SlideShare a Scribd company logo
1 of 86
Information Technology Act 2000- An overview Date: 27 th  November 2008 Venue: National Institute of Financial Management  Faridabad Sector-48, Pali Road
IT Act, 2000 ,[object Object],[object Object]
Objectives of the IT Act ,[object Object],[object Object],[object Object],[object Object]
Extent of application ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object]
Definitions ( section 2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
Act is in applicable to… ,[object Object],[object Object],[object Object]
E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Role of the Government
Section 3 Defines Digital Signatures ,[object Object],[object Object],[object Object]
Secure digital signature-S.15 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Certificate based Key Management ,[object Object],[object Object],[object Object],CA User A User B CA  A  B CA  A CA  B
Essential steps of the digital signature process   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essential steps of the digital signature process ,[object Object],[object Object],[object Object],[object Object]
Section 4- Legal recognition of Electronic Records ,[object Object]
Sections 5, 6 & 7 ,[object Object],[object Object],[object Object],[object Object],[object Object]
CCA has to regulate the    functioning of CAs in the country by- ,[object Object],[object Object],[object Object],[object Object]
The licensing process ,[object Object],[object Object],[object Object]
Audit Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditors Panel  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Size mandated by the CCA ,[object Object],[object Object],[object Object],[object Object]
Licensed Certifying Authorities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
Securing communications… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 15- Secure Digital Signatures ,[object Object],[object Object],[object Object]
Regulation of Certifying Authorities [Chapter IV]  ,[object Object],[object Object]
Digital Signature Certificate [Chapter VII] ,[object Object],[object Object]
IT Act –overview of other relevant provisions ,[object Object],[object Object],[object Object],[object Object]
Section 12- Acknowledgement of Receipt ,[object Object],[object Object],[object Object]
Section 13- Dispatch of Electronic record ,[object Object],[object Object],[object Object],[object Object]
Civil Wrongs under IT Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Civil Wrongs under IT Act (Contd.)
Data diddling:   changing data prior or during input into a computer   ,[object Object],[object Object],[object Object],[object Object]
Section 46 IT Act ,[object Object],[object Object],[object Object]
Section 47, IT Act ,[object Object],[object Object],[object Object],[object Object]
Cybercrime provisions under IT Act,2000   Offences & Relevant   Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration  Sec.66 Publishing obscene information  Sec.67 Un-authorized access to protected system  Sec.70  Breach of Confidentiality and Privacy  Sec.72 Publishing false digital signature certificates  Sec.73
TYPES OF CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Crime against property Crime against Government Crime against persons
TYPES OF CYBER CRIMES Cyber crimes Hacking Information  Theft E-mail bombing Salami  attacks Denial of  Service  attacks Trojan  attacks Web jacking
Frequency of reporting Cybercrime in India ,[object Object]
Section 65: Source Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss  or   damage to the public or any person – Destruction, deletion, alteration, diminishing   value or utility or injuriously affecting   information residing in a computer resource • Punishment – imprisonment up to three years, and / or   – fine up to Rs. 2 lakh • Cognizable, Non Bailable,   Section 66 covers data theft aswell as data alteration
Sec. 67. Pornography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Pornography Cases ,[object Object],[object Object],[object Object]
State of  Tamil Nadu Vs Suhas Katti  Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting.  The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet.  The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India.
The verdict extract… “  The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India.
Sec 69: Decryption of information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sec 70 Protected System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sections 71 & 72 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sections 73 & 74 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber crimes punishable under various Indian laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Related Crimes under IPC and Special Laws Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
Some more offences dealt with under IPC… ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Cognizability and Bailability   ,[object Object],- Rely on Part II of Schedule I of CrPC
Power of Police to Investigate ,[object Object],[object Object],[object Object],[object Object]
Power of Police to investigate (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email spoofing:   ,[object Object]
Legal provisions to counter identity theft ,[object Object],[object Object],[object Object]
Forgery ,[object Object],[object Object]
Cyber stalking ,[object Object]
Cyber defamation ,[object Object],[object Object]
Online gambling: virtual casinos, Cases of money laundering ,[object Object],[object Object]
Case Study- BPO Data Theft ,[object Object],[object Object]
BPO data theft -Case Study (contd.) ,[object Object],[object Object]
BPO data theft -Case Study  (contd.) ,[object Object],[object Object],[object Object],[object Object]
Case Study- Case of Extortion of Money Through Internet ,[object Object],[object Object]
Case of Extortion of Money Through Internet -Case Study (contd.) ,[object Object],[object Object]
FIR NO 76/02 PS PARLIAMENT STREET   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other important provisions of the  IT Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amendments- Indian Evidence Act 1872 ,[object Object]
Presumptions in law ,[object Object]
Presumptions in law ,[object Object]
Societe Des products Nestle SA case  2006 (33 ) PTC 469 &  State v Mohd Afzal, 2003 (7) AD (Delhi)1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important issues to ponder..IT Act is incomplete?? ,[object Object],[object Object],[object Object],[object Object]
Is IT Act incomplete? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Report of the Expert Committee Proposed Amendments to  Information Technology Act 2000   SUMMARY  -August  2005  ,[object Object],[object Object],[object Object],[object Object]
Suggestions from Report of the Expert Committee (contd..) ,[object Object],[object Object]
POSITIVE INITIATIVES & RECOMMENDATIONS ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],POSITIVE INITIATIVES & RECOMMENDATIONS (Contd.)
[object Object]

More Related Content

What's hot

Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)FaizahFarook
 
Competition advocacy presentation
Competition advocacy presentationCompetition advocacy presentation
Competition advocacy presentationAfreenkhan153
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]Kamal Thakur
 

What's hot (20)

Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Anticipatory bail
Anticipatory bailAnticipatory bail
Anticipatory bail
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)
 
Competition advocacy presentation
Competition advocacy presentationCompetition advocacy presentation
Competition advocacy presentation
 
2
22
2
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Information technology act
Information technology actInformation technology act
Information technology act
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
 
Directors
DirectorsDirectors
Directors
 

Similar to Information Technology Act 2000 An Overview

Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdfNavarajBaniya1
 

Similar to Information Technology Act 2000 An Overview (20)

Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Class it act
Class it actClass it act
Class it act
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
It act
It actIt act
It act
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
It act 2000
It act 2000It act 2000
It act 2000
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf
 

Information Technology Act 2000 An Overview

  • 1. Information Technology Act 2000- An overview Date: 27 th November 2008 Venue: National Institute of Financial Management Faridabad Sector-48, Pali Road
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. CCA CA CA CA Relying Party Subscriber Subscriber Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Cybercrime provisions under IT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
  • 44.
  • 45. TYPES OF CYBER CRIMES Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking
  • 46.
  • 47.
  • 48. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration
  • 49.
  • 50.
  • 51. State of Tamil Nadu Vs Suhas Katti Conviction within 7 months The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. The accused was a known family friend of the victim and was reportedly interested in marrying her. She however married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. The accused is found guilty and convicted for offences under section 469, 509 IPC and 67 of IT Act 2000 . This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India.
  • 52. The verdict extract… “ The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered as the first case convicted under section 67 of Information Technology Act 2000 in India.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Computer Related Crimes under IPC and Special Laws Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.