 Unparallel to the Chapter on penalties

                  shivam387@yahoo.com       13
IT Act 2000
 Criminal Part

 Recognizes and provides for Penal
 measures against crime in cyber space,
 digital crimes or crime against computer
 resource.
 Related issues to redress, monitor,
 restrict, investigate, cyber crime is also
 provided herein.

                   shivam387@yahoo.com        14
IT Act 2000
 Recognises the Cardinal Philosophy

 1 ) Computers can be abused.
 2 ) Computers are weapons as well as
 Victims.

 The term “Computer” has a wide
 amplitude in view of the IT Act.

                  shivam387@yahoo.com   15
Definition of a Computer
  Section 2 of the Act defines :

  (i)"computer" means any electronic magnetic, optical or other high-speed data processing device
  or system which performs logical, arithmetic, and memory functions by manipulations of
  electronic, magnetic or optical impulses, and includes all input, output, processing, storage,
  computer software, or communication facilities which are connected or related to the computer in
  a computer system or computer network.


  (j) "computer network" means the interconnection of one or more computers through—
      ○   (i) the use of satellite, microwave, terrestrial line
      ○   or other communication media; and
      ○   (ii) terminals or a complex consisting of two or more
      ○   interconnected computers whether or not the
      ○   interconnection is continuously maintained;



  (k) "computer resource" means computer, computer system, computer network, data, computer
  data base or software;


  (l) "computer system" means a device or collection of devices, including input and output support
  devices and excluding calculators which are not programmable and capable of being used in
  conjunction with external files, which contain computer programmes, electronic instructions, input
  data and output data, that performs logic, arithmetic, data storage and retrieval, communication
  control and other functions;



                                                shivam387@yahoo.com                                    16
The definition of Computer, computer
resource, Computer Network and
Computer system is too large in its
spectrum.

It extends safety to almost all forms of
electronic devices related to computers !

                 shivam387@yahoo.com        17
Civil Issues in a gist
  Sec 43A : Failure to protect Data
  Sec 44 : penalty for failure to furnish
  information, return etc…
  Appointment and functions of
  Adjudicating officer
  Powers and functioning of the Cyber
  Law Appellate Tribunal



                    shivam387@yahoo.com     18
Offences in a Gist
  Sec 43 : earlier a simple civil provision

 Now a Civil, and may amount to a penal offence u/s 66 !

It relates to access to computer without the permission of
    the computer owner

It penalizes any sort of unauthorized access or assistance
    as such, to a computer, computer system, resource,
    network which may damage, alter, erase, delete or
    diminish its utility.

Or if any source code is tampered concealed or destroyed
   etc.


                          shivam387@yahoo.com                19
Sec 65 : Tampering with Computer Source documents.
              Punishment – Imprisonment upto three
  years or fine upto Rs 2 Lacs or both.

Sec 66 : Penalises any contravention u/s 43 if carried
  out with a fraudulent or dishonest motive
              Punishment – Imprisonment upto three
  years or fine upto Rs 5 Lacs or both.

Sec 66 A : Punishment for sending offensive messages
  through communication service etc…
  Requisites : offensive or menacing or false, or for the
  purpose of annoyance, inconvenience, ill will etc…
              Punishment – Imprisonment upto three
  years and with fine.



                          shivam387@yahoo.com               20
Sec 67A : Punishment for publishing or transmitting of material containing
    sexually explicit act, etc.. In the electronic form.
                  Punishment :
1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs.
2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs.

EXCEPTION
Sec 67 and 67A does not extend to cases wherein the subject is in the
   interest of art, science, literature or other interests of learning and other
   cases wherein its in the bonafide motive for heritage or religious
   purpose

Sec 67B : Punishment for publishing or transmitting of material depicting
    children in sexually explicit act, etc.. In the electronic form. (Readwith
    other sub rules)
    Punishment :
1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs.
2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs.

Sec 67C : Preservation & retention of information by intermediaries.
   Punishment - Imprisonment upto three years and with fine.

                                 shivam387@yahoo.com                               21
Sec 68 : Provision and punishment for
violation of orders from the Controller.

Sec 69 : Powers of the Govt. to issue direction
for monitoring, intercepting or decrypting any
information through any Computer Resource.
    (Basically an administrative right of the Govt. and
provides for punishment to the violator, usually
intermediaries who are incharge of such database or
are service providers.
Sec 69 A and 69 B are similarly administrative in
nature but the violation of such orders are offensive.)



                      shivam387@yahoo.com                 22
Sec 71 : Penalty for Misrepresentation before the
Controller or the Certifying Authority
  ○ Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac
    or both.

Sec 72 : Penalty for breach of Confidentiality & privacy,
the provision applies to those persons who are
empowered under this act with such a database or
records.
  ○ Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac
    or both.

Sec 72A : Penalty for disclosure of information in breach
of Lawful Contract – This provision is an amendment to
include even the employees of private organisations or
such intermediaries working therein
  ○ Punishment - Imprisonment upto 3 years or fine upto Rs. 5 Lac
    or both.



                         shivam387@yahoo.com                        23
Sec 74 : Publication of Signature or
signature certificates for fraudulent
purpose.
  ○ Punishment - Imprisonment upto 2 years or fine
   upto Rs. 1 Lac or both.


Sec 76 : provides for confiscation of any
related computer accessory, system part
etc if the same is believed to be used in
any violation of this act or rules.



                    shivam387@yahoo.com              24
Sec 77 B :… Is the good news…
Offences punishable with imprisonment
upto 3 years to be bailable.


Sec 78 : Bad news…
Power to investigate offences now
available to Inspector since 2009, earlier
the onus was on the DSP rank officer or
above.

                  shivam387@yahoo.com        25
The 2009 notification makes it an offence to
even abet or attempt a cyber crime, earlier
unsuccessful criminals always escaped by
virtue of this grey area.

Sec 84 B : Punishment for Abetment
  ○ Same punishment as prescribed for the offence




Sec 84 C :Punishment for attempt
  ○ A maximum of one-half of the term of imprisonment
   provided for the offence, or with fine as prescribed for
   the offence or with both.

                      shivam387@yahoo.com                     26
shivam387@yahoo.com   27
Shankey Gupta
Advocate & Digital Evidence Analyst
     shivam387@yahoo.com


           shivam387@yahoo.com        28

Weitere ähnliche Inhalte

Was ist angesagt?

Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000ShashankBajpai24
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsLawPlus Ltd.
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspaceRistya Anditha
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 

Was ist angesagt? (20)

It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other Agreements
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 

Andere mochten auch

Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimesrharrisonaz
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009ClubHack
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11TeamOneI1MBA11
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technologyDr. Trilok Kumar Jain
 

Andere mochten auch (20)

Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Law relating to information technology
Law relating to information technologyLaw relating to information technology
Law relating to information technology
 

Ähnlich wie The cyber law regime in India

The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 

Ähnlich wie The cyber law regime in India (20)

The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Cyber
CyberCyber
Cyber
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

The cyber law regime in India

  • 1.
  • 2. Disclaimer This presentation is merely a sketch for the Cyber law provisions in India. It is not to be construed as a verbatim narration of the Law. This presentation is not to be relied upon for any reason whatsoever. shivam387@yahoo.com 2
  • 4. Introduction The Information Technology Act is the Second Law in India governing the field of Technology. The First one was in the year 1885. That was the Indian Telegraph act 1885 shivam387@yahoo.com 4
  • 5. However, The first recorded Cyber crime incident is believed to be recorded in the year 1820 ! Difficult to believe ? shivam387@yahoo.com 5
  • 6. The 1st reported cyber crime is said to be in the year 1820. Considering the fact that the Abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. The era of modern computers, however, began with the analytical engine of Charles Babbage. In the year 1820, Joseph-Marie Jacquard, happened to be a textile manufacturer in France, He created a the loom. This device was blended with analogical technology in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! shivam387@yahoo.com 6
  • 7. IT Act of 2000 Came in force in India since June 2000 Amended in 2006 and 2008 Other Acts that were simultaneously amended to complement the IT act are the Banker Book Evidence Act, IPC, Evidence Act et cetera… shivam387@yahoo.com 7
  • 8. Intention of the Act The Act begins with : “An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies…” shivam387@yahoo.com 8
  • 9. Evolution of the Act The General Assembly of the United Nations by its resolution A/RES/51/162, dated the 30th January, 1997 had adopted the Model Law on E - Commerce adopted by the UNCITRAL, The said resolution recommended that all member States give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information; Hence, the same was adopted and enforced in India. shivam387@yahoo.com 9
  • 10. Cyber Law in India Aided by many other Acts and Statutes. 1) The Indian Penal code 2) The Evidence Act 3) the code of Criminal procedure. & many others shivam387@yahoo.com 10
  • 11. The Information Technology Act The Act can be broadly classified into 3 aspects : IT Act 2000 Criminal and Administrative Civil Issues penal Issues shivam387@yahoo.com 11
  • 12. IT Act of 2000 ADMINISTRATIVE PART : Recognizing e-commerce Legal enforceability and authentication of electronic - Documents Methodology and process. A special Cyber Law Appellate Tribunal The role and duties therein. shivam387@yahoo.com 12
  • 13. IT Act 2000 The CIVIL aspect Runs parallel to Administrative ventures of the IT act. Describes what constitutes civil infringement of rights. Prescribes civil duties and remedies. Unparallel to the Chapter on penalties shivam387@yahoo.com 13
  • 14. IT Act 2000 Criminal Part Recognizes and provides for Penal measures against crime in cyber space, digital crimes or crime against computer resource. Related issues to redress, monitor, restrict, investigate, cyber crime is also provided herein. shivam387@yahoo.com 14
  • 15. IT Act 2000 Recognises the Cardinal Philosophy 1 ) Computers can be abused. 2 ) Computers are weapons as well as Victims. The term “Computer” has a wide amplitude in view of the IT Act. shivam387@yahoo.com 15
  • 16. Definition of a Computer Section 2 of the Act defines : (i)"computer" means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network. (j) "computer network" means the interconnection of one or more computers through— ○ (i) the use of satellite, microwave, terrestrial line ○ or other communication media; and ○ (ii) terminals or a complex consisting of two or more ○ interconnected computers whether or not the ○ interconnection is continuously maintained; (k) "computer resource" means computer, computer system, computer network, data, computer data base or software; (l) "computer system" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions; shivam387@yahoo.com 16
  • 17. The definition of Computer, computer resource, Computer Network and Computer system is too large in its spectrum. It extends safety to almost all forms of electronic devices related to computers ! shivam387@yahoo.com 17
  • 18. Civil Issues in a gist Sec 43A : Failure to protect Data Sec 44 : penalty for failure to furnish information, return etc… Appointment and functions of Adjudicating officer Powers and functioning of the Cyber Law Appellate Tribunal shivam387@yahoo.com 18
  • 19. Offences in a Gist Sec 43 : earlier a simple civil provision Now a Civil, and may amount to a penal offence u/s 66 ! It relates to access to computer without the permission of the computer owner It penalizes any sort of unauthorized access or assistance as such, to a computer, computer system, resource, network which may damage, alter, erase, delete or diminish its utility. Or if any source code is tampered concealed or destroyed etc. shivam387@yahoo.com 19
  • 20. Sec 65 : Tampering with Computer Source documents. Punishment – Imprisonment upto three years or fine upto Rs 2 Lacs or both. Sec 66 : Penalises any contravention u/s 43 if carried out with a fraudulent or dishonest motive Punishment – Imprisonment upto three years or fine upto Rs 5 Lacs or both. Sec 66 A : Punishment for sending offensive messages through communication service etc… Requisites : offensive or menacing or false, or for the purpose of annoyance, inconvenience, ill will etc… Punishment – Imprisonment upto three years and with fine. shivam387@yahoo.com 20
  • 21. Sec 67A : Punishment for publishing or transmitting of material containing sexually explicit act, etc.. In the electronic form. Punishment : 1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs. 2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs. EXCEPTION Sec 67 and 67A does not extend to cases wherein the subject is in the interest of art, science, literature or other interests of learning and other cases wherein its in the bonafide motive for heritage or religious purpose Sec 67B : Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc.. In the electronic form. (Readwith other sub rules) Punishment : 1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs. 2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs. Sec 67C : Preservation & retention of information by intermediaries. Punishment - Imprisonment upto three years and with fine. shivam387@yahoo.com 21
  • 22. Sec 68 : Provision and punishment for violation of orders from the Controller. Sec 69 : Powers of the Govt. to issue direction for monitoring, intercepting or decrypting any information through any Computer Resource. (Basically an administrative right of the Govt. and provides for punishment to the violator, usually intermediaries who are incharge of such database or are service providers. Sec 69 A and 69 B are similarly administrative in nature but the violation of such orders are offensive.) shivam387@yahoo.com 22
  • 23. Sec 71 : Penalty for Misrepresentation before the Controller or the Certifying Authority ○ Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac or both. Sec 72 : Penalty for breach of Confidentiality & privacy, the provision applies to those persons who are empowered under this act with such a database or records. ○ Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac or both. Sec 72A : Penalty for disclosure of information in breach of Lawful Contract – This provision is an amendment to include even the employees of private organisations or such intermediaries working therein ○ Punishment - Imprisonment upto 3 years or fine upto Rs. 5 Lac or both. shivam387@yahoo.com 23
  • 24. Sec 74 : Publication of Signature or signature certificates for fraudulent purpose. ○ Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac or both. Sec 76 : provides for confiscation of any related computer accessory, system part etc if the same is believed to be used in any violation of this act or rules. shivam387@yahoo.com 24
  • 25. Sec 77 B :… Is the good news… Offences punishable with imprisonment upto 3 years to be bailable. Sec 78 : Bad news… Power to investigate offences now available to Inspector since 2009, earlier the onus was on the DSP rank officer or above. shivam387@yahoo.com 25
  • 26. The 2009 notification makes it an offence to even abet or attempt a cyber crime, earlier unsuccessful criminals always escaped by virtue of this grey area. Sec 84 B : Punishment for Abetment ○ Same punishment as prescribed for the offence Sec 84 C :Punishment for attempt ○ A maximum of one-half of the term of imprisonment provided for the offence, or with fine as prescribed for the offence or with both. shivam387@yahoo.com 26
  • 28. Shankey Gupta Advocate & Digital Evidence Analyst shivam387@yahoo.com shivam387@yahoo.com 28