0% found this document useful (0 votes)
12 views10 pages

MBA10 Show

The Information Technology Act, 2000 aims to recognize electronic transactions, provide alternatives to paper communication, and facilitate e-filing of documents in India. It applies to all e-transactions, with specific exceptions, and addresses various cyber crimes, outlining penalties for offenses such as hacking and tampering with computer documents. The Act is significant in combating cyber crime, which has been on the rise due to increased internet usage.

Uploaded by

deeksha890sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views10 pages

MBA10 Show

The Information Technology Act, 2000 aims to recognize electronic transactions, provide alternatives to paper communication, and facilitate e-filing of documents in India. It applies to all e-transactions, with specific exceptions, and addresses various cyber crimes, outlining penalties for offenses such as hacking and tampering with computer documents. The Act is significant in combating cyber crime, which has been on the rise due to increased internet usage.

Uploaded by

deeksha890sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPSX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Information Technology Act,

2000

Presented by: Presented to:


Deeksha Sharma Pragya Singhal Ma’am
Content
 Introduction
 Applicability
 Scope
 Nature
 Definitions
 Cyber Crime
 Penalty
Information Technology Act, 2000
 Introduction
 Objects of the Act
• to provide recognition for electronic transaction (ie. E-
commerce).
• To provide an alternative to paper-based methods of
communication and
• storage of information
• To facilitate e-filing of documents with Govt.
• To amend-
• The Indian Penal Code,
• The Indian Evidence Act, 1872
• The Banker’s Book Evidence Act, 1891 and
• The Reserve Bank of India Act, 1934
Extent of the Act
 Itextends (applicable) to whole of India
and
 also applies to any offence committed

outside India by any person.


Applicability of the Act
 Applicable to all e-transactions except for the
following:
• A Negotiable Instruments
• A Power of Attorney
• A Trust
• A Will
• Any Contract for the sale of immovable property
• Any document as specified by the Central Govt.
Important Definitions
 S.2(f). “asymmetric crypto system” a secure key pair-
• Private Key – to create Digital Signature
• Public Key – to verify the Digital Signature
 S.2(i). “computer” – any electronic device
 S.2(j). “computer network” – interconnection of one or
more computers.
 S.2(l). “computer system” – device or collection of
devices.
 S.2(p). “digital signature” – means authentication of any
electronic record.
Cyber Crime
 Cyber crimes are a new class of crimes rapidly increasing due
to extensive use of internet and IT-enabled services.
 Cyber crime or internet crime is a criminal activity in which
computers or computer networks are used as a tool, a target,
or a place of criminal activity and includes every thing from
electronic cracking to denial of service attacks.
 Cyber crime is the most dangerous of all the other types of
crimes as it causes a huge amount of the loss which is evident
from the number of cases coming before the criminal justice
system.
 At the same time it is very easy to commit cyber crime by
maintaining anonymity.
 IT Act deals only with few kinds of cyber crimes, yet it is
effective and the only one law which deals with such crimes.
Offences and Penalties
 Following provisions of which deal with cyber crime:
 S.43. Penalty for damage to computer, computer system,
etc.-Any person without permission.
• Secures access
• Downloads, copies or extracts from computer
• Introduces virus
• Damages any computer or computer system
• Disrupts computer system or network
• Denies access to computer system
• Provides assistance to commit crime.
 Penalty: Compensation not exceeding one crore Rupees
Offences
 S.65. Tampering with computer source documents.
• Penalty: Imprisonment upto 3 yrs or
with fine upto 2 lakhs rupees
or with both.
 S.66. Hacking with computer system.
• Penalty: Imprisonment upto 3 years or
with fine upto 2 lakhs rupees
or with both.
 S.67. Publishing of information which is obscene in
electronic form
• Penalty: On First Conviction – imp upto 5 yrs and fine upto
1 lakh rupees
On Subsequent conviction – imp upto 10 yrs and fine upto 2
lackhs rupees.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy