The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B...

9
The Information Technology The Information Technology Act 2000 Act 2000

Transcript of The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B...

Page 1: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

The Information Technology The Information Technology Act 2000Act 2000

Page 2: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

TermsTerms

E-CommerceE-Commerce E-GovernanceE-Governance B2BB2B B2CB2C EDIEDI Internet, Intranet, ExtranetInternet, Intranet, Extranet Data SecurityData Security PoachingPoaching MorphologyMorphology

Page 3: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Terms (Contd)Terms (Contd)

HackingHacking Ethical HackingEthical Hacking NetizenNetizen ISPISP Search EnginesSearch Engines WILFERWILFER SPAMSPAM Cyber EspionageCyber Espionage Domain NamesDomain Names

Page 4: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

DefinitionsDefinitions

Access: Gaining entry into, Access: Gaining entry into, instructing or communicating with instructing or communicating with the logical, arithmetical or memory the logical, arithmetical or memory function of a Computer.function of a Computer.

COMPUTER; Conversion Of Mental COMPUTER; Conversion Of Mental Power Used for Technology, Power Used for Technology, Education and Resources.Education and Resources.

VIRUS : Vital Information Resource VIRUS : Vital Information Resource Under SiegeUnder Siege

Page 5: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Originator: One who originates the Originator: One who originates the messagemessage

Addressee: To whom the message is Addressee: To whom the message is addressed to.addressed to.

Affixing Digital Signature: Key PairAffixing Digital Signature: Key Pair Private Key- Creates Digital Private Key- Creates Digital

SignatureSignature Public Key – Verifies Digital SignaturePublic Key – Verifies Digital Signature

(a.k.a Asymmetric Crypto System)(a.k.a Asymmetric Crypto System)

Page 6: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Electronic RecordsElectronic Records

Authentication of Electronic Records:Authentication of Electronic Records: Hash Function: An algorithm that Hash Function: An algorithm that

maps or translates one set of bits maps or translates one set of bits into another so that it yields the into another so that it yields the same result everytime.same result everytime.

EDI: EDI: Transfer of structured DataTransfer of structured Data

By agreed message standardsBy agreed message standards

From one Computer System to anotherFrom one Computer System to another

By Electronic MeansBy Electronic Means

Page 7: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

E-GovernanceE-Governance

Legal recognition of electronic Legal recognition of electronic recordsrecords

Legal recognition of Digital SignatureLegal recognition of Digital Signature Use of E-records and Digital Use of E-records and Digital

signature in Government and its signature in Government and its AgenciesAgencies

Retention of E-recordsRetention of E-records Publication of rules, regulations in E-Publication of rules, regulations in E-

GazetteGazette

Page 8: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Duties of SubscribersDuties of Subscribers

Generating Key PairGenerating Key Pair Acceptance of Digital SignatureAcceptance of Digital Signature Control of Private KeyControl of Private Key

Page 9: The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Offences/PenaltiesOffences/Penalties

Penalty for damage to Computer, Penalty for damage to Computer, computer system etc., (Virus, computer system etc., (Virus, Disruption, Deletion, Hacking)Disruption, Deletion, Hacking)

Penalty for failure to furnish Penalty for failure to furnish information, returns etc.,information, returns etc.,

Tampering with computer source Tampering with computer source documentsdocuments

Penalty for misrepresentationPenalty for misrepresentation Penalty for breach of confidentiality Penalty for breach of confidentiality

and privacyand privacy Publication for fraudulent purposePublication for fraudulent purpose