34
LAW LAW INFORMATION TECHNOLOGY ACT

Law ppt final

  • Upload
    79850

  • View
    138

  • Download
    0

Embed Size (px)

DESCRIPTION

STUDY OF IT ACT IN LAW

Citation preview

Page 1: Law ppt   final

LAWLAWINFORMATION TECHNOLOGY ACT

Page 2: Law ppt   final

Presented ByPresented ByAbhishek Seth 13001Chaitali Dhopatkar 13016Harmeet Dhindsa 13027Kinjal JainNeetu Khatri 13045Rahul Jain 13052Rohit Dhanuka 13054Ronak Sangani 13056Ruchira Gaikwad 13058Salil Samant 13060

Page 3: Law ppt   final

IntroductionIntroduction

CyberSpace:

Need

Purpose

Page 4: Law ppt   final

IT ACT 2000IT ACT 2000•Ensure legal infrastructure for e-commerce within India.

•Chapters : Different chapters in the act

•Objectives : To provide legal Framework . Establish a Regulatory body

Page 5: Law ppt   final

TerminologiesTerminologiesComputer

Computer System

Communication Device

Data

Page 6: Law ppt   final

Digital SignatureDigital SignatureA way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic.

Authentic - you know who created the document and you know that it has not been altered in any way since that person created it.

Types: Class-1 certificates Class-2 certificates Class-3 certificates

Page 7: Law ppt   final

Electronic SignatureElectronic SignatureAn electronic signature is a typed name or a digitized image of a handwritten signature.

It is an electronic indication to agree to or approve the contents of a document.

Uses of an Electronic Signature•

Sign contracts, invoices, and work orders• Approve project estimates and change orders• Sign school forms and permission slips• Complete and sign leases and rental agreements• Sign NDAs and client agreements• Sign bank documents and insurance forms

Page 8: Law ppt   final

Electronic GovernanceElectronic GovernanceUse of Internet, LAN, mobiles etc. by

Government to improve the effectiveness, efficiency, service delivery and to promote democracy

Uses of E-governanceTo have access to public documents.For making online payments of various bills

and dues.To file statutory documents online.

Page 9: Law ppt   final

Sections

Page 10: Law ppt   final

43A - Compensation for failure to 43A - Compensation for failure to protect dataprotect data

•Responsibility on persons (including companies) handling sensitive personal data for protection of data.

• Reasonable Security Practices

Security initiativesAwareness TrainingConformance to Standards, certificationPolicies and adherence to policiesPolicies like password policy, Access Control,

email Policy etcPeriodic monitoring and review

•Adjudication & its role

Page 11: Law ppt   final

Section 66Section 66Hacking with Computer SystemHacking is committed by•Whoever with the intent of causing damage•Alters any information

Person committed hacking is•imprisonment up to three years•fine up to two lakh rupees•Or Both

Page 12: Law ppt   final

CITI Bank & Mphasis fund siphoning

Page 13: Law ppt   final

Section 66 FSection 66 F

Whoever intends to threaten the unity, integrity, security or soverginity of India to strike terror among the people by an unauthorised access to computer system

Punishment Imprisonment which may extend to life

Page 14: Law ppt   final

Section 69Section 69

It empowers the government to intercept, monitor any information generated, transmitted, received or stored in any computer resource that may be related to integrity of India, Security of India or any state, friendly relations with Foreign States, etc.

Page 15: Law ppt   final

Attack on parliament

Page 16: Law ppt   final

Section 67Section 67 It deals with publishing or transmitting

obscene material in electronic form

Pornography and ‘obscene information’

Pornography being not illegal

Page 17: Law ppt   final

Cyber CrimesCyber Crimes

Term for any illegal activity that uses a computer as its primary means of commission.

Its is not a physical attack but a virtual attack

Page 18: Law ppt   final

Some types of Cyber CrimesSome types of Cyber Crimes

• HackingWhite Hat Hackers Black Hat Hackers Grey Hat Hackers

• Software Piracy

Cyber Pornography

Page 19: Law ppt   final

Cont..Cont..Credit Card Fraud

Vishing

Page 20: Law ppt   final

Case on Freedom of Expression – Azeem Trivedi

Page 21: Law ppt   final

Case on “ Death of Shiv Sena Chief”

Page 22: Law ppt   final

StatisticsStatistics

Page 23: Law ppt   final
Page 24: Law ppt   final

Role of IT in bankingRole of IT in banking

Information Technology

Opened up new markets , products , and services .

•Increased speed and reliability of financial operation .

•Met ever increasing demands of customers by providing an instant anytime anywhere service .

• Provided solutions to take care of accounting and back office work .

Page 25: Law ppt   final

Products offered to Products offered to Customers Customers Net Banking Credit Card OnlineInsta AlertsPhone Banking / Mobile Bankinge-Monies Electronic Fund

Transfer / e-ChequesOnline Payment of Excise &

Service TaxCard to Card Funds Transfer

Page 26: Law ppt   final

NASSCOMNASSCOM

What NASSCOM is?

•Nasscom's Vision

•Aims and Objectives

•Partnership with the Government

Page 27: Law ppt   final

NASSCOM INITIATIVES NASSCOM INITIATIVES INCLUDE:INCLUDE:

Domestic Market InitiativeEducation InitiativeSecurity InitiativeWomen in Leadership-IT Initiative

Page 28: Law ppt   final

Case StudiesCase StudiesTrue Caller • Allows users to look up for anonymous mobile and landline numbers on the web or on their Internet-enabled mobile

•True Caller‘s database has been hacked by Syrian Electronic Army hackers.

•Hackers downloaded more than 7 databases of 450GB in size.

•The issue with the app is that a person is not in control if their number is being shared on the service by one of their contact. While the service does offer an option to unlist a number.

Page 29: Law ppt   final

10 million – Jan 2013

20 million users globally – Feb 2013

Page 30: Law ppt   final

RS 400 MILLION SMS SCAM RS 400 MILLION SMS SCAM

Nadar brothers along with Gala allegedly took help of SMS technology and launched the first-of-its- kind SMS fraud in India.

Launched an advertisement campaign - "Nothing is impossible. The word itself is: I M Possible.“

Earn Rs 10000/pm & deposit Rs 500

www.getpaid4sms. Com

Page 31: Law ppt   final

NMIMSNMIMS

6 peoele identified for having impersonated 87 candidates in the (NMAT) held from October 11 to December 19, 2012

Employed a dummy candidate to take the test in place of the student

students scored 220 marks or above in NMAT

More than Rs 13 crore changed hands in the process.

Page 32: Law ppt   final

Recent NewsRecent NewsHYDERABADVISAKHAPATNAMAURANGABADCHENNAIGURGAON

Page 33: Law ppt   final

Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA

AwarenessComputer forensics Labs

Page 34: Law ppt   final

ConclusionConclusion

India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards. In the era of e-governance and e-commerce, a lack of common security standards can create havoc for global trade as well as military matters.