law ppt final
DESCRIPTION
STUDY OF IT ACT IN LAWTRANSCRIPT
![Page 1: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/1.jpg)
LAWLAWINFORMATION TECHNOLOGY ACT
![Page 2: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/2.jpg)
Presented ByPresented ByAbhishek Seth 13001Chaitali Dhopatkar 13016Harmeet Dhindsa 13027Kinjal JainNeetu Khatri 13045Rahul Jain 13052Rohit Dhanuka 13054Ronak Sangani 13056Ruchira Gaikwad 13058Salil Samant 13060
![Page 3: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/3.jpg)
IntroductionIntroduction
CyberSpace:
Need
Purpose
![Page 4: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/4.jpg)
IT ACT 2000IT ACT 2000•Ensure legal infrastructure for e-commerce within India.
•Chapters : Different chapters in the act
•Objectives : To provide legal Framework . Establish a Regulatory body
![Page 5: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/5.jpg)
TerminologiesTerminologiesComputer
Computer System
Communication Device
Data
![Page 6: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/6.jpg)
Digital SignatureDigital SignatureA way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic.
Authentic - you know who created the document and you know that it has not been altered in any way since that person created it.
Types: Class-1 certificates Class-2 certificates Class-3 certificates
![Page 7: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/7.jpg)
Electronic SignatureElectronic SignatureAn electronic signature is a typed name or a digitized image of a handwritten signature.
It is an electronic indication to agree to or approve the contents of a document.
Uses of an Electronic Signature•
Sign contracts, invoices, and work orders• Approve project estimates and change orders• Sign school forms and permission slips• Complete and sign leases and rental agreements• Sign NDAs and client agreements• Sign bank documents and insurance forms
![Page 8: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/8.jpg)
Electronic GovernanceElectronic GovernanceUse of Internet, LAN, mobiles etc. by
Government to improve the effectiveness, efficiency, service delivery and to promote democracy
Uses of E-governanceTo have access to public documents.For making online payments of various bills
and dues.To file statutory documents online.
![Page 9: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/9.jpg)
Sections
![Page 10: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/10.jpg)
43A - Compensation for failure to 43A - Compensation for failure to protect dataprotect data
•Responsibility on persons (including companies) handling sensitive personal data for protection of data.
• Reasonable Security Practices
Security initiativesAwareness TrainingConformance to Standards, certificationPolicies and adherence to policiesPolicies like password policy, Access Control,
email Policy etcPeriodic monitoring and review
•Adjudication & its role
![Page 11: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/11.jpg)
Section 66Section 66Hacking with Computer SystemHacking is committed by•Whoever with the intent of causing damage•Alters any information
Person committed hacking is•imprisonment up to three years•fine up to two lakh rupees•Or Both
![Page 12: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/12.jpg)
CITI Bank & Mphasis fund siphoning
![Page 13: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/13.jpg)
Section 66 FSection 66 F
Whoever intends to threaten the unity, integrity, security or soverginity of India to strike terror among the people by an unauthorised access to computer system
Punishment Imprisonment which may extend to life
![Page 14: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/14.jpg)
Section 69Section 69
It empowers the government to intercept, monitor any information generated, transmitted, received or stored in any computer resource that may be related to integrity of India, Security of India or any state, friendly relations with Foreign States, etc.
![Page 15: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/15.jpg)
Attack on parliament
![Page 16: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/16.jpg)
Section 67Section 67 It deals with publishing or transmitting
obscene material in electronic form
Pornography and ‘obscene information’
Pornography being not illegal
![Page 17: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/17.jpg)
Cyber CrimesCyber Crimes
Term for any illegal activity that uses a computer as its primary means of commission.
Its is not a physical attack but a virtual attack
![Page 18: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/18.jpg)
Some types of Cyber CrimesSome types of Cyber Crimes
• HackingWhite Hat Hackers Black Hat Hackers Grey Hat Hackers
• Software Piracy
Cyber Pornography
![Page 19: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/19.jpg)
Cont..Cont..Credit Card Fraud
Vishing
![Page 20: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/20.jpg)
Case on Freedom of Expression – Azeem Trivedi
![Page 21: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/21.jpg)
Case on “ Death of Shiv Sena Chief”
![Page 22: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/22.jpg)
StatisticsStatistics
![Page 23: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/23.jpg)
![Page 24: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/24.jpg)
Role of IT in bankingRole of IT in banking
Information Technology
Opened up new markets , products , and services .
•Increased speed and reliability of financial operation .
•Met ever increasing demands of customers by providing an instant anytime anywhere service .
• Provided solutions to take care of accounting and back office work .
![Page 25: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/25.jpg)
Products offered to Products offered to Customers Customers Net Banking Credit Card OnlineInsta AlertsPhone Banking / Mobile Bankinge-Monies Electronic Fund
Transfer / e-ChequesOnline Payment of Excise &
Service TaxCard to Card Funds Transfer
![Page 26: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/26.jpg)
NASSCOMNASSCOM
What NASSCOM is?
•Nasscom's Vision
•Aims and Objectives
•Partnership with the Government
![Page 27: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/27.jpg)
NASSCOM INITIATIVES NASSCOM INITIATIVES INCLUDE:INCLUDE:
Domestic Market InitiativeEducation InitiativeSecurity InitiativeWomen in Leadership-IT Initiative
![Page 28: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/28.jpg)
Case StudiesCase StudiesTrue Caller • Allows users to look up for anonymous mobile and landline numbers on the web or on their Internet-enabled mobile
•True Caller‘s database has been hacked by Syrian Electronic Army hackers.
•Hackers downloaded more than 7 databases of 450GB in size.
•The issue with the app is that a person is not in control if their number is being shared on the service by one of their contact. While the service does offer an option to unlist a number.
![Page 29: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/29.jpg)
10 million – Jan 2013
20 million users globally – Feb 2013
![Page 30: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/30.jpg)
RS 400 MILLION SMS SCAM RS 400 MILLION SMS SCAM
Nadar brothers along with Gala allegedly took help of SMS technology and launched the first-of-its- kind SMS fraud in India.
Launched an advertisement campaign - "Nothing is impossible. The word itself is: I M Possible.“
Earn Rs 10000/pm & deposit Rs 500
www.getpaid4sms. Com
![Page 31: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/31.jpg)
NMIMSNMIMS
6 peoele identified for having impersonated 87 candidates in the (NMAT) held from October 11 to December 19, 2012
Employed a dummy candidate to take the test in place of the student
students scored 220 marks or above in NMAT
More than Rs 13 crore changed hands in the process.
![Page 32: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/32.jpg)
Recent NewsRecent NewsHYDERABADVISAKHAPATNAMAURANGABADCHENNAIGURGAON
![Page 33: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/33.jpg)
Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA
AwarenessComputer forensics Labs
![Page 34: Law ppt final](https://reader036.vdocuments.site/reader036/viewer/2022081504/556679e5d8b42ad5798b4d3d/html5/thumbnails/34.jpg)
ConclusionConclusion
India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards. In the era of e-governance and e-commerce, a lack of common security standards can create havoc for global trade as well as military matters.