it act 2000

32
LOGO Presentation By: VIVEK SAHAY 11073 Information Act 2000

description

 

Transcript of it act 2000

Page 1: it act 2000

LOGO

Presentation By: VIVEK SAHAY

11073

Information Act 2000

Page 2: it act 2000

Objectives of the IT ActTo provide legal recognition for transactions:- Carried out by means of electronic data

interchange, and other means of electronic communication, commonly referred to as "electronic commerce“

To facilitate electronic filing of documents with Government agencies and E-Payments

To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934

Aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.

Page 3: it act 2000

IT Act 2000 Objectives

Legal Recognition for E-Commerce Digital Signatures and Regulatory Regime Electronic Documents at par with paper

documents E-Governance

Electronic Filing of Documents Amend certain Acts Define Civil wrongs, Offences,

punishments Investigation, Adjudication Appellate Regime

Page 4: it act 2000

Definitions

A total of 34 definition given in bare act

Categorized into Digital Infrastructure Authorizing agency Documentation

Page 5: it act 2000

Definitions ( section 2) "computer" means electronic, magnetic, optical or

other high-speed date processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or relates to the computer in a computer system or computer network;

"computer network" means the inter-connection of one or more computers through- (i) the use of satellite, microwave, terrestrial lime or

other communication media; and (ii) terminals or a complex consisting of two or more

interconnected computers whether or not the interconnection is continuously maintained;

Page 6: it act 2000

Definitions ( section 2) "computer system" means a device or collection of

devices, including input and output support devices and excluding calculators which are not programmable and capable being used in conjunction with external files which contain computer programmes, electronic instructions, input data and output data that performs logic, arithmetic, data storage and retrieval, communication control and other functions;

"data" means a representation of information, knowledge, facts, concepts or instruction which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer.

Page 7: it act 2000

Definitions ( section 2) "electronic record" means date, record or date generated,

image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche;

“secure system” means computer hardware, software, and procedure that- (a)    are reasonably secure from unauthorized access and misuse;(b)   provide a reasonable level of reliability and correct operation;(c)    are reasonably suited to performing the intended function; and(d) adhere to generally accepted security procedures

“security procedure” means the security procedure prescribed by the Central Government under the IT Act, 2000.

secure electronic record – where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification

Page 8: it act 2000

Definitions ( section 2) "Certifying Authority" means a person who has been

granted a licence to issue a Digital Signature Certificate

"Controller" means the Controller of Certifying Authorities appointed under sub-section (l) of section 17

"Cyber Appellate Tribunal" means the Cyber Regulations Appellate Tribunal established under sub-section (1) of section 48

"Electronic Gazette" means the Official Gazette published in the electronic form;

"originator" means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary;

"subscriber" means a person in whose name the Digital Signature Certificate is issued;

Page 9: it act 2000

Definitions ( section 2) "Act'' means the Information Technology Act, 2000;

(21 of 2000); "Agent" means a person duly authorised by a party

to present an application or reply on its behalf before the Tribunal;

"Application" means an application made to the Tribunal under section 57;

"Legal practitioner" shall have the same meaning as is assigned to it in the Advocates Act, 1961 (25 of 1971):

"Presiding OfficerRegistrar" means the R" means the Presiding Officer of the Tribunal;

“Registrar of the Tribunal” and includes any officer to whom the powers and functions of the Registrar may be delegated;

"Registry" means the Registry of the Tribunal; "Section" means a section of the Act;

Page 10: it act 2000

Definitions ( section 2) "affixing digital signature" means adoption of any

methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature;

"digital signature" means authentication of any electronic record by a subscriber by means of an electronic method or procedure ;

"Digital Signature Certificate" means a Digital Signature Certificate issued under subsection (4) of section 35;

"electronic form" with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device;

"key pair", in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key;

Page 11: it act 2000

Issue addressed

Legal Recognition of Electronic Documents Legal recognition of Electronic

Transaction / Record Legal recognition of digital signature is

at par with the handwritten signature Electronic Communication by means of

reliable electronic record

Page 12: it act 2000

Issue addressed Legal Recognition of Digital Signatures

Acceptance of contract expressed by electronic means

e-Commerce and Electronic Data interchange e-Governance Electronic filing of documents Retention of documents in electronic form Uniformity of rules, regulations and standards

regarding the authentication and integrity of electronic records or documents

Publication of official gazette in the electronic form Interception of any message transmitted in the

electronic or encrypted form

Page 13: it act 2000

Issue addressed

Offenses and Contraventions Prevention of Computer Crime, forged

electronic records, international alteration of electronic records fraud, forgery or falsification in e-Commerce and electronic transaction.

Page 14: it act 2000

Issue addressed

Justice Dispensation Systems for Cybercrimes Authorities

• Controller to certify the public keys of the Certifying Authorities (CAs)• Controller to act as repository of all digital signature certificates• Certifying Authorities to get Licence from the Controller to issue digital signature .

Page 15: it act 2000

REGULATION OF CERTIFYING AUTHORITIES

Govt. Of India

Controller of Certifying Authorities

Deputy Controllers

Assistant Controllers

Supreme Court

High Court

Cyber Regulations Appellate Tribunal.

Officer

Regulation Structure

JUDICIAL

STRUCTURE

Page 16: it act 2000

REGULATION OF CERTIFYING AUTHORITIES

Appointment of Controller and other officers. The Central Government may, appoint a

Controller of Certifying Authorities The Deputy Controllers and Assistant

Controllers shall perform the functions assigned to them by the Controller

Page 17: it act 2000

REGULATION OF CERTIFYING AUTHORITIES

Functions of Controller. exercising supervision over the activities of

the Certifying Authorities certifying public keys of the Certifying

Authorities specifying the contents of written, printed or

visual materials and advertisements that may be distributed or used in respect of a Digital Signature Certificate and the public key

resolving any conflict of interests between the Certifying Authorities and the subscribers;

Page 18: it act 2000

civil offences under the IT Act 2000Sec Offence Punishment

43 Damage to Computer, Computer system etc. Compensation to the tune of Rs.1 crore to the affected person.

44(a) For failing to furnish any document, return on report to the Controller or the Certifying Authority.

Penalty not exceeding one lakh and fifty thousand rupees for each such failure.

44(b) For failing to file any return or furnish any information or other document within the prescribed time.

Penalty not exceeding five thousand rupees for every day during which such failure continues.

44(c) For not maintaining books of account or records. Penalty not exceeding ten thousand rupees for every day during which the failure continues.

45 Offences for which no penalty is separately provided.

Compensation not exceeding twenty five thousand rupees to the affected person or a penalty not exceeding twenty five thousand rupees.

65 Tampering with computer source documents. Imprisonment upto three years, or with fine which may extend upto two lakh rupees, or with both.

66 Hacking with computer system with the intent or knowledge to cause wrongful loss.

Imprisonment upto three years, or with fine which may extend upto two lakh rupees, or with both.

66A For sending offensive messages through communication service etc.

Imprisonment for a term which may extend to three years and with fine.

66B For dishonestly receiving stolen computer resource or communication device.

Imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.

Page 19: it act 2000

Sec Offence Punishment

66D For cheating by personation by using computer resource.

Imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

66D For cheating by personation by using computer resource.

Imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

66E. For violation of privacy Imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.

66F For cyber terrorism Imprisonment which may extend to imprisonment for life. 67 Publication of obscene material in an electronic

form. Imprisonment upto 5 years and with fine which may extend to one lakh rupees on first conviction and its double punishment for second and subsequent convictions.

67A For publishing or transmitting of material containing sexually explicit act etc. in electronic form.

Imprisonment upto 5 years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.

67B For publishing or transmitting of material depicting children in sexually explicit act etc. in electronic form.

Imprisonment upto five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of seven years and also with fine which may extend to ten lakh rupees.

67C For preserving and retention of information by Intermediaries.

Imprisonment upto three years and also liable to fine.

68 For failing to comply with the directions of the Controller.

Imprisonment upto 3 years and fine upto two lakhs, or both.

Page 20: it act 2000

Sec Offence Punishment

69 For failing to extend facilities to decrypt information which is against the interest of sovereignty or integrity of India.

Imprisonment which may extend to seven years.

70 Securing or attempting to secure access to a protected system.

Imprisonment which may extend to 10 years and fine.

71 For misrepresentation or suppression of any material fact from the Controller or the Certifying Authority.

Imprisonment upto 2 years, or fine upto rupees one lakh or with both.

72 For break of confidentiality and privacy Imprisonment upto two years or fine upto rupees one lakh, or with both.

72A For disclosure of information in breach of lawful contract.

Imprisonment upto three years or with fine upto five lakh rupees or with both.

73 For publishing digital signature certificate false in certain particulars.

Imprisonment upto two years or with fine which may extend to one lakh rupees or with both.

74. Publication of Digital Signature Certificate for any fraudulent or unlawful purpose.

Imprisonment upto two years or fine upto rupees one lakh.

76 Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto used for contravention of this Act, rules, orders or regulations made thereunder.

Liable to confiscation.

Page 21: it act 2000

civil offences under the IT Act 2000

• Unauthorised copying, extracting and downloading of any data, database• Unauthorised access to computer, computer system or computer network• Introduction of virus• Damage to computer System and Computer Network• Disruption of Computer, computer network• Denial of access to authorised person to computer• Providing assistance to any person to facilitate unauthorised access to a computer• Charging the service availed by a person to an account of another person by tampering and manipulation of other computer Section 44 of the IT Act provides for penalty on failure to furnish information, return etc. to the Controller by Certifying Authorities.

Page 22: it act 2000

criminal offences • Tampering with computer source documents• Hacking with computer system• Electronic forgery I.e. affixing of false digital signature, making false electronic record• Electronic forgery for the purpose of cheating• Electronic forgery for the purpose of harming reputation• Using a forged electronic record• Publication of digital signature certificate for fraudulent purpose• Offences and contravention by companies• Unauthorised access to protected system• Confiscation of computer, network, etc.• Publication of information which is obscene in electronic form• Misrepresentation or suppressing of material facts for obtaining Digital Signature Certificates• Breach of confidentiality and Privacy• Publishing false Digital Signature Certificate

Page 23: it act 2000

Checklist Information security manager

Establish information security forum

Define scope of Management Information System

Risk assessment Division of threats of

Information within centralized and distributed systems

Page 24: it act 2000

Checklist Information security manager

IT security policy Formulate mission and goal Alignment to IT requirement Alignment to organizational policy Compliance with regulations and standards

Security procedure & std of performance Formalize steps Standard operating procedure Define hierarchy of security and level of authority

Practice Operationalize policy through execution of procedure Endpoint security problem IT security training Support for internal control ( behavioral, technical)

Monitor system, enforcement of saction (rewards, penalties)

Page 25: it act 2000

Pending Cases Indian Social Action ... vs The Union Of India on 16

September, 2011 Booked under clause(r) of section 2 of the

InformationTechnology Act, 2000 (21 of 2000) for misuse of medium, dismissed without any order as to costs.

KARNAVATI SCHOOL OF DENTISTRY versus UNION OF INDIA 30 August, 2011 Petitioner forwarded documents to start PG courses,

ambiguous response from Dental Council of India, followed by rejection.

Respondent claimed that published documents were flawed Court found petitioner at mistake under under the Regulations

as electronic form as defined u/Sec.2(r), and dismissed without penalty

Page 26: it act 2000

Pending Cases Case No.99/2008 under Section 66 of the IT Act also

relates to purchase of airline tickets in four transactions of Rs.7200/- each and is still under investigation.

Case No.29/2009 under Section 66(A) of the IT Act is regarding insult to the complainant and hurt the integrity in her individual and professional capacity and is still under investigation.

Case No.Cr.No.131/10 under Section 379 IPC & 66(c), 66(d), 67(a) of the IT Act is a complaint of hacking, theft and cheating. In this case the accused was arrested on 16.4.2010 and the case is still under investigation.

Case No.Cr.No.126/10 under Section 66(C) of the IT Act is a complaint filed on 6.5.2010 by Ms.Sandhya Pandurang Naik stating that some unknown accused person created false E-mail ID of the complainant lady as Sandhya Naik @Gmau.com and thereby committed theft of e-mail. The case is under investigation.

Recent case of Jilted lover from Gandhidham creates fake Facebook profile, just got arrested.

Page 27: it act 2000

Pending Cases The Complaint in Cr.No.74/2009 relates to the Section 420

IPC read with Section 66 of the IT Act,2000 where a false e-mail was sent directing the complainant to deposit an amount of Rs.1,69,420/- as he has won the COCO COLA contest of one lakh Pounds. On the investigation he was arrested at Imphal East Manipal. This case is still under investigation.

Similar complaint under Section 420 IPC read with Section 66 of IT Act,2000 was filed for depositing a sum of Rs.35000/- towards custom charges to Elite Creative with PAN No.AMGPA2286A, ICICI Bank branch New Delhi. This case is still under investigation.

In the another complaint under Section 67 IT Act,2000, the complaint was lodged when husband has transmitted SMS having vulgar and malicious text on his wife’s mobile and the husband was arrested and was released on bail. This case is still under investigation.

Case No.72/2009 is under Section 66 of the IT Act,2000. In this complaint the complainant complained that some unknown accused person gained access without permission to the computer system of HDFC Bank and purchased tickets for travel worth Rs.30,000/-. This case is still under investigation.

Page 28: it act 2000

I.T laws in UK

Various laws for different aspects of IT requirement

Much older and mature laws compared to Indian

Different laws for different region

Scottish law has developed separately from English criminal law

Freedom of Information (Scotland) Act, 2002, differs significantly from the UK FoI Act 2000

Scottish, Welsh and Northern Ireland parliaments and assemblies have some different law making powers

Page 29: it act 2000

I.T laws in UKCopyright Act 1956Misrepresentation Act 1967

(Hardware)Sale of Goods Act 1979

(Hardware) Supply of Goods and Services

Act 1982 (Software)Copyright (Computer Software)

Amendment Act 1985Computer Misuse Act 1990Data Protection Act(s) 1984 &

1998The Privacy and Electronic

Communications Regulations 2003 – EC Directive

Page 30: it act 2000

ACE2159

Outlawing criminal behaviour and computer misuse Unlawful access to data and systems

Hacking and viruses Criminal Damage Act 1971 was insufficient

and replaced Computer Misuse Act 1990 is now in

reform Unlawful data use and data publication

Obscenity and pornography Obscene Publications Act 1959 Protection of Children Act 1978 Criminal Justice Act 1988 e.g. Harassment Telecommunications Act 1984 Protection from Harassment Act 1997

I.T laws in UK

Page 31: it act 2000

References

Information Technology ACT 2000

CYBER APPELLATE TRIBUNAL Ministry of Communications &

Information Technology Asian School of Cyber Laws,

PuneNational Institute of Financial

ManagementGujarat PoliceArchives from various courtsUniversity of SouthHampton, UK

Page 32: it act 2000

“Justice that love gives is a surrender, justice that law gives is a punishment. “

-Mohandas Gandhi