0% found this document useful (0 votes)
9 views7 pages

Cyber Security L-19

Uploaded by

Abhishek Parmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views7 pages

Cyber Security L-19

Uploaded by

Abhishek Parmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Cyber Security

BCC-401
L-19
Dr. Urvashi Chugh
Associate Professor
IT Department
Unit 5-INTRODUCTION TO SECURITY
POLICIES AND CYBER LAWS
• Need for An Information Security Policy
• Introduction to Indian Cyber Law
Need for An Information Security Policy
• Although India possesses a very well defined legal system, covering all
possible situations and cases that have occurred or might take place in
future, the country lacks in many aspects when it comes to newly
developed Internet technology.
• It is essential to address this gap through a suitable law given the
increasing use of Internet and other computer technologies in India.
• There is a need to have some legal recognition to the Internet as it is one
of the most dominating sources of carrying out business in today’s
world.
• With the growth of the Internet, a new concept called cyberterrorism
came into existence.
• The Indian Parliament passed its first cyberlaw, the ITA 2000, aimed at
providing the legal infrastructure for E-Commerce in India.
• The Government of India felt the need to enact relevant cyberlaws to
regulate Internet based computer related transactions in India.
• It manages all aspects, issues, legal consequences and conflict in the
world of cyberspace,Internet or WWW.
• In the Preamble to the Indian ITA 2000, it is mentioned that it is an
act to provide legal recognition for transactions carried out by means
of electronic data interchange and other means of electronic
communication, commonly referred to as electronic commerce.
Introduction to Indian Cyber Law
• Indian Cyber laws are contained in the Information Technology Act,
2000 ("IT Act") which came into force on October 17, 2000
• Details of IT act
• https://www.indiacode.nic.in/bitstream/123456789/13116/1/
it_act_2000_updated.pdf
• Summary
• The primary objectives of the IT Act, 2000 are: Granting legal
recognition to all transactions done through electronic data exchange,
other means of electronic communication or e-commerce in place of
the earlier paper-based communication.
• The original Act contained 94 sections, divided into 13 chapters.
• CHAPTER I-PRELIMINARY
• CHAPTER II-DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE
• CHAPTER III-ELECTRONIC GOVERNANCE
• CHAPTER IV-ATTRIBUTION, ACKNOWLEDGEMENT AND DESPATCH OF
ELECTRONIC RECORDS
• CHAPTER V-SECURE ELECTRONIC RECORDS AND SECURE ELECTRONIC
SIGNATURE
• CHAPTER VI-REGULATION OF CERTIFYING AUTHORITIES
• CHAPTER VII-ELECTRONIC SIGNATURE CERTIFICATES
• CHAPTER VIII-DUTIES OF SUBSCRIBERS
• CHAPTER IX-PENALTIES, COMPENSATION AND ADJUDICATION
• CHAPTER X-THE APPELLATE TRIBUNAL
• CHAPTER XI-OFFENCES
• CHAPTER XII
• INTERMEDIARIES NOT TO BE LIABLE IN CERTAIN CASES
• CHAPTER XIII-MISCELLANEOUS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy