SlideShare a Scribd company logo
1 of 18
INFORMATION
TECHNOLOGY ACT, 2000
SNEHAL DINESH PATIL
FYBMS
Roll no. 651
INTRODUCTION
• IT Act 2000, was notified on October
17,2000.
• It was opposed by SAVE YOUR
VOICE CAMPAIGN and other civil
society organization in INDIA.
• In that time being, user review and
mouth shut.com a social networking
site had filed a write petition in
supreme court.
• An act to provide legal recognition.
• Referred as ELECTRONIC
RECORDS.
ATTRIBUTION OF ELECTRONIC
RECORDS
An electronic record shall be attributed to
the originator:
1. if it was sent by the originator himself.
2. By a person who had the authority to act
on behalf of the originator in respect of
that electronic record
or
3. By an information system programmed
by or on behalf of the orginator to operate
automatically.
ACKNOWLEDGEMENT OF
RECEIPT
• Any communication by the addressee,
automated or otherwise or
• Any conduct of the addressee, sufficient to
indicate to the originator that the
electronic record has been received.
• Where the originator has stipulated that
the electronic record shall be binding only
on receipt of an acknowledgement.
TIME AND PLACE OF DESPATCH AND
RECEIPT OF ELECTRONIC RECORD
• The time of receipt of an electronic record
shall be determined as follows:
1. If the addressee has designated a
computer resource for the purpose of
receiving electronic records.
2. Receipt occurs at the time when the
electronic, record enters the designated
computer resource.
or
3. If the electronic record is sent to a
computer resource of the addressee that
is not the designated computer resource,
receipt occurs at the time when the
electronic record is retrived by the
addressee.
APPOINTMENT OF CONTROLLER
AND OTHER OFFICERS
• Central government may appoint number
of deputy controllers and assistant
controllers as it deems fit.
• Controller shall perform the functions
assigned to them by the controller under
the general superintendence and control of
the controller.
• The qualifications, experience and terms
and conditions of service of controller
shall be such as may be prescribed by the
central government.
• There shall be a seal of the office of the
controller.
FUNCTIONS OF CONTROLLER
• Exercising supervision
• Certifying public keys
• Laying down the standards to be
maintained by the certifying authorities.
• Specifying the contents of written, printed
or visual materials and advertisement.
• Specifying the form and manner in which
accounts shall be maintained.
• Specifying the terms and conditions
subject to which auditors may be
appointed.
DUTIES OF SUBSCRIBERS
• Generating key pair:
The public key which corresponds to the
private key of the subscribers which is to
be listed in the certificate which the
subscriber would generate the key pair by
applying the security procedure.
• Acceptance of digital signature
certificate:
By accepting the certificate the
subscriber certifies to all who reasonably
rely on the information contained in the
certificate.
THE CYBER REGULATIONS
APPELLATE TRIBUNAL
• Establishment of cyber appellate tribunal.
• Composition of cyber appellate tribunal.
• Qualifications for appointment as
presiding officer of the cyber appellate
tribunal.
• Term of officer.
• Filling up of vacancies.
• Orders constituting appellate tribunal to be
final and not to invalidate.
DIGITAL SIGNATURE
• Subscriber may authenticate an electronic
record by affixing his digital signature.
• Authentication of the electronic record
shall be affected by the use of asymmetric
crypto system.
• Equivalent to handwritten signature.
• Acknowledgement.
ELECTRONIC GOVERNANCE
• Legal recognition of electronic records.
• Legal recognition of digital signature.
• Use of electronic records and digital
signature.
• Retention of electronic records.
• Publication of rules and regulation.
• Power to make rules by central
government.
DIGITAL SIGNATURE
CERTIFICATE
• Certifying Authority to issue digital
signature certificate.
• Representation upon issuance of digital
signature certificate.
• Suspension of digital certificate.
• Revocation of Digital Signature
Certificate
• Notice of Suspension or Revocation.
SECURE ELECTRONIC RECORDS AND
SECURE DIGITAL SIGNATURES
 Secure electronic record.
 Secure digital signatures.
 Secure procedures.
OFFENCES
• Tampering with computer source
document.
• Hacking with computer system.
• Publishing information which is obscene.
• Power of controller.
• Directions of controller.
• Protected system.
PENALTIES
• Penalty to damage computer system.
• Penalty for failure to furnish information.
• Penalty for misrepresentation .
• The Gazette of India extra ordinary.
CONCLUSIONS
All said and done, the Information Technology Act, 2000 is a great
achievement and a remarkable step ahead in the right achievement and a
remarkable step ahead in the right direction.
BIBLIOGRAPHY
• www.india.gov.in
• www.dot.gov.in/act/information
• www.cyberlawsindia.net/information
• www.wikipedia.org/information
THANK YOU

More Related Content

What's hot

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
avinashmsy
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
maruhope
 

What's hot (20)

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
E contract
E  contractE  contract
E contract
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
It act 2000
It act 2000It act 2000
It act 2000
 
SAYEF AMIN
SAYEF AMINSAYEF AMIN
SAYEF AMIN
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Classification of cause of action / characterisation
Classification of cause of action / characterisationClassification of cause of action / characterisation
Classification of cause of action / characterisation
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
E contracts
E contractsE contracts
E contracts
 

Viewers also liked

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
Diya Mirza
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
Karan Bhagatwala
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
 

Viewers also liked (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law
Cyber lawCyber law
Cyber law
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Business Law: Types of Jurisdiction
Business Law: Types of Jurisdiction Business Law: Types of Jurisdiction
Business Law: Types of Jurisdiction
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protection
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
 
The Indian PR Market
The Indian PR MarketThe Indian PR Market
The Indian PR Market
 
Public Relations in the Age of Social Media
Public Relations in the Age of Social MediaPublic Relations in the Age of Social Media
Public Relations in the Age of Social Media
 
Assignment of basket course
Assignment of basket courseAssignment of basket course
Assignment of basket course
 

Similar to Information technology act, 2000

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
Adv Prashant Mali
 

Similar to Information technology act, 2000 (20)

Cyber Security
Cyber Security Cyber Security
Cyber Security
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Cyber
CyberCyber
Cyber
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
digital signature agency in allahabad
digital signature agency in allahabaddigital signature agency in allahabad
digital signature agency in allahabad
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidence
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
E-signing-3
E-signing-3E-signing-3
E-signing-3
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Sapm ppt
Sapm pptSapm ppt
Sapm ppt
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 

Recently uploaded

ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 

Recently uploaded (20)

ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in Spain
 

Information technology act, 2000

  • 1. INFORMATION TECHNOLOGY ACT, 2000 SNEHAL DINESH PATIL FYBMS Roll no. 651
  • 2. INTRODUCTION • IT Act 2000, was notified on October 17,2000. • It was opposed by SAVE YOUR VOICE CAMPAIGN and other civil society organization in INDIA. • In that time being, user review and mouth shut.com a social networking site had filed a write petition in supreme court. • An act to provide legal recognition. • Referred as ELECTRONIC RECORDS.
  • 3. ATTRIBUTION OF ELECTRONIC RECORDS An electronic record shall be attributed to the originator: 1. if it was sent by the originator himself. 2. By a person who had the authority to act on behalf of the originator in respect of that electronic record or 3. By an information system programmed by or on behalf of the orginator to operate automatically.
  • 4. ACKNOWLEDGEMENT OF RECEIPT • Any communication by the addressee, automated or otherwise or • Any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received. • Where the originator has stipulated that the electronic record shall be binding only on receipt of an acknowledgement.
  • 5. TIME AND PLACE OF DESPATCH AND RECEIPT OF ELECTRONIC RECORD • The time of receipt of an electronic record shall be determined as follows: 1. If the addressee has designated a computer resource for the purpose of receiving electronic records. 2. Receipt occurs at the time when the electronic, record enters the designated computer resource. or 3. If the electronic record is sent to a computer resource of the addressee that is not the designated computer resource, receipt occurs at the time when the electronic record is retrived by the addressee.
  • 6. APPOINTMENT OF CONTROLLER AND OTHER OFFICERS • Central government may appoint number of deputy controllers and assistant controllers as it deems fit. • Controller shall perform the functions assigned to them by the controller under the general superintendence and control of the controller. • The qualifications, experience and terms and conditions of service of controller shall be such as may be prescribed by the central government. • There shall be a seal of the office of the controller.
  • 7. FUNCTIONS OF CONTROLLER • Exercising supervision • Certifying public keys • Laying down the standards to be maintained by the certifying authorities. • Specifying the contents of written, printed or visual materials and advertisement. • Specifying the form and manner in which accounts shall be maintained. • Specifying the terms and conditions subject to which auditors may be appointed.
  • 8. DUTIES OF SUBSCRIBERS • Generating key pair: The public key which corresponds to the private key of the subscribers which is to be listed in the certificate which the subscriber would generate the key pair by applying the security procedure. • Acceptance of digital signature certificate: By accepting the certificate the subscriber certifies to all who reasonably rely on the information contained in the certificate.
  • 9. THE CYBER REGULATIONS APPELLATE TRIBUNAL • Establishment of cyber appellate tribunal. • Composition of cyber appellate tribunal. • Qualifications for appointment as presiding officer of the cyber appellate tribunal. • Term of officer. • Filling up of vacancies. • Orders constituting appellate tribunal to be final and not to invalidate.
  • 10. DIGITAL SIGNATURE • Subscriber may authenticate an electronic record by affixing his digital signature. • Authentication of the electronic record shall be affected by the use of asymmetric crypto system. • Equivalent to handwritten signature. • Acknowledgement.
  • 11. ELECTRONIC GOVERNANCE • Legal recognition of electronic records. • Legal recognition of digital signature. • Use of electronic records and digital signature. • Retention of electronic records. • Publication of rules and regulation. • Power to make rules by central government.
  • 12. DIGITAL SIGNATURE CERTIFICATE • Certifying Authority to issue digital signature certificate. • Representation upon issuance of digital signature certificate. • Suspension of digital certificate. • Revocation of Digital Signature Certificate • Notice of Suspension or Revocation.
  • 13. SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES  Secure electronic record.  Secure digital signatures.  Secure procedures.
  • 14. OFFENCES • Tampering with computer source document. • Hacking with computer system. • Publishing information which is obscene. • Power of controller. • Directions of controller. • Protected system.
  • 15. PENALTIES • Penalty to damage computer system. • Penalty for failure to furnish information. • Penalty for misrepresentation . • The Gazette of India extra ordinary.
  • 16. CONCLUSIONS All said and done, the Information Technology Act, 2000 is a great achievement and a remarkable step ahead in the right achievement and a remarkable step ahead in the right direction.
  • 17. BIBLIOGRAPHY • www.india.gov.in • www.dot.gov.in/act/information • www.cyberlawsindia.net/information • www.wikipedia.org/information