SlideShare una empresa de Scribd logo
1 de 75
The Information
Technology Act, 2000
Asst Prof. Parasmani Jangid
SDJ International College
Content to be covered
 Information Technology Act, 2000 – Definitions,
objectives, Exception
 Digital Signature/Electronic Signatures & Electronic Signature Certificate
 Certifying Authority
 E-Governance
 Offences and Penalties
 Cyber Appellate Tribunal
Terms to be focused
 Cyber crime : Cyber crime means criminal activities carries out by means
of computer or internet.
 E-Commerce : Buying & Selling good and Services over electronic network
or internet.
 Electronic Records : Information captured through electronic means. In pen
drive or in form of file, image, in mails, which are in readable form in
machine.
 Digital signature : A way to ensure that an electronic document is authentic.
 Authentic : confirmation about the sender, that is not been altered in any
way.
 Access: "access", with its grammatical variations and cognate expressions,
means gaining entry into, instructing or communicating with the logical,
arithmetical or memory function resources of a computer, computer system
or computer network
 Asymmetric Crypto System: "asymmetric crypto system" means a system of a
secure key pair consisting of a private key for creating a digital signature and a
public key to verify the digital signature
 Communication Device: "communication device" means cell phones, personal digital
assistance or combination of both or any other device used to communicate, send or
transmit any text, video, audio or image
 Computer: "computer" means any electronic, magnetic, optical or other high-speed
data processing device or system which performs logical, arithmetic and memory
functions by manipulations of electronic, magnetic or optical impulses, and includes
all input, output, processing, storage, computer software or communication facilities
which are connected or related to the computer in a computer system or computer
network
 Computer Network: "computer network" means the inter-connection of one or more
computers or computer systems or communication device through-
(i) the use of satellite, microwave, terrestrial line, wire, wireless or other
communication media; and
(ii) terminals or a complex consisting of two or more inter-connected computers
or communication device whether or not the inter-connection is continuously
maintained
 Computer System: "computer system" means a device or collection of
devices, including input and output support devices and excluding
calculators which are not programmable and capable of being used in
conjunction with external files which contain computer programmes,
electronic instructions, input data and output data that performs logic,
arithmetic, data storage and retrieval, communication control and other
functions
 Cyber Security: "cyber security" means protecting information, equipment,
devices computer, computer resource, communication device and
information stored therein from unauthorised access, use, disclosure,
disruption, modification or destruction
 Secure System: "secure system" means computer hardware, software, and
procedure that-
(a) are reasonably secure from unauthorised access and misuse;
(b) provide a reasonable level of reliability and correct operation;
(c) are reasonably suited to performing the intended functions; and
(d) adhere to generally accepted security procedures
Introduction
 The United Nations General Assembly by resolution A/RES/51/162,
dated the 30 January 1997 has adopted the Model Law on Electronic
Commerce as adopted by the United Nations Commission on
International Trade Law. This is referred to as the UNCITRAL Model Law
on E-Commerce.
 Following the United Nation(s) Resolution, India passed the Information
Technology Act, 2000 on 9th May 2000, which came into force on
October 17, 2000 (presented by Mr. Pramod Mahajan, IT Minister and
passed by president K.R. Narayan). The Information Technology
Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian
Parliament (No 21 of 2000).
 It is the primary law in India dealing with cyber crime and electronic
commerce.
 The Information Technology Act, 2000 provides legal recognition to the
transaction done via electronic exchange of data and other electronic
means of communication or electronic commerce transactions.
 This also involves the use of alternatives to a paper-based method of
communication and information storage to facilitate the electronic filing
of documents with the Government agencies.
 IT Act consists total 13 chapters, 94 sections and 4 schedules.
 Section 1 to 16 : Legal Aspects & digital Signature
 Section 17 to 42: Certifying Authorities
 Section 43 to 47: Penalties & Compensation
 Section 48 to 64: Appellate tribunals & appeal to High court
 Section 65 to 78: Offences
 Section 79 to 94: Miscellaneous of the act
Objectives
 The Information Technology Act, 2000 was made applicable in India with following
objectives
1. To give legal recognition to any transaction (done electronically) or use of internet
2. To give legal recognition to digital signature for accepting any agreement via computer.
3. To provide facility of filling document online relating to school admission or registration in
employment exchange.
4. To provide legal recognition for storage in electronic format.
5. To stop computer crime and protect privacy of internet users.
6. To give legal recognition for keeping books of accounts by bankers and other companies
in electronic form.
7. To make more power to IPO, RBI and Indian Evidence Act, 1872 for restricting electronic
crime.
8. To amend the Indian Penal Code, 1860, Indian Evidence Act, 1872, The Bankers’ Books
Evidence Act, 1891 and the Reserve Bank of India Act, 1934
Scope of the Act, section 1(4)
 Information Technology Act, 2000 is applicable to all electronic transactions
except the following –
a) A negotiable instrument (other than a cheque) as defined in section 13 of
the Negotiable Instruments Act, 1881;
b) A power-of-attorney as defined in section 1A of the Powers of Attorney Act,
1882;
c) A trust (an obligations annexed to the ownership of the property) as defined
in section 3 of the Indian Trusts Act, 1882;
d) A will as defined in clause (h) of section 2 of the Indian Succession Act,
1925 including any other testamentary disposition by whatever name called;
e) Any contract for the sale or conveyance of immovable property or any
interest in such property;
f) Any such class of documents or transactions as may be notified by the
Central Government in the Official Gazette.
Digital Signature Section: 3
As per Section 2(1) (p) of Information
Technology Act, 2000 “Digital
signature” means authentication of
any electronic record by a
subscriber by means of an
electronic method or procedure in
accordance with the provisions of
section 3.
What is a digital signature?
 A Digital signature (standard electronic signature) takes the
concept of traditional paper-based signing and turns it into an
electronic “fingerprint”.
 This fingerprint or coded message, is unique to both the
document and the signer and binds both of them together.
The digital signature ensures the authenticity of the signer.
 Any changes made to the document after it is signed
invalidate the signature, thereby protecting against signature,
forgery and information tampering.
 Digital signatures help organizations to sustain signer
authenticity, accountability, data integrity and non-repudiation
of electronic documents and forms.
 Generally it used in electronic mail, contracts, or a message
sent etc.
Who issues digital Signature?
 A digital signature is issued by a Certifying
Authority (CA) and is signed with the CA’s private
key.
 A digital signature typically contains the: Owner’s
public key, the Owner’s name, Expiration date of
the public key, the Name of the issuer (the CA
that issued the Digital ID), Serial number of the
digital signature, and the digital signature of the
issuer. Digital signatures deploy the Public Key
Infrastructure (PKI) technology.
Cryptography
Cryptography is the science of secret
writing with the intention of keeping the
data secret. Cryptography is classified
into symmetric cryptography,
asymmetric cryptography and hashing.
Type of cryptography
 Symmetrical (private key) and Asymmetrical (public key)
 Digital signatures employ asymmetric cryptography.
 In public key/ asymmetric cryptography cryptography, two
keys are used, one key is used for encryption and while the
other is used for decryption.
 In public key cryptography, one of the two keys is kept as a
secret.
 In this cryptography, sender and receiver does not need to
share the same key.
 In this cryptography, public key can be public and private key
is private. (key just a sequence of no. it can be generated
randomly)
Electronic Signature Section:
3A
 According to the US Federal ESIGN Act, that was passed in 2000,
“Electronic signature can be defined as an electronic symbol,
sound or process that is associated with a record or a contract
logically. An electronic signature is created or adopted by a
person in order to sign the record.”
Difference
Is Digital/Electronic Signature
Legal?
 The electronic signatures are legalized and acts as a legal binding.
 In the United States, the electronic signatures are legal and
recognized as the handwritten signatures after the approval of the
following acts:
 Uniform Electronic Transactions Act (UETA) in 1999
 Electronic Signatures in Global and National Commerce Act
(ESIGN) in 2000
 Combined together, these two acts – UETA and ESIGN ACT allow
the usage of electronic signatures to replace the handwritten
signatures. It is required that an electronic signature meets the four
legal hallmarks of the e-signature.
four requirements for an
electronic signature (valid by
US Law)
 The signer is who he/she claims to be. An electronic signature is
the identity of the signer. If required, the identity of the signer could
be authenticated or verified using a number of digital markers such
as an IP address.
 The intention of the signer to sign is clear. The terms of the
document/ contract/ transaction should have been communicated
well with the signer. The signer should be intentionally agreed to
undergo the e-signing procedure.
 It could be verified that the signature is associated with the
signed document. This parameter basically involves the signing
process such as how the document was signed, which process the
signer completed, and which documentation supports the electronic
transaction involving e-signature.
 The record should be retained by the creator or sender. The
electronic signature records and documents should be created to
retain and reproduce accurately for further reference by all the
parties and individuals who are responsible to retain the record or
contract.
Types of Electronic Signature
 Click-to-Sign Signatures (check box)
 Basic Electronic Signatures (witness digital signature,
just like paper sign)
 Advanced Electronic Signatures (standard
signature, legally binding). eIDAS-regulation regarding
electronic identification and electronic transactions in the
internet market, is known as the advanced electronic
signature.
 Qualified Electronic Signatures (produced through
qualified trust service providers (QTSPs), carries the
highest probative value)
“Click to
Sign”
Basic e-
Signatures
Advanced
eSignatures
Qualified
eSignatures
User Authentication No No Yes Yes
User Consent No No Yes Yes
User’s Signature Mark Yes Yes Yes Yes
Document Integrity No Yes Yes Yes
Bind Signer’s ID to Doc No No Yes Yes
Certify Signature No No Yes Yes
Embedded Evidence No No Yes Yes
Long Term Verifiability No No Yes Yes
Electronic Signature Used for
 Invoices, sales contracts, and NDAs
 Employee paperwork, timesheets, and approve
proposals
 School forms, permission slips, and release
forms
 Leases, property, and other housing and rental
agreements
 Bank forms, tax documents, and insurance forms
can not use e-signatures
while dealing with
Marriage registration
Family law, and
Inheritance rights
Benefits of Using Electronic
Signature
 Get documents signed fast
 Sign documents from anywhere
 Save money with e-signature software
packages
 Collect secure and legally binding signatures
 Effort and time saving to handle technical
hassles
 Increased service and efficiency
Certifying Authorities
Section 2 (1)(g)
Certifying authority means a person
who has been granted a licence to
issue and electronic signature
certificate under section 24 of IT ACT,
2000.
Certifying Authorities
 The information Technology Act, 2000 has established a
Certifying Authority to regulate the electronic
transactions.
 Trusted person who issue Digital Certificates & public-
private key pairs.
 It assures that the one who is transferring the certificate
is, in fact, he or she claims to be/ proves the owner of
the certificate. (authentication)
 When one applies for digital license or digital. Certificate
then the third party who verifies the physical documents
is also certifying authorities
Introduction & roles of Certifying Authorities
The Act provide for the Controller of
Certifying Authorities (CCA) to licence
and regulate the working of Certifying
Authorities (CAs). CCA also ensures
that none of the provisions of the Act
are violated.
 The regulation of certifying authorities or electronic signature
infrastructure in India consists of :
 Controller of Certifying Authority (CCA). The IT Act, 2000
provides for an appointment, functions, powers, duties of CCA
(the apex regulatory body for certifying authorities in India) and
other officers.
 Certifying Authorities (CAs). A certifying authority is a trusted
third party or entity that will get licence from the controller and
will issue electronic signature certificate to the users of e-
commerce. These authorities will function under the supervision
and control of the controller of certifying authorities.
Who can be applicant for CA
Individual
Company
Partnership Firm
Government
General Conditions for
applicants
 No conditions will apply to government but other three
entities must fulfill the same.
 No licence shall be provided in case of failure in
satisfying conditions with respect to Qualification,
expertise, manpower, financial resources and
infrastructure facilities as prescribed by the central
government.
Licence granted under this section shall be :
 Valid for period prescribed by Central govt.
 Not be transferable or heritable
 Subjected to such terms and conditions as may be
specified by the regulations.
Conditions for an individual
Citizen of India
Must have capital of 5 crore rupees or
more in his business or profession
Conditions for a Company
Must have paid-up capital of not less than 5
crore rupees and networth of not less than 50
crore rupees
Provided no company shall be eligible for
grant of licence if equity share capital held by
NRI exceeds 49% of its capital.
Provided further company must have the
networth of its majority shareholders holding
at least 51 % of paid up capital
Conditions for a Partnership
Firm
 Must have subscribed capital of not less than 5
crore rupees and networth of not less than 50
crore rupees (total of all partners)
 Partner and partnership shall have the meaning
under Indian Partnership Act, 1932.
 Provided no company shall be eligible for grant of
licence if equity share capital held by NRI
exceeds 49% of its capital.
 Provided further company must have the
networth of its majority shareholders holding at
least 51 % of paid up capital
Condition regarding
performance bond
Except government , other three applicants must
submit the performance bond in the form of a
banker’s guarantee from a schedule bank of 50
lac rupees.
In case of newly registered company or firm
must have submit the bond of 1 crore rupees,
not applicable only when , newly established
company or firm acquired net worth not less
than 50 crore in last one year only
Some licence certifying
authorities in India
Safescrypt
National Informatics Centre (NIC)
Tata Consultancy Services (TCS)
e Mudra
Capricorn
Regulation of Certifying
Authorities (Section 17 to 34)
 Section 17 : Appointment of controller &other officers
(Certifying Authorities).
 The Central government may appoint a controller but after
notifying in the official gazette. they may also appoint deputy
controllers and assistant controllers.
 Controller works under the direction of central government
while deputy controllers and assistant controllers shall perform the
functions under the control of controller.
 Qualification of the officer shall be prescribed by central government
and the controller will be given a office seal.
 The Head office and branch office will be decided by Central
government.
 There will be office seal of controller.
 Section 18 functions of controller.
 basically the controller supervise the activity of certifying
authorities.
 It also lay down the duties of certifying authorities.
 Controller resolve any conflict between certifying authorities and
subscribers.
 Maintain a database containing record of every certifying authority.
 It certifies public keys of the certifying Authorities
 It specifies manner in which books of account shall be maintained.
 It also specify the terms and conditions subject to which auditors
may be appointed and the remuneration to be paid
 Section 19 : It is for recognition of foreign certifying
authority.
 Controller first get the approval from central government
and by notification in official gazette, foreign certifying
authority will be recognized.
 The digital signature certificate will be valid for the purpose of
this act.
 The controller may revoke such recognition if certifying
authority contravened any condition subject to which it was
recognised.
 Section 20 : Controller to act as repository
 Controller shall be repository of all digital signature
certifiacate
 shall observe the standards as may be prescribed by
central govt. to ensure the security and secrecy of digital
signature.
 Maintained a computerised data base of all the public
keys
 Shall use hardware software and procedure that are
secure
 Section 21 : Licence to issue digital signature certificates
 any person may make an application to the controller for a
licence to issue digital signature certificates.
 No licence shall be provided in case of failure in satisfying
conditions with respect to Qualification, expertise, manpower,
financial resources and infrastructure facilities as prescribed
by the central government.
Licence granted under this section shall be :
 Valid for period prescribed by Central govt.
 Not be transferable or heritable
 Subjected to such terms and conditions as may be specified
by the regulations.
Section 22 : Application for licence
 must be in prescribed form given by central
government
A certification practice statement
Statement including identification of applicant
Payment of fees (not exceed 25 k)
Other documents
Section 23 : Renewal of Licence
In a prescribed form, accompanied by
prescribed form,
Have to apply not less than 45 days
before the date of expiry.
Section 24: Procedure for grant or
rejection of licence
Verifying the documents with application
and then he will grant or reject the
application
Reasonable opportunity of presenting
applicants case will be given before
rejecting the application.
Section 25 : Suspension of licence
 in case of incorrect or false statement
presented by CA or not complying with
terms and conditions.
 section 26 notice of suspension or revocation of license (published in
database)
 Section 27 power to delegate (duties & all to subordinates)
 section 28 power to investigate contraventions (rights with all CA)
 section 29 access to computers and data (in case of breach of
conditions)
 section 30 certifying authority to follow certain procedure (hardware
software must be secured)
 section 31 certifying authority to ensure compliance of the act et
cetera (comply course of rule)
 section 32 display of license
 section 33 surrender of license (after revocation of license)
 section 34 disclosure (materially or adversely affecting the reliability
of digital signature certificates.)
E-Governance
Electronic Governance is the process
with the aim of enhancing govt. ability to
address the need of the general public.
The basic purpose of e-Governance is
to simplify process for all i.e. Govt.,
citizen, business etc. at National, State
and local level.
E-Governance
E-governance is the application of information
and communication technology (ICT) for
delivering government services, exchange of
information, communication transactions,
integration of various stand-alone system.
The basic purpose of e-governance is to
simplify processes for all, i.e. government,
citizens, businesses, etc. at National, State and
local levels.
In short, it is the use of electronic means,
to promote good governance. It connotes the
implementation of information technology in the
government processes and functions so as to
cause simple, moral, accountable and
transparent governance. It entails the access
and delivery of government services,
dissemination of information, communication in
a quick and efficient manner.
Types of Interactions in E-
Governance
 G2G (Government to Government): When the exchange of
information and services is within the periphery of the
government, is termed as G2G interaction. This can be both
horizontal, i.e. among various government entities and vertical,
i.e. between national, state and local government entities and
within different levels of the entity.
 G2C (Government to Citizen): The interaction amidst the
government and general public is G2C interaction. Here an
interface is set up between government and citizens, which
enables citizens to get access to wide variety of public
services. The citizens has the freedom to share their views
and grievances on government policies anytime, anywhere.
(E-voting or tax file)
Types of Interactions in E-
Governance
 G2B (Government to Business): In this case, the e-
governance helps the business class to interact with the
government seamlessly. It aims at eliminating red-tapism,
saving time, cost and establish transparency in the business
environment, while interacting with government. (E-tender, e-
finacial support)
 G2E (Government to Employees): The government of any
country is the biggest employer and so it also deals with
employees on a regular basis, as other employers do. ICT
helps in making the interaction between government and
employees fast and efficient, along with raising their level of
satisfaction by providing perquisites and add-on benefits.
(online payment to govt. employees)
Benefits
 Reduced Corruption
 High Transparency (linked AD card, PAN card)
 Increased Convenience
 Growth in GDP
 Direct participation of Constituents
 Expanded reach of government
 Increases speed and saving cost
E-Governance (Section 4 to10
A)
 Section 4: Legal Recognition of Electronic record
 Section 5: Legal Recognition of Electronic Signature
 Section 6: Use of e-records and e-signature in govt.
and it’s agencies.
 Section 6 A: Delivery of services by service provider
 Section 7: Retention of electronic records
 Section 7 A: Audit of documents etc. maintained in
electronic form.
Section 8: Publication of rule, regulations
etc. in electronic gazette.
Section 9: Sec 6, 7 & 8 not to confer rights
to insist document should be accepted in
electronic form
Section 10: power to make rules by central
govt. in respect or e-signature.
Section 10 A: Validity of contracts formed
through electronic means.
Offences and penalties under
IT Act,2000 (Section 65 to 71)
 Section 65 : Tampering with computer source documents (conceals,
destroys, alters, etc. intentionally done) The object of the section is to
protect the “intellectual property” invested in the computer.
 Section 66 : Hacking with computer system (related to Sec 43)
 Section 66 A : 2009 amendment for sending offensive messages
 Section 66 B: Receiving stolen computer or communication device
 Section 66 C: using password of another person& identity theft
(fraudulently using password, signature or UID or OTP)
 Section 66 D: Cheating by personating by using computer resource
 Section 66 E: (Violation of privacy) Publishing Private images of others
 Section 66 F: Acts of cyber terrorism, to strike terror (against country’s
integrity, security, sovereignty, unity)
 Section 67: Publishing information which is obscene in electronic
form. ( immoral, not decent)
 Section 67 A: Publishing images containing sexual act
 Section 67 B: Publishing child porn or predating children online
 Section 67 C:Failure to maintain /retain records
 Section 68: Failure/refusal to comply with orders of controller
 Section 69: Failure/ refusal to decrypt the data (for india)
 Section 70: Securing access or attempting to secure access to a
protected system
 Section 71: Misrepresentation (about material Fact)
Case-law
Girl victim Boy culprit
 Obscene message
 Published offensive message
 Create fake FB profile, uploaded obscene image
 Section applied 66C 66D 67 67A
Shreya Singhal vs Union of India (sec 66A)
2015
 Bal Thackery’s death and Mumbai was announced to be shut down;
2012
 2 Girls posts against it on face book
 Sec 66A, 69A and 79 of IT Act are against Article 19(1)(a)-(Freedom of
expression), Article 14-(Right to Equality), Article 21- (Right to life)
Feb 2017 Delhi based E-commerce
company portal (hackers done the
digital shop lifting)
Raj Kundra case
 Sec 67 publishing or transmission of obscene
 Sec 67 A Publishing images
 Sec 67 B Child pornography
Section Offence Penalty
65 Tampering with computer source documents
Imprisonment up to 3 years, or/and with fine up
to Rs 200,000
66 Hacking with computer system
Imprisonment up to 3 years, or/and with fine up
to Rs 500,000
66B Receiving stolen computer or communication device
Imprisonment up to 3 years, or/and with fine up
to Rs 100,000
66C Using password of another person
Imprisonment up to 3 years, or/and with fine up
to Rs 100,000
66D Cheating using computer resource
Imprisonment up to 3 years, or/and with fine up
to Rs 100,000
66E Publishing private images of others
Imprisonment up to 3 years, or/and with fine up
to Rs 200,000
66F Acts of cyber terrorism Imprisonment up to life.
67
Publishing information which is obscene in
electronic form.
Imprisonment up to 5 years, or/and with fine up
to Rs 1,000,000
67A Publishing images containing sexual acts
Imprisonment up to 7 years, or/and with fine up
to Rs 1,000,000
67B Publishing child porn or predating children online
Imprisonment up to 5 years, or/and with fine up
to Rs 1,000,000 on first conviction. Imprisonment up
to 7 years, or/and with fine up to Rs 1,000,000 on
second conviction.
67C Failure to maintain records Imprisonment up to 3 years, or/and with fine.
Section Offence Penalty
68 Failure/refusal to comply with orders
Imprisonment up to 2 years, or/and with fine up
to Rs100,000
69 Failure/refusal to decrypt data Imprisonment up to 7 years and possible fine.
70
Securing access or attempting to secure access to
a protected system
Imprisonment up to 10 years, or/and with fine.
71 Misrepresentation
Imprisonment up to 2 years, or/and with fine up
to Rs100,000
72 Breach of confidentiality and privacy
Imprisonment up to 2 years, or/and with fine up
to Rs100,000
72A
Disclosure of information in breach of lawful
contract
Imprisonment up to 3 years, or/and with fine up
to Rs500,000
73
Publishing electronic signature certificate false in
certain particulars
Imprisonment up to 2 years, or/and with fine up
to Rs100,000
74 Publication for fraudulent purpose
Imprisonment up to 2 years, or/and with fine up
to Rs100,000
Penalties and Compensation
(Section 43 to 45)
 Section 43: Penalty & compensation for damage to computer, computer
system, etc. (access or copy or destroy or delete)( penalty shall not
exceeds 1 crore rupees) (spyware)
 Section 43 A: Compensation for failure to protect data (for corporate
body)(penalty shall not exceed 5 crore rupees)
 Section 44: penalty for failure to furnish information, returns, etc. (for an
individual) (penalty shall not exceed 1.5 lac rupees)
 Section 44 B: Required to file any returns within time period (for an
individual) (penalty shall not exceed 5 K rupees)
 Section 44 C: Fails to maintain books of accounts (for an individual)
(penalty shall not exceed 10 k rupees)
 Section 45: Residuary Penalty (such contravention and penalties (for a
person) which are not mentioned seperately (penalty shall not exceed 25 K
rupees)
Cyber Appellate Tribunal
(Section 48 to 58)
Section 48 Establishment
The central government notifies and
establishes appellate tribunals called
Cyber Regulations Appellate Tribunal.
Central government also specifies all the
matters and places which fall under the
jurisdiction of the tribunal.
 Section 49 Composition
 Central government only appoints a person in a tribunal
“The Presiding Officer” of cyber appellate tribunal
(before amendments)
 After 2008, one chairperson and few members ( central
govt. can consult with CJI)
 One branch includes one chairperson and two members
(can use CAT’s power)
 Transfer of two other member is possible by chair
person
 Section 50 Qualification for appointment as Chairperson &
Members
 For chairperson Same as Judge of a high court (article 217,
Indian citizen and 10 years experience as advocate in HC or
10 years experience as judicial officer in india)
 For Members (special knowledge & professional Experience
in IT, Telecommunications, Industry. Management, Consumer
Affairs)
 Must have worked in service of central or state govt. or
additional secretary of govt. of india or equivalent post for at
least 1 year or joint secretary or equivalent post for at least 7
year.
Section 51: The term of Office
5 years from the date of joining or until
he turns into 65, w.i.e.
Must not have personal benefit.
Must retire from the current services.
 Section 52: Salary, allowances and other terms
and conditions of service of Presiding Officer.
 Decided by central govt.
 The salary and allowances payable to, and the
other terms and conditions of service including
pension, gratuity and other retirement benefits of,
the Presiding Officer of a Cyber Appellate
Tribunal shall be such as may be prescribed
 Section 52 A: Power of chairperson General
superintendence & directions in affairs of tribunal
 Section 52 B: Distribution of business among
benches/branches
 Section 52 C: Power of chairperson to transfer
cases Application by the party, after hearing the
case, without notice also
 Section 52 D: Decision by Majority
Section 53 Filling up of vacancies
To fill the vacancy central government
hires another person except temporary
reason
Proceedings will continue with new
officer.
 Section 54: Resignation or Removal
 Notice to central government
 Holds the office for 3 month after notice (can leave early
only if govt. permits)
 Or
 Till appointment of successor
 Or
 Expiry of his office, w.i.e.
 Removal in case of misbehavior by officer, case will be
file by supreme court and enough opportunity will be
given to defend himself.
 Section 55: Orders constituting Appellate Tribunal
to be final and not to invalidate its proceedings
 Section 56: Staff of the Cyber Appellate Tribunal
The Central Government shall provide the
Cyber Appellate Tribunal with such officers
and employees as that Government may think fit.
 The officers and employees of the Cyber Appellate
Tribunal shall discharge their functions under
general superintendence of the Chairperson.
 Section 57: Appeal to cyber Appellate Tribunal
 If not satisfied with controller or adjudicating officer’s
order then only one can go to appeal in CAT within 45
days with fees.
 In case of any considerable reason of being late in
appealing, the tribunal can consider such case.
 2 copies of orders one with adjudicating officer and
other with all parties.
 CAT ties to dispose such appeal within 6 month
 Section 58: Procedure and powers of Cyber Appellate Tribunal
 All proceedings will be same as judicial proceedings of civil
court.(principles of natural justice, code of civil procedures,1908)
 According to code of civil procedures,1908 Summon, examining on
Oath
 Production of documents
 Evidence on affidavits
 Issuing commission for examining
 CAT can review its own decisions
 Dissmiss the application
 Section 59: right to legal representation (self or
legal practitioner)
 Section 60: limitation (Act 1963)
 Section 61: Civil court not to have Jurisdiction
 Section 62: Appeal to HC within 60 days to order or
judgement
 Section 63: Compounding of contraventions
(should not exceed the max. amt of penalty)
 Section 64: Recovery of penalty or compensation
(land revenue or suspension of ESC)
IT ACT, 2000 (Information Technology Act, 2000)

Más contenido relacionado

La actualidad más candente

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 

La actualidad más candente (20)

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Cyber law
Cyber lawCyber law
Cyber law
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 

Similar a IT ACT, 2000 (Information Technology Act, 2000)

HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic SignaturesClaire Webber
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...recoveraccount1
 

Similar a IT ACT, 2000 (Information Technology Act, 2000) (20)

HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Class it act
Class it actClass it act
Class it act
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
It act 2000
It act 2000It act 2000
It act 2000
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic Signatures
 
It act
It actIt act
It act
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 

Más de Ms. Parasmani Jangid (20)

Promotion Mix
Promotion MixPromotion Mix
Promotion Mix
 
Market Segmentation
Market SegmentationMarket Segmentation
Market Segmentation
 
Marketing Control
Marketing ControlMarketing Control
Marketing Control
 
Market Research
Market ResearchMarket Research
Market Research
 
Marketing Mix
Marketing MixMarketing Mix
Marketing Mix
 
Marketing Environment
Marketing EnvironmentMarketing Environment
Marketing Environment
 
Pricing
PricingPricing
Pricing
 
Product, PLC & Product Development
Product, PLC & Product DevelopmentProduct, PLC & Product Development
Product, PLC & Product Development
 
Types of Market
Types of MarketTypes of Market
Types of Market
 
Online marketing
Online marketingOnline marketing
Online marketing
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 
Industrial unrest
Industrial unrestIndustrial unrest
Industrial unrest
 
Trade union
Trade unionTrade union
Trade union
 
Managing Change
Managing ChangeManaging Change
Managing Change
 
BPR ERP Value Stream Management
BPR ERP Value Stream ManagementBPR ERP Value Stream Management
BPR ERP Value Stream Management
 
Building Effective Teams
Building Effective TeamsBuilding Effective Teams
Building Effective Teams
 
Privatisation of Insurance
Privatisation of InsurancePrivatisation of Insurance
Privatisation of Insurance
 
Fire Insurance
Fire InsuranceFire Insurance
Fire Insurance
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Organizational Power
Organizational PowerOrganizational Power
Organizational Power
 

Último

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 

Último (20)

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 

IT ACT, 2000 (Information Technology Act, 2000)

  • 1. The Information Technology Act, 2000 Asst Prof. Parasmani Jangid SDJ International College
  • 2. Content to be covered  Information Technology Act, 2000 – Definitions, objectives, Exception  Digital Signature/Electronic Signatures & Electronic Signature Certificate  Certifying Authority  E-Governance  Offences and Penalties  Cyber Appellate Tribunal
  • 3. Terms to be focused  Cyber crime : Cyber crime means criminal activities carries out by means of computer or internet.  E-Commerce : Buying & Selling good and Services over electronic network or internet.  Electronic Records : Information captured through electronic means. In pen drive or in form of file, image, in mails, which are in readable form in machine.  Digital signature : A way to ensure that an electronic document is authentic.  Authentic : confirmation about the sender, that is not been altered in any way.  Access: "access", with its grammatical variations and cognate expressions, means gaining entry into, instructing or communicating with the logical, arithmetical or memory function resources of a computer, computer system or computer network
  • 4.  Asymmetric Crypto System: "asymmetric crypto system" means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature  Communication Device: "communication device" means cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text, video, audio or image  Computer: "computer" means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or related to the computer in a computer system or computer network  Computer Network: "computer network" means the inter-connection of one or more computers or computer systems or communication device through- (i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and (ii) terminals or a complex consisting of two or more inter-connected computers or communication device whether or not the inter-connection is continuously maintained
  • 5.  Computer System: "computer system" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files which contain computer programmes, electronic instructions, input data and output data that performs logic, arithmetic, data storage and retrieval, communication control and other functions  Cyber Security: "cyber security" means protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorised access, use, disclosure, disruption, modification or destruction  Secure System: "secure system" means computer hardware, software, and procedure that- (a) are reasonably secure from unauthorised access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended functions; and (d) adhere to generally accepted security procedures
  • 6. Introduction  The United Nations General Assembly by resolution A/RES/51/162, dated the 30 January 1997 has adopted the Model Law on Electronic Commerce as adopted by the United Nations Commission on International Trade Law. This is referred to as the UNCITRAL Model Law on E-Commerce.  Following the United Nation(s) Resolution, India passed the Information Technology Act, 2000 on 9th May 2000, which came into force on October 17, 2000 (presented by Mr. Pramod Mahajan, IT Minister and passed by president K.R. Narayan). The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000).  It is the primary law in India dealing with cyber crime and electronic commerce.
  • 7.  The Information Technology Act, 2000 provides legal recognition to the transaction done via electronic exchange of data and other electronic means of communication or electronic commerce transactions.  This also involves the use of alternatives to a paper-based method of communication and information storage to facilitate the electronic filing of documents with the Government agencies.
  • 8.  IT Act consists total 13 chapters, 94 sections and 4 schedules.  Section 1 to 16 : Legal Aspects & digital Signature  Section 17 to 42: Certifying Authorities  Section 43 to 47: Penalties & Compensation  Section 48 to 64: Appellate tribunals & appeal to High court  Section 65 to 78: Offences  Section 79 to 94: Miscellaneous of the act
  • 9. Objectives  The Information Technology Act, 2000 was made applicable in India with following objectives 1. To give legal recognition to any transaction (done electronically) or use of internet 2. To give legal recognition to digital signature for accepting any agreement via computer. 3. To provide facility of filling document online relating to school admission or registration in employment exchange. 4. To provide legal recognition for storage in electronic format. 5. To stop computer crime and protect privacy of internet users. 6. To give legal recognition for keeping books of accounts by bankers and other companies in electronic form. 7. To make more power to IPO, RBI and Indian Evidence Act, 1872 for restricting electronic crime. 8. To amend the Indian Penal Code, 1860, Indian Evidence Act, 1872, The Bankers’ Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934
  • 10. Scope of the Act, section 1(4)  Information Technology Act, 2000 is applicable to all electronic transactions except the following – a) A negotiable instrument (other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881; b) A power-of-attorney as defined in section 1A of the Powers of Attorney Act, 1882; c) A trust (an obligations annexed to the ownership of the property) as defined in section 3 of the Indian Trusts Act, 1882; d) A will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called; e) Any contract for the sale or conveyance of immovable property or any interest in such property; f) Any such class of documents or transactions as may be notified by the Central Government in the Official Gazette.
  • 11. Digital Signature Section: 3 As per Section 2(1) (p) of Information Technology Act, 2000 “Digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3.
  • 12. What is a digital signature?  A Digital signature (standard electronic signature) takes the concept of traditional paper-based signing and turns it into an electronic “fingerprint”.  This fingerprint or coded message, is unique to both the document and the signer and binds both of them together. The digital signature ensures the authenticity of the signer.  Any changes made to the document after it is signed invalidate the signature, thereby protecting against signature, forgery and information tampering.  Digital signatures help organizations to sustain signer authenticity, accountability, data integrity and non-repudiation of electronic documents and forms.  Generally it used in electronic mail, contracts, or a message sent etc.
  • 13. Who issues digital Signature?  A digital signature is issued by a Certifying Authority (CA) and is signed with the CA’s private key.  A digital signature typically contains the: Owner’s public key, the Owner’s name, Expiration date of the public key, the Name of the issuer (the CA that issued the Digital ID), Serial number of the digital signature, and the digital signature of the issuer. Digital signatures deploy the Public Key Infrastructure (PKI) technology.
  • 14. Cryptography Cryptography is the science of secret writing with the intention of keeping the data secret. Cryptography is classified into symmetric cryptography, asymmetric cryptography and hashing.
  • 15. Type of cryptography  Symmetrical (private key) and Asymmetrical (public key)  Digital signatures employ asymmetric cryptography.  In public key/ asymmetric cryptography cryptography, two keys are used, one key is used for encryption and while the other is used for decryption.  In public key cryptography, one of the two keys is kept as a secret.  In this cryptography, sender and receiver does not need to share the same key.  In this cryptography, public key can be public and private key is private. (key just a sequence of no. it can be generated randomly)
  • 16.
  • 17. Electronic Signature Section: 3A  According to the US Federal ESIGN Act, that was passed in 2000, “Electronic signature can be defined as an electronic symbol, sound or process that is associated with a record or a contract logically. An electronic signature is created or adopted by a person in order to sign the record.”
  • 18.
  • 20. Is Digital/Electronic Signature Legal?  The electronic signatures are legalized and acts as a legal binding.  In the United States, the electronic signatures are legal and recognized as the handwritten signatures after the approval of the following acts:  Uniform Electronic Transactions Act (UETA) in 1999  Electronic Signatures in Global and National Commerce Act (ESIGN) in 2000  Combined together, these two acts – UETA and ESIGN ACT allow the usage of electronic signatures to replace the handwritten signatures. It is required that an electronic signature meets the four legal hallmarks of the e-signature.
  • 21. four requirements for an electronic signature (valid by US Law)  The signer is who he/she claims to be. An electronic signature is the identity of the signer. If required, the identity of the signer could be authenticated or verified using a number of digital markers such as an IP address.  The intention of the signer to sign is clear. The terms of the document/ contract/ transaction should have been communicated well with the signer. The signer should be intentionally agreed to undergo the e-signing procedure.  It could be verified that the signature is associated with the signed document. This parameter basically involves the signing process such as how the document was signed, which process the signer completed, and which documentation supports the electronic transaction involving e-signature.  The record should be retained by the creator or sender. The electronic signature records and documents should be created to retain and reproduce accurately for further reference by all the parties and individuals who are responsible to retain the record or contract.
  • 22. Types of Electronic Signature  Click-to-Sign Signatures (check box)  Basic Electronic Signatures (witness digital signature, just like paper sign)  Advanced Electronic Signatures (standard signature, legally binding). eIDAS-regulation regarding electronic identification and electronic transactions in the internet market, is known as the advanced electronic signature.  Qualified Electronic Signatures (produced through qualified trust service providers (QTSPs), carries the highest probative value)
  • 23. “Click to Sign” Basic e- Signatures Advanced eSignatures Qualified eSignatures User Authentication No No Yes Yes User Consent No No Yes Yes User’s Signature Mark Yes Yes Yes Yes Document Integrity No Yes Yes Yes Bind Signer’s ID to Doc No No Yes Yes Certify Signature No No Yes Yes Embedded Evidence No No Yes Yes Long Term Verifiability No No Yes Yes
  • 24. Electronic Signature Used for  Invoices, sales contracts, and NDAs  Employee paperwork, timesheets, and approve proposals  School forms, permission slips, and release forms  Leases, property, and other housing and rental agreements  Bank forms, tax documents, and insurance forms
  • 25. can not use e-signatures while dealing with Marriage registration Family law, and Inheritance rights
  • 26. Benefits of Using Electronic Signature  Get documents signed fast  Sign documents from anywhere  Save money with e-signature software packages  Collect secure and legally binding signatures  Effort and time saving to handle technical hassles  Increased service and efficiency
  • 27. Certifying Authorities Section 2 (1)(g) Certifying authority means a person who has been granted a licence to issue and electronic signature certificate under section 24 of IT ACT, 2000.
  • 28. Certifying Authorities  The information Technology Act, 2000 has established a Certifying Authority to regulate the electronic transactions.  Trusted person who issue Digital Certificates & public- private key pairs.  It assures that the one who is transferring the certificate is, in fact, he or she claims to be/ proves the owner of the certificate. (authentication)  When one applies for digital license or digital. Certificate then the third party who verifies the physical documents is also certifying authorities Introduction & roles of Certifying Authorities
  • 29. The Act provide for the Controller of Certifying Authorities (CCA) to licence and regulate the working of Certifying Authorities (CAs). CCA also ensures that none of the provisions of the Act are violated.
  • 30.  The regulation of certifying authorities or electronic signature infrastructure in India consists of :  Controller of Certifying Authority (CCA). The IT Act, 2000 provides for an appointment, functions, powers, duties of CCA (the apex regulatory body for certifying authorities in India) and other officers.  Certifying Authorities (CAs). A certifying authority is a trusted third party or entity that will get licence from the controller and will issue electronic signature certificate to the users of e- commerce. These authorities will function under the supervision and control of the controller of certifying authorities.
  • 31. Who can be applicant for CA Individual Company Partnership Firm Government
  • 32. General Conditions for applicants  No conditions will apply to government but other three entities must fulfill the same.  No licence shall be provided in case of failure in satisfying conditions with respect to Qualification, expertise, manpower, financial resources and infrastructure facilities as prescribed by the central government. Licence granted under this section shall be :  Valid for period prescribed by Central govt.  Not be transferable or heritable  Subjected to such terms and conditions as may be specified by the regulations.
  • 33. Conditions for an individual Citizen of India Must have capital of 5 crore rupees or more in his business or profession
  • 34. Conditions for a Company Must have paid-up capital of not less than 5 crore rupees and networth of not less than 50 crore rupees Provided no company shall be eligible for grant of licence if equity share capital held by NRI exceeds 49% of its capital. Provided further company must have the networth of its majority shareholders holding at least 51 % of paid up capital
  • 35. Conditions for a Partnership Firm  Must have subscribed capital of not less than 5 crore rupees and networth of not less than 50 crore rupees (total of all partners)  Partner and partnership shall have the meaning under Indian Partnership Act, 1932.  Provided no company shall be eligible for grant of licence if equity share capital held by NRI exceeds 49% of its capital.  Provided further company must have the networth of its majority shareholders holding at least 51 % of paid up capital
  • 36. Condition regarding performance bond Except government , other three applicants must submit the performance bond in the form of a banker’s guarantee from a schedule bank of 50 lac rupees. In case of newly registered company or firm must have submit the bond of 1 crore rupees, not applicable only when , newly established company or firm acquired net worth not less than 50 crore in last one year only
  • 37. Some licence certifying authorities in India Safescrypt National Informatics Centre (NIC) Tata Consultancy Services (TCS) e Mudra Capricorn
  • 38. Regulation of Certifying Authorities (Section 17 to 34)  Section 17 : Appointment of controller &other officers (Certifying Authorities).  The Central government may appoint a controller but after notifying in the official gazette. they may also appoint deputy controllers and assistant controllers.  Controller works under the direction of central government while deputy controllers and assistant controllers shall perform the functions under the control of controller.  Qualification of the officer shall be prescribed by central government and the controller will be given a office seal.  The Head office and branch office will be decided by Central government.  There will be office seal of controller.
  • 39.  Section 18 functions of controller.  basically the controller supervise the activity of certifying authorities.  It also lay down the duties of certifying authorities.  Controller resolve any conflict between certifying authorities and subscribers.  Maintain a database containing record of every certifying authority.  It certifies public keys of the certifying Authorities  It specifies manner in which books of account shall be maintained.  It also specify the terms and conditions subject to which auditors may be appointed and the remuneration to be paid
  • 40.  Section 19 : It is for recognition of foreign certifying authority.  Controller first get the approval from central government and by notification in official gazette, foreign certifying authority will be recognized.  The digital signature certificate will be valid for the purpose of this act.  The controller may revoke such recognition if certifying authority contravened any condition subject to which it was recognised.
  • 41.  Section 20 : Controller to act as repository  Controller shall be repository of all digital signature certifiacate  shall observe the standards as may be prescribed by central govt. to ensure the security and secrecy of digital signature.  Maintained a computerised data base of all the public keys  Shall use hardware software and procedure that are secure
  • 42.  Section 21 : Licence to issue digital signature certificates  any person may make an application to the controller for a licence to issue digital signature certificates.  No licence shall be provided in case of failure in satisfying conditions with respect to Qualification, expertise, manpower, financial resources and infrastructure facilities as prescribed by the central government. Licence granted under this section shall be :  Valid for period prescribed by Central govt.  Not be transferable or heritable  Subjected to such terms and conditions as may be specified by the regulations.
  • 43. Section 22 : Application for licence  must be in prescribed form given by central government A certification practice statement Statement including identification of applicant Payment of fees (not exceed 25 k) Other documents
  • 44. Section 23 : Renewal of Licence In a prescribed form, accompanied by prescribed form, Have to apply not less than 45 days before the date of expiry.
  • 45. Section 24: Procedure for grant or rejection of licence Verifying the documents with application and then he will grant or reject the application Reasonable opportunity of presenting applicants case will be given before rejecting the application.
  • 46. Section 25 : Suspension of licence  in case of incorrect or false statement presented by CA or not complying with terms and conditions.
  • 47.  section 26 notice of suspension or revocation of license (published in database)  Section 27 power to delegate (duties & all to subordinates)  section 28 power to investigate contraventions (rights with all CA)  section 29 access to computers and data (in case of breach of conditions)  section 30 certifying authority to follow certain procedure (hardware software must be secured)  section 31 certifying authority to ensure compliance of the act et cetera (comply course of rule)  section 32 display of license  section 33 surrender of license (after revocation of license)  section 34 disclosure (materially or adversely affecting the reliability of digital signature certificates.)
  • 48. E-Governance Electronic Governance is the process with the aim of enhancing govt. ability to address the need of the general public. The basic purpose of e-Governance is to simplify process for all i.e. Govt., citizen, business etc. at National, State and local level.
  • 49. E-Governance E-governance is the application of information and communication technology (ICT) for delivering government services, exchange of information, communication transactions, integration of various stand-alone system. The basic purpose of e-governance is to simplify processes for all, i.e. government, citizens, businesses, etc. at National, State and local levels.
  • 50. In short, it is the use of electronic means, to promote good governance. It connotes the implementation of information technology in the government processes and functions so as to cause simple, moral, accountable and transparent governance. It entails the access and delivery of government services, dissemination of information, communication in a quick and efficient manner.
  • 51. Types of Interactions in E- Governance  G2G (Government to Government): When the exchange of information and services is within the periphery of the government, is termed as G2G interaction. This can be both horizontal, i.e. among various government entities and vertical, i.e. between national, state and local government entities and within different levels of the entity.  G2C (Government to Citizen): The interaction amidst the government and general public is G2C interaction. Here an interface is set up between government and citizens, which enables citizens to get access to wide variety of public services. The citizens has the freedom to share their views and grievances on government policies anytime, anywhere. (E-voting or tax file)
  • 52. Types of Interactions in E- Governance  G2B (Government to Business): In this case, the e- governance helps the business class to interact with the government seamlessly. It aims at eliminating red-tapism, saving time, cost and establish transparency in the business environment, while interacting with government. (E-tender, e- finacial support)  G2E (Government to Employees): The government of any country is the biggest employer and so it also deals with employees on a regular basis, as other employers do. ICT helps in making the interaction between government and employees fast and efficient, along with raising their level of satisfaction by providing perquisites and add-on benefits. (online payment to govt. employees)
  • 53. Benefits  Reduced Corruption  High Transparency (linked AD card, PAN card)  Increased Convenience  Growth in GDP  Direct participation of Constituents  Expanded reach of government  Increases speed and saving cost
  • 54. E-Governance (Section 4 to10 A)  Section 4: Legal Recognition of Electronic record  Section 5: Legal Recognition of Electronic Signature  Section 6: Use of e-records and e-signature in govt. and it’s agencies.  Section 6 A: Delivery of services by service provider  Section 7: Retention of electronic records  Section 7 A: Audit of documents etc. maintained in electronic form.
  • 55. Section 8: Publication of rule, regulations etc. in electronic gazette. Section 9: Sec 6, 7 & 8 not to confer rights to insist document should be accepted in electronic form Section 10: power to make rules by central govt. in respect or e-signature. Section 10 A: Validity of contracts formed through electronic means.
  • 56. Offences and penalties under IT Act,2000 (Section 65 to 71)  Section 65 : Tampering with computer source documents (conceals, destroys, alters, etc. intentionally done) The object of the section is to protect the “intellectual property” invested in the computer.  Section 66 : Hacking with computer system (related to Sec 43)  Section 66 A : 2009 amendment for sending offensive messages  Section 66 B: Receiving stolen computer or communication device  Section 66 C: using password of another person& identity theft (fraudulently using password, signature or UID or OTP)  Section 66 D: Cheating by personating by using computer resource  Section 66 E: (Violation of privacy) Publishing Private images of others  Section 66 F: Acts of cyber terrorism, to strike terror (against country’s integrity, security, sovereignty, unity)
  • 57.  Section 67: Publishing information which is obscene in electronic form. ( immoral, not decent)  Section 67 A: Publishing images containing sexual act  Section 67 B: Publishing child porn or predating children online  Section 67 C:Failure to maintain /retain records  Section 68: Failure/refusal to comply with orders of controller  Section 69: Failure/ refusal to decrypt the data (for india)  Section 70: Securing access or attempting to secure access to a protected system  Section 71: Misrepresentation (about material Fact)
  • 58. Case-law Girl victim Boy culprit  Obscene message  Published offensive message  Create fake FB profile, uploaded obscene image  Section applied 66C 66D 67 67A Shreya Singhal vs Union of India (sec 66A) 2015  Bal Thackery’s death and Mumbai was announced to be shut down; 2012  2 Girls posts against it on face book  Sec 66A, 69A and 79 of IT Act are against Article 19(1)(a)-(Freedom of expression), Article 14-(Right to Equality), Article 21- (Right to life)
  • 59. Feb 2017 Delhi based E-commerce company portal (hackers done the digital shop lifting) Raj Kundra case  Sec 67 publishing or transmission of obscene  Sec 67 A Publishing images  Sec 67 B Child pornography
  • 60. Section Offence Penalty 65 Tampering with computer source documents Imprisonment up to 3 years, or/and with fine up to Rs 200,000 66 Hacking with computer system Imprisonment up to 3 years, or/and with fine up to Rs 500,000 66B Receiving stolen computer or communication device Imprisonment up to 3 years, or/and with fine up to Rs 100,000 66C Using password of another person Imprisonment up to 3 years, or/and with fine up to Rs 100,000 66D Cheating using computer resource Imprisonment up to 3 years, or/and with fine up to Rs 100,000 66E Publishing private images of others Imprisonment up to 3 years, or/and with fine up to Rs 200,000 66F Acts of cyber terrorism Imprisonment up to life. 67 Publishing information which is obscene in electronic form. Imprisonment up to 5 years, or/and with fine up to Rs 1,000,000 67A Publishing images containing sexual acts Imprisonment up to 7 years, or/and with fine up to Rs 1,000,000 67B Publishing child porn or predating children online Imprisonment up to 5 years, or/and with fine up to Rs 1,000,000 on first conviction. Imprisonment up to 7 years, or/and with fine up to Rs 1,000,000 on second conviction. 67C Failure to maintain records Imprisonment up to 3 years, or/and with fine.
  • 61. Section Offence Penalty 68 Failure/refusal to comply with orders Imprisonment up to 2 years, or/and with fine up to Rs100,000 69 Failure/refusal to decrypt data Imprisonment up to 7 years and possible fine. 70 Securing access or attempting to secure access to a protected system Imprisonment up to 10 years, or/and with fine. 71 Misrepresentation Imprisonment up to 2 years, or/and with fine up to Rs100,000 72 Breach of confidentiality and privacy Imprisonment up to 2 years, or/and with fine up to Rs100,000 72A Disclosure of information in breach of lawful contract Imprisonment up to 3 years, or/and with fine up to Rs500,000 73 Publishing electronic signature certificate false in certain particulars Imprisonment up to 2 years, or/and with fine up to Rs100,000 74 Publication for fraudulent purpose Imprisonment up to 2 years, or/and with fine up to Rs100,000
  • 62. Penalties and Compensation (Section 43 to 45)  Section 43: Penalty & compensation for damage to computer, computer system, etc. (access or copy or destroy or delete)( penalty shall not exceeds 1 crore rupees) (spyware)  Section 43 A: Compensation for failure to protect data (for corporate body)(penalty shall not exceed 5 crore rupees)  Section 44: penalty for failure to furnish information, returns, etc. (for an individual) (penalty shall not exceed 1.5 lac rupees)  Section 44 B: Required to file any returns within time period (for an individual) (penalty shall not exceed 5 K rupees)  Section 44 C: Fails to maintain books of accounts (for an individual) (penalty shall not exceed 10 k rupees)  Section 45: Residuary Penalty (such contravention and penalties (for a person) which are not mentioned seperately (penalty shall not exceed 25 K rupees)
  • 63. Cyber Appellate Tribunal (Section 48 to 58) Section 48 Establishment The central government notifies and establishes appellate tribunals called Cyber Regulations Appellate Tribunal. Central government also specifies all the matters and places which fall under the jurisdiction of the tribunal.
  • 64.  Section 49 Composition  Central government only appoints a person in a tribunal “The Presiding Officer” of cyber appellate tribunal (before amendments)  After 2008, one chairperson and few members ( central govt. can consult with CJI)  One branch includes one chairperson and two members (can use CAT’s power)  Transfer of two other member is possible by chair person
  • 65.  Section 50 Qualification for appointment as Chairperson & Members  For chairperson Same as Judge of a high court (article 217, Indian citizen and 10 years experience as advocate in HC or 10 years experience as judicial officer in india)  For Members (special knowledge & professional Experience in IT, Telecommunications, Industry. Management, Consumer Affairs)  Must have worked in service of central or state govt. or additional secretary of govt. of india or equivalent post for at least 1 year or joint secretary or equivalent post for at least 7 year.
  • 66. Section 51: The term of Office 5 years from the date of joining or until he turns into 65, w.i.e. Must not have personal benefit. Must retire from the current services.
  • 67.  Section 52: Salary, allowances and other terms and conditions of service of Presiding Officer.  Decided by central govt.  The salary and allowances payable to, and the other terms and conditions of service including pension, gratuity and other retirement benefits of, the Presiding Officer of a Cyber Appellate Tribunal shall be such as may be prescribed
  • 68.  Section 52 A: Power of chairperson General superintendence & directions in affairs of tribunal  Section 52 B: Distribution of business among benches/branches  Section 52 C: Power of chairperson to transfer cases Application by the party, after hearing the case, without notice also  Section 52 D: Decision by Majority
  • 69. Section 53 Filling up of vacancies To fill the vacancy central government hires another person except temporary reason Proceedings will continue with new officer.
  • 70.  Section 54: Resignation or Removal  Notice to central government  Holds the office for 3 month after notice (can leave early only if govt. permits)  Or  Till appointment of successor  Or  Expiry of his office, w.i.e.  Removal in case of misbehavior by officer, case will be file by supreme court and enough opportunity will be given to defend himself.
  • 71.  Section 55: Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings  Section 56: Staff of the Cyber Appellate Tribunal The Central Government shall provide the Cyber Appellate Tribunal with such officers and employees as that Government may think fit.  The officers and employees of the Cyber Appellate Tribunal shall discharge their functions under general superintendence of the Chairperson.
  • 72.  Section 57: Appeal to cyber Appellate Tribunal  If not satisfied with controller or adjudicating officer’s order then only one can go to appeal in CAT within 45 days with fees.  In case of any considerable reason of being late in appealing, the tribunal can consider such case.  2 copies of orders one with adjudicating officer and other with all parties.  CAT ties to dispose such appeal within 6 month
  • 73.  Section 58: Procedure and powers of Cyber Appellate Tribunal  All proceedings will be same as judicial proceedings of civil court.(principles of natural justice, code of civil procedures,1908)  According to code of civil procedures,1908 Summon, examining on Oath  Production of documents  Evidence on affidavits  Issuing commission for examining  CAT can review its own decisions  Dissmiss the application
  • 74.  Section 59: right to legal representation (self or legal practitioner)  Section 60: limitation (Act 1963)  Section 61: Civil court not to have Jurisdiction  Section 62: Appeal to HC within 60 days to order or judgement  Section 63: Compounding of contraventions (should not exceed the max. amt of penalty)  Section 64: Recovery of penalty or compensation (land revenue or suspension of ESC)