the information technology act internet pharmacy

2
The Information Technology Act in India was passed in the year 2000 The IT Act 2008 has been notified on Oct 27 2009 The Information Technology Act is being opposed mainly by Save your Voice The Information Technology Act in India came into effective from Oct 17, 2000 The Information technology Act 2000 has been substantially amended through the IT (Amendment) Act 2008 Information technology Act 2000 passwords, and credit card details by masquerading as a trustworthy entity in an electronic communi- cation Phishing Phishing is typically carried out by .............or instant messaging. email spoofing The first recorded use of the term ‘phishing’ was made in 1995 A form of Phishing where a fraudster uses the phone to lure people in revealing their confiden- tial banking details etc. is known as Vishing VoIP stands for Voice Over Internet Protocol The activity of a culture of people who study experiment with, or ex- plore telecommunication systems connected to public telephone networks Phreaking Intellectual property rights does not include trade secrets ..........is an error, flaw, mistake, fail- ure, or fault in a computer program or system that produces an incor- rect or unexpected result, or causes it to behave in unintended ways Software bug The Internet is a global system of interconnected computer net- works that use the standard Internet protocol suite (TCP/IP) . ...............is the process of recover- ing passwards from data that has been stored in or transmitted by a computer system Passward Cracking Pornography or porn is the explicit portrayal of ..............subject mat- ter Sexual Which is not defined in any legis- lation in India ? Cyber Crime The United Nations Commission on International Trade Law (UNCITRAL) adopted the Model Law on e-commerce in 1996 The first legislation in the nation on technology, computers and ecommerce and e-communication IT Act 2000 Sections 91 to 94 in the ITA 2000 dealt with the amendments to the four Acts namely the Indian Penal Code 1860, The Indian Evidence Act 1872, The Banker’s Books Evi- dence Act 1891 and the Reserve Bank of India Act 1934 The phrases ‘communication de- vices’ & ‘cyber cafe’ were inserted in the ITAA 2008 ‘Indian Computer response Emer- gency Team’ was included in the ITAA 2008 Which is known as the ‘authenti- cation of electronic record ‘ Digital signature Section 3 which was originally ‘Digital Signature’ was later re- named as ..............in ITAA - 2008 Digital Signature and Electronic Signature .........of the IT Act deals with penalities and compensation for damage to computer, computer system etc. Section 43 ..........of the IT Act is the first ma- jor and significant legislative step in India to combat the issue of data theft Section 43 Criminality in the offence of data theft is being separately dealt un- der Sections 65 and 66 The new section ...........dealing with compensation for failure to protect data was introduced in the ITAA - 2008 43 A Tampering with source documents is dealt with under .........section Section 65 Computer related offences are dealt with under .............Section Section 66 Sending offensive messages through communication service, causing annoyance etc through an electronic communication or send- ing an email to mislead or deceive the recipient about the origin of such messages (commonly known as IP or email spoofing) are all cov- ered under Section Section 66-A Privacy violation ie, Publishing or transmitting private area of any person without his or her consent etc comes under Section 66-E Punishment for cyber terrorism is comes under Section 66-F Section 67 of IT Act deals with publishing or transmitting obscence material in electronic form ...........has been exclusively dealt with under Section 67B child pornography The power of intercepting, moni- toring and blocking something for which the Government is repre- consisted of ................sections segregated into ...............chapters 94 and 13 Which issues does not address the Information Technology Act 2008 Justice Dispensation Systems for Cyber Crimes The Government of India has brought major amendments to ITA- 2000 in form of the Information Technology Amend- ment Act, 2008 A set of Rules relating to Sensi- tive Personal Information and Rea- sonable Secuity Practices (men- tioned in section 43A of the ITAA, 2008) was released in April 2011 ..............is attempting to acquire in- formation (and sometimes, indi- rectly, money) such as usernames, Most countries extend copyright protections to software against software piracy HOT TIP INTERNET PHARMACY It is the use of internet as a tool to sell or purchase the drugs or psychotropic sub- stances which are either illicit or are not readily available in a country. eg: drug like Ketamine which is easily avail- able in India at very nominal prices is sold through illegal networks over internet to South Asian countries where it is banned and is used for drug abuse. FIRST COMPUTER SPECIFIC LAW The World’s First Computer Specific Law was enacted in the year 1970 by the German state of Hesse in the form of Data Protection Act, 1970 with the advancement of cyber technology. This years survey of Norton Cyber Crime Report 2012 shows an increase in new forms of cybercrime compared to last years. In India one in three adults online (32%) has been a victim of either social or mobile cyber crime in the last 12 months and 51% of social network users have been victims of social cyber crime specifically 22% of social network users reported some one had hacked into their profile and pretended to be them. 15% of social network users said they had fallen victim to a scam or fake link on social network platforms. DR. VIJAY P. BHATKAR father of Indian Super Comput- ers. The architect of param series of computers.

Upload: others

Post on 12-Sep-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Information Technology Act INTERNET PHARMACY

The Information Technology Actin India was passed in the year2000

The IT Act 2008 has been notifiedonOct 27 2009

The Information Technology Actis being opposed mainly bySave your Voice

The Information Technology Actin India came into effective fromOct 17, 2000

The Information technology Act2000 has been substantiallyamended through theIT (Amendment) Act 2008

Information technology Act 2000

passwords, and credit card detailsby masquerading as a trustworthyentity in an electronic communi-cationPhishing

Phishing is typically carried out by.............or instant messaging.email spoofing

The first recorded use of the term‘phishing’ was made in1995

A form of Phishing where afraudster uses the phone to lurepeople in revealing their confiden-tial banking details etc. is knownasVishing

VoIP stands forVoice Over Internet Protocol

The activity of a culture of peoplewho study experiment with, or ex-plore telecommunication systemsconnected to public telephonenetworksPhreaking

Intellectual property rights doesnot includetrade secrets

..........is an error, flaw, mistake, fail-ure, or fault in a computer programor system that produces an incor-rect or unexpected result, or causesit to behave in unintended waysSoftware bug

The Internet is a global system ofinterconnected computer net-works that use the standardInternet protocol suite (TCP/IP)

. ...............is the process of recover-ing passwards from data that hasbeen stored in or transmitted by acomputer systemPassward Cracking

Pornography or porn is the explicitportrayal of ..............subject mat-terSexual

Which is not defined in any legis-lation in India ?Cyber Crime

The United Nations Commissionon International Trade Law(UNCITRAL) adopted the ModelLaw on e-commerce in1996

The first legislation in the nationon technology, computers andecommerce and e-communicationIT Act 2000

Sections 91 to 94 in the ITA 2000dealt with the amendments to thefour Acts namely the Indian PenalCode 1860, The Indian EvidenceAct 1872, The Banker’s Books Evi-

dence Act 1891 and theReserve Bank of India Act 1934

The phrases ‘communication de-vices’ & ‘cyber cafe’ were insertedin theITAA 2008

‘Indian Computer response Emer-gency Team’ was included in theITAA 2008

Which is known as the ‘authenti-cation of electronic record ‘Digital signature

Section 3 which was originally‘Digital Signature’ was later re-named as ..............in ITAA - 2008Digital Signature and ElectronicSignature

.........of the IT Act deals withpenalities and compensation fordamage to computer, computersystem etc.Section 43

..........of the IT Act is the first ma-jor and significant legislative stepin India to combat the issue of datatheftSection 43

Criminality in the offence of datatheft is being separately dealt un-der Sections65 and 66

The new section ...........dealingwith compensation for failure toprotect data was introduced in theITAA - 2008

43 A Tampering with source documents

is dealt with under .........sectionSection 65

Computer related offences aredealt with under .............SectionSection 66

Sending offensive messagesthrough communication service,causing annoyance etc through anelectronic communication or send-ing an email to mislead or deceivethe recipient about the origin ofsuch messages (commonly knownas IP or email spoofing) are all cov-ered under SectionSection 66-A

Privacy violation ie, Publishing ortransmitting private area of anyperson without his or her consentetc comes underSection 66-E

Punishment for cyber terrorism iscomes underSection 66-F

Section 67 of IT Act deals withpublishing or transmittingobscence material in electronicform

...........has been exclusively dealtwith under Section 67Bchild pornography

The power of intercepting, moni-toring and blocking something forwhich the Government is repre-

consisted of ................sectionssegregated into ...............chapters94 and 13

Which issues does not addressthe Information Technology Act2008Justice Dispensation Systems forCyber Crimes

The Government of India hasbrought major amendments to ITA-2000 in form of theInformation Technology Amend-ment Act, 2008

A set of Rules relating to Sensi-tive Personal Information and Rea-sonable Secuity Practices (men-tioned in section 43A of the ITAA,2008) was released inApril 2011

..............is attempting to acquire in-formation (and sometimes, indi-rectly, money) such as usernames,

Most countries extend copyrightprotections to software againstsoftware piracy

HOT TIP

INTERNET PHARMACY

It is the use of internet as a tool to sell orpurchase the drugs or psychotropic sub-stances which are either illicit or are notreadily available in a country.eg: drug like Ketamine which is easily avail-able in India at very nominal prices is soldthrough illegal networks over internet toSouth Asian countries where it is banned andis used for drug abuse.

FIRST COMPUTER SPECIFIC LAWThe World’s First Computer Specific Law was enacted in the year 1970 bythe German state of Hesse in the form of Data Protection Act, 1970 with theadvancement of cyber technology.This years survey of Norton Cyber Crime Report 2012 shows an increasein new forms of cybercrime compared to last years.In India one in three adults online (32%) has been a victim of either socialor mobile cyber crime in the last 12 months and 51% of social network usershave been victims of social cyber crime specifically 22% of social networkusers reported some one had hacked into their profile and pretended to bethem. 15% of social network users said they had fallen victim to a scam orfake link on social network platforms.

DR. VIJAY P. BHATKARfather of Indian Super Comput-

ers. The architect of param series

of computers.

9

Page 2: The Information Technology Act INTERNET PHARMACY

sented by a national nodal agencyas nominated in Section 70 B ofITAA. The agency is named asIndian Computer Emergency Re-sponse Team (CERT)

Critical Information Infrastructureand Protected System have beendiscussed in Section.........70

The Indian Computer EmergencyResponse Team (CERT) comingunder the Ministry ofInformation Technology

Liability of intermediaries and theconcept of Due Diligence has beendiscussed inSection 79

ITA 2000 has amended the sec-tions dealing with records anddocuments in the ................by in-serting the word ‘electronic’thereby treating the electronicrecords and documents on a parwith physical records and docu-mentsIndian Penal Code 1860

Health Insurance Portability andAccountanbility Act popularlyknown as HIPAA is a law inUSA

HIPAA regulatesAll Health and Insurance RelatedRecords

The unlawful acts where in thecomputer is either a tool or a tar-get or both is calledCyber Crime

Cyber Crime is regulated by CyberLaws orInternet Laws

................means gaining entry into,instructing or communicating withthe logical, arithmetical, or memoryfunction resources of a computer,computer system or computer net-workAccess

.............means any kind of accesswithout the permission of eitherthe rightful owner or the person incharge of a computer, computersystem or computer networkUnauthorised access

Every act committed towardsbreaking into a computer and / ornetwork ishacking

By hacking web server taking con-trol on another person’s websiteis called asweb hijacking

The program that act like some-thing useful but do the things thatare quiet damping. The programsof the kind are calledTrojans

Some functions of the trojans usethe ............... ProtocolUser Datagram

A program that has capability toinfect other programs and makecopies of itself and spread intoother programme is calledVirus

Programs that multiply like viruses

but spread from computer to com-puter are called ..............Worm

...............refers to email that appearsto have been originated from onesource when it was actually sentfrom another sourceEmail spoofing

................refers to sending email tothousands and thousands of us-ers similar to a chind letterSpamming

...........are used to send viruses,Trojans etc through emails as anattachment or by sending a like ofwebsite which on visiting down-

HOT TIP

threatening ) on the bulletinboards etcCyber Stalking

Persons who intentionally preyupon children on the internet iscalledPedophiles

Identity theft is the fastest grow-ing crime in countries likeAmerica

Changing information by a person/ a virus while typing the data, fromthe way it should beData didding

..................refers to the right of anindividual / individuals to deter-

HOT TIP

loads malicious codeemails

...........is characterized by abusersrepeatedly sending an identicalemail message to particular ad-dressEmail bombing

A .............attack is accomplished byusing the Internet to break intocomputers and using them to at-tack a network.distributed denial of service (DoS)

Software piracy, copyright in-fringement, trademarks, violations,theft of computer source code,patent violations etc. come underIPR violation

.............can be understood as theintentional infringement of anotherperson’s right to his good nameCyber defamation

Cyber Defamation occurs whendefamation takes place with thehelp of computers and / orinternet

Cyber defamation is also calledCyber smearing

...................is to follow a person’smovements across the Internet byposting messages (sometimes

mine when, how and to what ex-tent his or her personal data willbe shared with othersPrivacy

Breach of ..............means unautho-rized use or distribution or disclo-sure of personal information likemedical records, sexual prefer-ences, financial status etcPrivacy

...........means non disclosure of in-formation to unauthorized or un-wanted persons.Confidentiality

Information Technology (Certify-ing Authority)Regulations, 2001came into force on9 July 2001

The Cyber Regulations AppellateTribunal (Procedure) Rules, 2000came into force on17th Oct 2000

Secretary, Department of...................of each of the State orof Union Territory of India is theadjudicating officer or CyberRegulations Appellate TribunalInformation Technology

An important order relating toblocking of websites was passedon27th Feb 2003

Computer Emergency ResponseTeam (CERT-IND) can instruct De-partment of ............to block awebsiteTelecommunications (DOT)

Digital Evidence is to be collectedand proven in court as per the pro-visions of the .............The Indian Evidence Act 1872

IP address is given by ..............val-uesnumerical

TLD in Cyber Space stands forTop level Domain name

In a domain name ‘.in’ denotesIndia

The domain names are given onthe basis ofFirst come, first served

IRC stands forInternet Relay Chat

The domain names were initiallyregistered byNetwork Solutions

...............is the practice by meansof which a person or legal entitybooks up the trade mark, businessname or service mark of anotheras his own domain name for thepurpose of holding on to it andthereafter selling the same domainname to the other person for valu-able premium and considerationCybersquatting

What is the latest most effectiveremedy against Cybersquatting ?Uniform Domain Name DisputeResolution Policy

Which key is used to rename aslected file or iconF2

What type of software is used forcreating letter papers and otherdocumentsWord Processor

Which process checks to ensurethe components of the computerare operating and connected prop-erlyBooting

Which key is used to refresh thecontent of a fileF5

The CPU and memory are locatedon theMotherboard

What is the process of connect-ing to the internet account calledlog in

IP address is currently4 bytes long

CYBER CRIME

Direct IndirectViruses Cyber StalkingMalware FraudDenial-of Services Attack PhishingAdware Information Warfare

Internet Pharmacy Cyber Terrorism Spam

The first recordedcybercrime in 1820 Jo-seph-Marie Jacquard ofFrance, produced theloom, this resulted in a fearamongst Jacquard’s em-ployees that their tradi-tional employment andlivelihood were beingthreatened. They commit-ted acts of sabotage todiscourage Jacquard fromfurther use of the newtechnology. This is thefirst recorded cybercrime.

NETCRIMEAs in the case of the offences relatedto the internet pharmacy of narcoticdrugs or psychotropic substances. Atthe times such crimes are also referredto as netcrime which are basically re-lated with the criminal exploitation ofInternet.

C Y B E R S TA L K I N GCyber stalking is the use of the internet or other electronic means to stalk orharass an individual, a group of individuals or an organization.

ITA 69 A - Power to issuedirections for blocking public

access of any Informationthrough any computer resource

ITA Section 80 - Power of police of-ficer and other officers to enter,search etc.

ITA Section 70 B - Indian computeremergency response team toserve as national agency for in-cident response.

HOT TIP

IT ACT Section 75 -To apply foroffence or contravention commit-ted outside India.

www.brilliancecollege.com

DIRECT COACHING HIGH POWER TRAININGBrilliance College \ v tI c-f -̄ nse F Ãm {] [ m\ Ø e-§ -f nepw t\ cn-«pÅ t I m̈n§ v ¢mÊp-I Ä. ¢mÊv k a-b-§ Ä : Morning, Day, Evening &Holiday Batches. ] pXnb _ m̈n\ v A Uvan-j ³ B cw-̀n-̈ p. Brilliance Col-lege sâ sXm«-Sp̄ {_ m© nte¡ v I S-¶ p-h¶ v D¶ X k À¡ mÀ DtZymKwDd-̧ m-¡ p-I .