SlideShare una empresa de Scribd logo
1 de 21
IT ACT
Submitted to – Dr. Neelkamal
Submitted to- Dr. Neelkamal
Submitted by- Nitesh Bhatiya
Roll.no-1323
Class-M.sc Forensic Science
INTRODUCTION
• IT Act based on UNICITRAL Model
• United Nation Model Law On Electronic Commerce,1996
• Passed on 30 june 1997 in UN General Assembly
• President K.R Narayana signed on IT act on 9 May 2000
• IT Act 2000 implemented in India on 17oct 2000
• IT Act(Amendment)2008-Pass out on oct 2009
• Administration-CERTin(Indian computer Emergency
Response Team)
• Cyber crime investigation cell,Mumbai on 18Dec,2000
• India`s first Cyber Crime Police Station in Bengaluru on 30
Aug 2001.
OBJECTIVES OF IT ACT
• To provide legal recognition for transaction:-
• Carried out by means of electronic data interchange ,
and other means of electronic communication
,commonly referred to as Electronic Commerce.
• To facilitate electronic filling of documents with
Government agencies and E-payments
• To amend the Indian Penal Code , Indian Evidence Act
1872,the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act,1934
• Aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other
activities carried out by electronic means.
AMENDMENTS
CYBER CRIME
• Any criminal activity that uses a computer either
as an instrumentality, target or a means for
perpetuating further crimes comes within the
ambit of cyber crime.
• Cybercrime can be against individuals, individual
properties, organisation and society.
• Types:-
• Via computers:- Cyber terrorism , credit card
frauds
• Computers as target:- Hacking, virus attack
CLASSIFICATION
Against Individuals:-
• Harassment via e-mails
• Cyber-stalking
• Unauthorized control/access over computer
system.
• Email spoofing
• Cheating and fraud
Against Individual Property:-
• Computer vandalism
• Transmitting virus
• Netrespass
• Unauthorized control/access over computer
system.
• Internet thefts
Against Organization:-
 Unauthorized control/access over
computer system
 Possession of unauthorized
information.
 Cyber terrorism against the
government organisation.
 Distribution of pirated software etc.
SIM Swap Fraud
• In August 2018, two men from Navi Mumbai
were arrested for cybercrime . They were
involved in fraudulent activities concerning
money transfers from the bank accounts of
numerous individuals by getting their SIM card
information through illegal means.
• These fraudsters were getting the details of
people and were later blocking their SIM cards
with the help of fake documents post which they
were carrying out transactions through online
banking.
• They were accused of transferring 4 crore
Indian Rupees effectively from various
accounts . They even dared to hack the
accounts of a couple of companies.
CYBER ATTACK ON COSMOS
BANK
• A daring cyber attack was carried in August 2018
on Cosmos Bank’s Pune branch which saw nearly
94 crores rupees being siphoned off.
• Hackers wiped out money and transferred it to a
Hong Kong situated bank by hacking the server of
Cosmos Bank.
• A case was filed by cosmos bank with pune cyber
cell for the cyber attack. Hackers hacked into the
ATM server of the bank and stole details of many
visa and rupee debit card owners.
Cyber crimes under the IT Act
• Tampering with computer source documents –
Sec.65
• Hacking with computer systems,Data
alteration-Sec.66
• Publishing obscene information-Sec67
• Publishing false digital signature certificate –
Sec.73
NASSCOM
• National Association of Software And Services
Companies
• Trade association of Indian information Technology and
BPO (Business Process Outsourcing) industry.
• Premier trade body and the chamber of commerce of
the IT-BPO industries in India.
• More than 1200 members.
• Setup in 1988 to facilitate business and trade in
software services.
• Non profit organisation.
OBJECTIVES
• Formulating National IT Policies with specific
focus on IT software and service.
• Maintaining a state of the art information
database of IT software and service related
activities.
• Forum to explore vast potentials.
• Work actively with overseas Government ,
Embassies.
Our suggestion
• A broad and inclusive focus is necessary to protect the
IT services.
• Strategies and Alert mechanism against cyber attacks
• Creating a global culture of cyber security.
• International co operation at all levels should be
developed further.
• New recruitment to ensure a sizeable team to combat
cyber crime
• Law enforcement officials need to be trained for
effective enforcement.
Thank you

Más contenido relacionado

La actualidad más candente

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

La actualidad más candente (20)

INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 

Similar a IT Act

Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 

Similar a IT Act (20)

IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Pre itact
Pre itactPre itact
Pre itact
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 

Más de Nitesh Bhatia (7)

Phenolphthalein in trap cases
Phenolphthalein in trap casesPhenolphthalein in trap cases
Phenolphthalein in trap cases
 
Human decomposition and insect succession
Human decomposition and insect successionHuman decomposition and insect succession
Human decomposition and insect succession
 
Polarography[1]
Polarography[1]Polarography[1]
Polarography[1]
 
Drug of Abuse
Drug of AbuseDrug of Abuse
Drug of Abuse
 
Compound microscope
Compound microscopeCompound microscope
Compound microscope
 
Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)
 
Asphyxial deaths
Asphyxial deathsAsphyxial deaths
Asphyxial deaths
 

Último

Último (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

IT Act

  • 1. IT ACT Submitted to – Dr. Neelkamal Submitted to- Dr. Neelkamal Submitted by- Nitesh Bhatiya Roll.no-1323 Class-M.sc Forensic Science
  • 2. INTRODUCTION • IT Act based on UNICITRAL Model • United Nation Model Law On Electronic Commerce,1996 • Passed on 30 june 1997 in UN General Assembly • President K.R Narayana signed on IT act on 9 May 2000 • IT Act 2000 implemented in India on 17oct 2000 • IT Act(Amendment)2008-Pass out on oct 2009 • Administration-CERTin(Indian computer Emergency Response Team) • Cyber crime investigation cell,Mumbai on 18Dec,2000 • India`s first Cyber Crime Police Station in Bengaluru on 30 Aug 2001.
  • 3. OBJECTIVES OF IT ACT • To provide legal recognition for transaction:- • Carried out by means of electronic data interchange , and other means of electronic communication ,commonly referred to as Electronic Commerce. • To facilitate electronic filling of documents with Government agencies and E-payments • To amend the Indian Penal Code , Indian Evidence Act 1872,the Banker’s Books Evidence Act 1891,Reserve Bank of India Act,1934 • Aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.
  • 5.
  • 6.
  • 7. CYBER CRIME • Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime. • Cybercrime can be against individuals, individual properties, organisation and society. • Types:- • Via computers:- Cyber terrorism , credit card frauds • Computers as target:- Hacking, virus attack
  • 8. CLASSIFICATION Against Individuals:- • Harassment via e-mails • Cyber-stalking • Unauthorized control/access over computer system. • Email spoofing • Cheating and fraud
  • 9. Against Individual Property:- • Computer vandalism • Transmitting virus • Netrespass • Unauthorized control/access over computer system. • Internet thefts
  • 10. Against Organization:-  Unauthorized control/access over computer system  Possession of unauthorized information.  Cyber terrorism against the government organisation.  Distribution of pirated software etc.
  • 11.
  • 12. SIM Swap Fraud • In August 2018, two men from Navi Mumbai were arrested for cybercrime . They were involved in fraudulent activities concerning money transfers from the bank accounts of numerous individuals by getting their SIM card information through illegal means. • These fraudsters were getting the details of people and were later blocking their SIM cards with the help of fake documents post which they were carrying out transactions through online banking.
  • 13. • They were accused of transferring 4 crore Indian Rupees effectively from various accounts . They even dared to hack the accounts of a couple of companies.
  • 14.
  • 15. CYBER ATTACK ON COSMOS BANK • A daring cyber attack was carried in August 2018 on Cosmos Bank’s Pune branch which saw nearly 94 crores rupees being siphoned off. • Hackers wiped out money and transferred it to a Hong Kong situated bank by hacking the server of Cosmos Bank. • A case was filed by cosmos bank with pune cyber cell for the cyber attack. Hackers hacked into the ATM server of the bank and stole details of many visa and rupee debit card owners.
  • 16.
  • 17. Cyber crimes under the IT Act • Tampering with computer source documents – Sec.65 • Hacking with computer systems,Data alteration-Sec.66 • Publishing obscene information-Sec67 • Publishing false digital signature certificate – Sec.73
  • 18. NASSCOM • National Association of Software And Services Companies • Trade association of Indian information Technology and BPO (Business Process Outsourcing) industry. • Premier trade body and the chamber of commerce of the IT-BPO industries in India. • More than 1200 members. • Setup in 1988 to facilitate business and trade in software services. • Non profit organisation.
  • 19. OBJECTIVES • Formulating National IT Policies with specific focus on IT software and service. • Maintaining a state of the art information database of IT software and service related activities. • Forum to explore vast potentials. • Work actively with overseas Government , Embassies.
  • 20. Our suggestion • A broad and inclusive focus is necessary to protect the IT services. • Strategies and Alert mechanism against cyber attacks • Creating a global culture of cyber security. • International co operation at all levels should be developed further. • New recruitment to ensure a sizeable team to combat cyber crime • Law enforcement officials need to be trained for effective enforcement.