SlideShare a Scribd company logo
I
T

A
C
T
It act
TECHNOLOGY –THE NEW AGE

 Technology is the mover of
  change, economies, governance
  and thought processes. Coming
  of technology has paved the way
  for growth of new vistas and
  horizons.
INTERNET



           Extranet


                         Internet
                        interface
   ENVIRONMENT




Supplier



                      The Business



                                     Customer
IT Act, 2000

 Enacted on 17th May
  2000- India is 12th
  nation in the world to
  adopt cyber laws
 IT Act is based on
  Model law on e-
  commerce adopted
  by UNCITRAL
Objectives of the IT Act

To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
   other means of electronic communication, commonly
   referred to as "electronic commerce“
 To facilitate electronic filing of documents with
   Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
   Act,1872, the Banker’s Books Evidence Act 1891,Reserve
   Bank of India Act ,1934
 Electronic document produced Electronic World
  by a computer. Stored in digital
  form, and cannot be perceived
  without using a computer
   It can be deleted, modified
     and rewritten without leaving
     a mark
   Integrity of an electronic
     document is “genetically”
     impossible to verify
   A copy is indistinguishable
     from the original
   It can’t be sealed in the
     traditional way, where the
     author affixes his signature
 The functions of identification,
  declaration, proof of electronic
  documents carried out using a
  digital signature based on
  cryptography.
Electronic Commerce
 EC transactions over the
  Internet include
   Formation of Contracts
   Delivery of Information
    and Services
   Delivery of Content
 Future of Electronic
  Commerce depends on
  “the trust that the
    transacting parties place
    in the security of the
    transmission and content
    of their communications”
AUTHENTICATION OF
ELECTRONIC RECORDS

 Any    subscriber may authenticate an
  electronic record
 Authentication by affixing his digital
  signature.
 Any person by the use of a public key of
  the subscriber can verify the electronic
  record.
Electronic World

 Digital signatures created and verified using
  cryptography
 Public key System based on Asymmetric keys
   An algorithm generates two different and related
    keys
     Public key
     Private Key
   Private key used to digitally sign.
   Public key used to verify.
Public Key Infrastructure

 Allow parties to have free access to the signer’s
  public key
 This assures that the public key corresponds to the
  signer’s private key
   Trust between parties as if they know one another
 Parties with no trading partner agreements,
  operating on open networks, need to have highest
  level of trust in one another
Section 3 Defines Digital
Signatures
 The authentication to be affected by use of
  asymmetric crypto system and hash function
 The private key and the public key are unique
  to the subscriber and constitute functioning
  key pair
 Verification of electronic record possible
Certificate based Key
         Management
         CA

                     CA A B
                                Operated by trusted-third
                                 party - CA
                                Provides Trading Partners
                                 Certificates
                                Notarises the relationship
User A               User B
                                 between a public key and
              CA A               its owner
                              CA B
Essential steps of the digital signature process
 STEP 1 The signatory is the authorized holder a unique
    cryptographic key pair;
   STEP 2 The signatory prepares a data message (for example, in the
    form of an electronic mail message) on a computer;
   STEP 3 The signatory prepares a “message digest”, using a secure
    hash algorithm. Digital signature creation uses a hash result derived
    from and unique to the signed message;
   STEP 4 The signatory encrypts the message digest with the private
    key. The private key is applied to the message digest text using a
    mathematical algorithm. The digital signature consists of the
    encrypted message digest,
   STEP 5 The signatory typically attaches or appends its digital
    signature to the message;
   STEP 6 The signatory sends the digital signature and the
    (unencrypted or encrypted) message to the relying party
    electronically;
Essential steps of the digital signature process
 STEP 7 The relying party uses the signatory’s public key to verify the
  signatory’s digital signature. Verification using the signatory’s public
  key provides a level of technical assurance that the message came
  exclusively from the signatory;
 STEP 8 The relying party also creates a “message digest” of the
  message, using the same secure hash algorithm;
 STEP 9 The relying party compares the two message digests. If they
  are the same, then the relying party knows that the message has not
  been altered after it was signed. Even if one bit in the message has
  been altered after the message has been digitally signed, the message
  digest created by the relying party will be different from the message
  digest created by the signatory;
 STEP 10 Where the certification process is resorted to, the relying
  party obtains a certificate from the certification service provider
  (including through the signatory or otherwise), which confirms the
  digital signature on the signatory’s message. The certificate contains
  the public key and name of the signatory (and possibly additional
  information), digitally signed by the certification service provider.
Regulations and controls
  Licensing Certifying Authorities (CAs) under section
   21 of the IT Act and exercising supervision over their
   activities.
  Certifying the public keys of the CAs, i.e. their
   Digital Signature Certificates more commonly
   known as Public Key Certificates (PKCs).
  Laying down the standards to be maintained by the
   CAs,
  Addressing the issues related to the licensing
   process
Civil Wrongs under IT Act
 Chapter IX of IT Act, Section 43
 Whoever without permission of owner of the computer
   Secures access (mere U/A access)
     Not necessarily through a network
   Downloads, copies, extracts any data
   Introduces or causes to be introduced any viruses or
    contaminant
   Damages or causes to be damaged any computer resource
     Destroy, alter, delete, add, modify or rearrange
     Change the format of a file
   Disrupts or causes disruption of any computer resource
     Preventing normal continuance of computer
Civil Wrongs under IT Act (Contd.)
 Denies or causes denial of access by any means
   Denial of service attacks
 Assists any person to do any thing above
   Rogue Websites, Search Engines, Insiders providing
    vulnerabilities
 Charges the services availed by a person to the account of
  another person by tampering or manipulating any
  computer resource
   Credit card frauds, Internet time thefts
 Liable to pay damages not exceeding Rs. One crore to the
  affected party
Data diddling: changing data prior or
during input into a computer
 Section 66 and 43(d) of the I.T. Act covers the offence of
  data diddling
 Penalty: Not exceeding Rs. 1 crore
  Case in point :
  NDMC Electricity Billing Fraud Case: A private
  contractor who was to deal with receipt and accounting
  of electricity bills by the NDMC, Delhi. Collection of
  money, computerized accounting, record maintenance
  and remittance in his bank who misappropriated huge
  amount of funds by manipulating data files to show less
  receipt and bank remittance.
TYPES OF CYBER CRIMES
   Cyber terrorism
   Cyber pornography
   Defamation
   Cyber stalking (section 509 IPC)         Crime against Government
   Sale of illegal articles-narcotics,
    weapons, wildlife
   Online gambling
   Intellectual Property crimes- software     Crime against persons
    piracy, copyright infringement,
    trademarks violations, theft of computer
    source code
   Email spoofing
                                               Crime against property
   Forgery
   Phising
   Credit card frauds
TYPES OF CYBER CRIMES




                          Cyber crimes



                                             Denial of
          Informatio    E-mail     Salami                Trojan
Hacking                                      Service
               n       bombing     attacks               attacks
                                              attacks
             Theft
Section 65: Source Code
 Most important asset of software companies
 “Computer Source Code" means the listing of
  programmes, computer commands, design
  and layout
 Ingredients
    Knowledge or intention
    Concealment, destruction, alteration
    computer source code required to be kept or
     maintained by law
 Punishment
    imprisonment up to three years and / or
    fine up to Rs. 2 lakh
Section 66: Hacking

• Ingredients
   – Intention or Knowledge to cause wrongful loss
     or damage to the public or any person
   – Destruction, deletion, alteration, diminishing
     value or utility or injuriously affecting
     information residing in a computer resource
• Punishment
   – imprisonment up to three years, and / or
   – fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
  Section 66 covers data theft aswell as data alteration
Sec. 67. Pornography
 Ingredients
    Publishing or transmitting or causing to be published
    in the electronic form,
    Obscene material
 Punishment
    On first conviction
     imprisonment of either description up to five years and
     fine up to Rs. 1 lakh
   On subsequent conviction
     imprisonment of either description up to ten years and
     fine up to Rs. 2 lakh
 Section covers
   Internet Service Providers,
   Search engines,
   Pornographic websites
 Cognizable, Non-Bailable
There are many causes that I am prepared to die
  for but no causes that I am prepared to kill for.

     -let us not kill somebody’s business by hacking

Truth does not pay homage to any society, ancient
   or modern. Society has to pay homage to Truth
                       or die.

More Related Content

PPTX
Digital signatures
PPT
Information Technology Act 2000 An Overview
PPT
Information technology-act 2000
PPT
It act law ppt
PDF
What are the duties of the subscriber of Digital Signature Certificate? [#48]
PPTX
Electronic signature
PPTX
Information Technology Act 2000
PDF
Protection on cyber fraud
Digital signatures
Information Technology Act 2000 An Overview
Information technology-act 2000
It act law ppt
What are the duties of the subscriber of Digital Signature Certificate? [#48]
Electronic signature
Information Technology Act 2000
Protection on cyber fraud

What's hot (20)

PPTX
Esign or Electronic Signature
PPTX
Electronic signature
PPTX
IT act 2000
DOC
Certifying authorities rules 2000
PPSX
Digital signature
PPTX
E-Signature Vs. Digital Signature
PDF
Information Technology act 2000 & Threats to India using Google
DOCX
Preventing Internet Fraud By Preventing Identity Theft
PPT
Information technology-act2000-120112080011-phpapp02 2
PPTX
Digital signature
DOC
Chapter 06 Information Technology Act 2000
PDF
It Amendments Act
DOCX
Digital signature
PPTX
Digital signature certificate
PPT
Information technology-act 2000- an overview-sethassociatesppt
PDF
Validity Of E singnature In India
PPTX
Electronic governance
PPT
E Signature Presentation
PDF
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
PPTX
Electronic Records and Signatures
Esign or Electronic Signature
Electronic signature
IT act 2000
Certifying authorities rules 2000
Digital signature
E-Signature Vs. Digital Signature
Information Technology act 2000 & Threats to India using Google
Preventing Internet Fraud By Preventing Identity Theft
Information technology-act2000-120112080011-phpapp02 2
Digital signature
Chapter 06 Information Technology Act 2000
It Amendments Act
Digital signature
Digital signature certificate
Information technology-act 2000- an overview-sethassociatesppt
Validity Of E singnature In India
Electronic governance
E Signature Presentation
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
Electronic Records and Signatures
Ad

Similar to It act (20)

PPT
Information technology-act 2000- an overview-sethassociatesppt
PPT
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
PPT
IT ACT 2000.ppt
PPT
Information-Technology-Act 2000- An overview-sethassociates
PDF
Cyber Security
PPTX
DOC
IT Act,2000
PPT
IT ACT, 2000 (Information Technology Act, 2000)
PPTX
Indian Information Technology Act
PPTX
law.pptx
PPT
open house electronic environment IT Act
PPTX
HSC IT - Cyber Law and Ethics part 2
PPT
Introduction to cyber law.
PPTX
Module 3- Information Tech. Act 2000.ppt
PPTX
Unit-5.3 Information Technology Act, 2000-MLP.pptx
PPTX
computer-ppt .pptx class 11 of codfsmputer
PPTX
Introduction to cyber law.
PPTX
Information Technology (IT) Act 2000 India
PPTX
1713435528251_1709734122381_1708585866621_1708585864158_2.Information Systems...
Information technology-act 2000- an overview-sethassociatesppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
IT ACT 2000.ppt
Information-Technology-Act 2000- An overview-sethassociates
Cyber Security
IT Act,2000
IT ACT, 2000 (Information Technology Act, 2000)
Indian Information Technology Act
law.pptx
open house electronic environment IT Act
HSC IT - Cyber Law and Ethics part 2
Introduction to cyber law.
Module 3- Information Tech. Act 2000.ppt
Unit-5.3 Information Technology Act, 2000-MLP.pptx
computer-ppt .pptx class 11 of codfsmputer
Introduction to cyber law.
Information Technology (IT) Act 2000 India
1713435528251_1709734122381_1708585866621_1708585864158_2.Information Systems...
Ad

More from Yogesh Thawait (13)

PPSX
Securitisation and reconstruction
PPSX
PPSX
Intellectual property law
DOCX
India has been observing 15 march since 1989 as the national consumers right
PPSX
Idra,1951
PPSX
Foreign exchange management act (fema)
PPSX
Consumer
PPSX
Competition act,2002
PPSX
Securties contract act
PPT
Networking concepts
PPT
DOCX
Marketing plan on airtel
Securitisation and reconstruction
Intellectual property law
India has been observing 15 march since 1989 as the national consumers right
Idra,1951
Foreign exchange management act (fema)
Consumer
Competition act,2002
Securties contract act
Networking concepts
Marketing plan on airtel

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
August Patch Tuesday
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Getting Started with Data Integration: FME Form 101
NewMind AI Weekly Chronicles - August'25-Week II
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
August Patch Tuesday
Reach Out and Touch Someone: Haptics and Empathic Computing
TLE Review Electricity (Electricity).pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
cloud_computing_Infrastucture_as_cloud_p
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Getting Started with Data Integration: FME Form 101

It act

  • 3. TECHNOLOGY –THE NEW AGE  Technology is the mover of change, economies, governance and thought processes. Coming of technology has paved the way for growth of new vistas and horizons.
  • 4. INTERNET Extranet Internet interface ENVIRONMENT Supplier The Business Customer
  • 5. IT Act, 2000  Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws  IT Act is based on Model law on e- commerce adopted by UNCITRAL
  • 6. Objectives of the IT Act To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 7.  Electronic document produced Electronic World by a computer. Stored in digital form, and cannot be perceived without using a computer  It can be deleted, modified and rewritten without leaving a mark  Integrity of an electronic document is “genetically” impossible to verify  A copy is indistinguishable from the original  It can’t be sealed in the traditional way, where the author affixes his signature  The functions of identification, declaration, proof of electronic documents carried out using a digital signature based on cryptography.
  • 8. Electronic Commerce  EC transactions over the Internet include  Formation of Contracts  Delivery of Information and Services  Delivery of Content  Future of Electronic Commerce depends on “the trust that the transacting parties place in the security of the transmission and content of their communications”
  • 9. AUTHENTICATION OF ELECTRONIC RECORDS  Any subscriber may authenticate an electronic record  Authentication by affixing his digital signature.  Any person by the use of a public key of the subscriber can verify the electronic record.
  • 10. Electronic World  Digital signatures created and verified using cryptography  Public key System based on Asymmetric keys  An algorithm generates two different and related keys  Public key  Private Key  Private key used to digitally sign.  Public key used to verify.
  • 11. Public Key Infrastructure  Allow parties to have free access to the signer’s public key  This assures that the public key corresponds to the signer’s private key  Trust between parties as if they know one another  Parties with no trading partner agreements, operating on open networks, need to have highest level of trust in one another
  • 12. Section 3 Defines Digital Signatures  The authentication to be affected by use of asymmetric crypto system and hash function  The private key and the public key are unique to the subscriber and constitute functioning key pair  Verification of electronic record possible
  • 13. Certificate based Key Management CA CA A B  Operated by trusted-third party - CA  Provides Trading Partners Certificates  Notarises the relationship User A User B between a public key and CA A its owner CA B
  • 14. Essential steps of the digital signature process  STEP 1 The signatory is the authorized holder a unique cryptographic key pair;  STEP 2 The signatory prepares a data message (for example, in the form of an electronic mail message) on a computer;  STEP 3 The signatory prepares a “message digest”, using a secure hash algorithm. Digital signature creation uses a hash result derived from and unique to the signed message;  STEP 4 The signatory encrypts the message digest with the private key. The private key is applied to the message digest text using a mathematical algorithm. The digital signature consists of the encrypted message digest,  STEP 5 The signatory typically attaches or appends its digital signature to the message;  STEP 6 The signatory sends the digital signature and the (unencrypted or encrypted) message to the relying party electronically;
  • 15. Essential steps of the digital signature process  STEP 7 The relying party uses the signatory’s public key to verify the signatory’s digital signature. Verification using the signatory’s public key provides a level of technical assurance that the message came exclusively from the signatory;  STEP 8 The relying party also creates a “message digest” of the message, using the same secure hash algorithm;  STEP 9 The relying party compares the two message digests. If they are the same, then the relying party knows that the message has not been altered after it was signed. Even if one bit in the message has been altered after the message has been digitally signed, the message digest created by the relying party will be different from the message digest created by the signatory;  STEP 10 Where the certification process is resorted to, the relying party obtains a certificate from the certification service provider (including through the signatory or otherwise), which confirms the digital signature on the signatory’s message. The certificate contains the public key and name of the signatory (and possibly additional information), digitally signed by the certification service provider.
  • 16. Regulations and controls  Licensing Certifying Authorities (CAs) under section 21 of the IT Act and exercising supervision over their activities.  Certifying the public keys of the CAs, i.e. their Digital Signature Certificates more commonly known as Public Key Certificates (PKCs).  Laying down the standards to be maintained by the CAs,  Addressing the issues related to the licensing process
  • 17. Civil Wrongs under IT Act  Chapter IX of IT Act, Section 43  Whoever without permission of owner of the computer  Secures access (mere U/A access)  Not necessarily through a network  Downloads, copies, extracts any data  Introduces or causes to be introduced any viruses or contaminant  Damages or causes to be damaged any computer resource  Destroy, alter, delete, add, modify or rearrange  Change the format of a file  Disrupts or causes disruption of any computer resource  Preventing normal continuance of computer
  • 18. Civil Wrongs under IT Act (Contd.)  Denies or causes denial of access by any means  Denial of service attacks  Assists any person to do any thing above  Rogue Websites, Search Engines, Insiders providing vulnerabilities  Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource  Credit card frauds, Internet time thefts  Liable to pay damages not exceeding Rs. One crore to the affected party
  • 19. Data diddling: changing data prior or during input into a computer  Section 66 and 43(d) of the I.T. Act covers the offence of data diddling  Penalty: Not exceeding Rs. 1 crore Case in point : NDMC Electricity Billing Fraud Case: A private contractor who was to deal with receipt and accounting of electricity bills by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance.
  • 20. TYPES OF CYBER CRIMES  Cyber terrorism  Cyber pornography  Defamation  Cyber stalking (section 509 IPC) Crime against Government  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software Crime against persons piracy, copyright infringement, trademarks violations, theft of computer source code  Email spoofing Crime against property  Forgery  Phising  Credit card frauds
  • 21. TYPES OF CYBER CRIMES Cyber crimes Denial of Informatio E-mail Salami Trojan Hacking Service n bombing attacks attacks attacks Theft
  • 22. Section 65: Source Code  Most important asset of software companies  “Computer Source Code" means the listing of programmes, computer commands, design and layout  Ingredients  Knowledge or intention  Concealment, destruction, alteration  computer source code required to be kept or maintained by law  Punishment  imprisonment up to three years and / or  fine up to Rs. 2 lakh
  • 23. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration
  • 24. Sec. 67. Pornography  Ingredients  Publishing or transmitting or causing to be published  in the electronic form,  Obscene material  Punishment  On first conviction  imprisonment of either description up to five years and  fine up to Rs. 1 lakh  On subsequent conviction  imprisonment of either description up to ten years and  fine up to Rs. 2 lakh  Section covers  Internet Service Providers,  Search engines,  Pornographic websites  Cognizable, Non-Bailable
  • 25. There are many causes that I am prepared to die for but no causes that I am prepared to kill for. -let us not kill somebody’s business by hacking Truth does not pay homage to any society, ancient or modern. Society has to pay homage to Truth or die.