INFORMATION TECHNOLOGY ACT
Dr. Prasoona Reddy
INFORMATION TECHNOLOGY
ACT
 The primary law in India dealing with Cybercrimes and Electronic
commerce
 It commenced in October 17, 2000
 There are 94 sections,13 chapters and 4 schedules
 IT Amendment Act 2008
INFORMATION TECHNOLOGY ACT
 Electronic records:
Information captured through electronic means .
Examples of electronic records include: pen drives,images
emails, websites, Word/Excel documents, digital purchase receipts,
databases, text messages, social media postings, and information stored
on SharePoint sites and content management systems (Catalyst, Slack,
DropBox, etc.)
INFORMATION TECHNOLOGY ACT
 Digital signature:
A digital signature is an electronic, encrypted, stamp of authentication
on digital information such as email messages, macros, or electronic
documents.
E-Governance:
Use of electronic records and electronic signatures in Government and
its agencies.
INFORMATION TECHNOLOGY ACT
Cybercrime
 Cybercrimes : Criminal activities
carried out by means of computer
or internet
 Electronic commerce : Buying
and selling of goods & services
over electeonic network or
internet.
THE OFFENCES AND THE PUNISHMENTS IN
IT ACT 2000 :
 Tampering with the computer source documents.
 Directions of Controller to a subscriber to extend facilities to
decrypt information.
 Publishing of information which is obscene in electronic
form.
 Penalty for breach of confidentiality and privacy.
 Hacking for malicious purposes.
 Penalty for publishing Digital Signature Certificate false in
certain particulars.
 Power of Controller to give directions.
THE OFFENCES AND THE PUNISHMENTS IN
IT ACT 2000 :
 Phishing: Phishing got its name from “phish” meaning fish.
It’s a common phenomenon to put bait for the fish to get
trapped
 Confiscation or Seizure
 Cyberbullying
 Cyberstalking
 Cyberfraud
VIRUS IN INFORMATION SECURITY
 Spread of Malware-Trojan horse:
There was a Trojan that disguised itself as a game. Many users have
downloaded this game and that secretly turned into a self-replicating
virus. The game was a simple theme-based game, but it started to back
up all the files on the drive where the user would access them. The
Trojan turned out to be harmless, and it was easy for them to fix.
 Now after this many Trojan viruses or Malware came which turned
out to be a threat or the most popular malware attack. The Trojans
are a bit tougher to be identified. Trojans can be found in MP3 songs
that the user may have downloaded, downloading games from an
unsecured website, or advertisement that pops up when the user is
browsing the page.
PUNISHMENT
 Section 43-This section of IT Act, 2000 states that any act of
destroying, altering or stealing computer system/network or deleting
data with malicious intentions without authorization from owner of
the computer is liable for the payment to be made to owner as
compensation for damages.
 Section 66-Hacking of a Computer System with malicious intentions
like fraud will be punished with 3 years imprisonment or the fine of
Rs.5,00,000 or both.
 Section 66F-This section of IT Act, is on Cyber Terrorism affecting
unity, integrity, security, sovereignty of India through digital medium
is liable for life imprisonment.
Information Technology and IT Act for STudents.pptx

More Related Content

DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...

Similar to Information Technology and IT Act for STudents.pptx (20)

DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
DOCX
The government of india enacted its information technology act 2000 with the ...
PPTX
Cyber crime p pt
PPTX
Information act 2000 in cybersecurity computer science
PPTX
Legal issues &it act
PPTX
PPT on cyber LAW And ACT Of INDIA
PPTX
Cyber securitylaw
PPTX
Indian it act 2000
PPTX
I.T ACT 2000
PPTX
IT Act,2000 - Law
PPT
15998595.ppt
PPTX
Cyber law in India: Its need & importance
PPTX
Cyber law In India: its need & importance
PPTX
cyber .pptx
PDF
cyber law its need importance.pdf
PPT
IT Act 2000
PPTX
Information technology act
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Cyber crime p pt
Information act 2000 in cybersecurity computer science
Legal issues &it act
PPT on cyber LAW And ACT Of INDIA
Cyber securitylaw
Indian it act 2000
I.T ACT 2000
IT Act,2000 - Law
15998595.ppt
Cyber law in India: Its need & importance
Cyber law In India: its need & importance
cyber .pptx
cyber law its need importance.pdf
IT Act 2000
Information technology act
Ad

More from prasoona4 (18)

PPT
labeling marketing management in business management.ppt
PPTX
HRAnalytics starting capturing methodss2october2021.pptx
PPT
Line&Staff function of HR management.ppt
PPTX
Analytics Human resources basics of analytics-II.pptx
PPTX
Grading Feedback Training - VU MBA_MOT_MFP_Nur_MH.pptx
PPTX
Company management and importance .pptx
PPT
MODERNHRM VERSUS TRADITIONAL HUMANRESOURCEMANAGEMENT.ppt
PPT
hrm-vs-personnel management process-mgt.ppt
PPTX
trainingdevelopment1.pptxhow employees to be trained
PPTX
Unit V Windingup.pptx winding of a Company ;law
PPTX
Unit IV-II.pptx-resignation of a director
PPTX
Consumer protection Act in business law.pptx
PPTX
HR Planning and required strategies.pptx
PPTX
Revocation & Discharge in sale of goods act.pptx
PPTX
typesofcomputer and forms of computers since olden days.pptx
PPTX
types of computer,HARDWARE SOFTWARE.pptx
PPTX
HR Planning.pptx about planning, organizing etc.....
PPTX
B.law.pptx about how a contract is discharged
labeling marketing management in business management.ppt
HRAnalytics starting capturing methodss2october2021.pptx
Line&Staff function of HR management.ppt
Analytics Human resources basics of analytics-II.pptx
Grading Feedback Training - VU MBA_MOT_MFP_Nur_MH.pptx
Company management and importance .pptx
MODERNHRM VERSUS TRADITIONAL HUMANRESOURCEMANAGEMENT.ppt
hrm-vs-personnel management process-mgt.ppt
trainingdevelopment1.pptxhow employees to be trained
Unit V Windingup.pptx winding of a Company ;law
Unit IV-II.pptx-resignation of a director
Consumer protection Act in business law.pptx
HR Planning and required strategies.pptx
Revocation & Discharge in sale of goods act.pptx
typesofcomputer and forms of computers since olden days.pptx
types of computer,HARDWARE SOFTWARE.pptx
HR Planning.pptx about planning, organizing etc.....
B.law.pptx about how a contract is discharged
Ad

Recently uploaded (20)

PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
PDF
FAMILY PLANNING (preventative and social medicine pdf)
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PPTX
Neurological complocations of systemic disease
PDF
Health aspects of bilberry: A review on its general benefits
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
DOCX
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
PPTX
Math 2 Quarter 2 Week 1 Matatag Curriculum
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
Laparoscopic Imaging Systems at World Laparoscopy Hospital
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
Physical pharmaceutics two in b pharmacy
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PDF
FYJC - Chemistry textbook - standard 11.
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
faiz-khans about Radiotherapy Physics-02.pdf
Chevening Scholarship Application and Interview Preparation Guide
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
FAMILY PLANNING (preventative and social medicine pdf)
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
Neurological complocations of systemic disease
Health aspects of bilberry: A review on its general benefits
Power Point PR B.Inggris 12 Ed. 2019.pptx
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
Math 2 Quarter 2 Week 1 Matatag Curriculum
ACFE CERTIFICATION TRAINING ON LAW.pptx
Laparoscopic Imaging Systems at World Laparoscopy Hospital
4. Diagnosis and treatment planning in RPD.pptx
Physical pharmaceutics two in b pharmacy
Disorder of Endocrine system (1).pdfyyhyyyy
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
FYJC - Chemistry textbook - standard 11.
Diabetes Mellitus , types , clinical picture, investigation and managment

Information Technology and IT Act for STudents.pptx

  • 2. INFORMATION TECHNOLOGY ACT  The primary law in India dealing with Cybercrimes and Electronic commerce  It commenced in October 17, 2000  There are 94 sections,13 chapters and 4 schedules  IT Amendment Act 2008
  • 3. INFORMATION TECHNOLOGY ACT  Electronic records: Information captured through electronic means . Examples of electronic records include: pen drives,images emails, websites, Word/Excel documents, digital purchase receipts, databases, text messages, social media postings, and information stored on SharePoint sites and content management systems (Catalyst, Slack, DropBox, etc.)
  • 4. INFORMATION TECHNOLOGY ACT  Digital signature: A digital signature is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents. E-Governance: Use of electronic records and electronic signatures in Government and its agencies.
  • 5. INFORMATION TECHNOLOGY ACT Cybercrime  Cybercrimes : Criminal activities carried out by means of computer or internet  Electronic commerce : Buying and selling of goods & services over electeonic network or internet.
  • 6. THE OFFENCES AND THE PUNISHMENTS IN IT ACT 2000 :  Tampering with the computer source documents.  Directions of Controller to a subscriber to extend facilities to decrypt information.  Publishing of information which is obscene in electronic form.  Penalty for breach of confidentiality and privacy.  Hacking for malicious purposes.  Penalty for publishing Digital Signature Certificate false in certain particulars.  Power of Controller to give directions.
  • 7. THE OFFENCES AND THE PUNISHMENTS IN IT ACT 2000 :  Phishing: Phishing got its name from “phish” meaning fish. It’s a common phenomenon to put bait for the fish to get trapped  Confiscation or Seizure  Cyberbullying  Cyberstalking  Cyberfraud
  • 8. VIRUS IN INFORMATION SECURITY  Spread of Malware-Trojan horse: There was a Trojan that disguised itself as a game. Many users have downloaded this game and that secretly turned into a self-replicating virus. The game was a simple theme-based game, but it started to back up all the files on the drive where the user would access them. The Trojan turned out to be harmless, and it was easy for them to fix.  Now after this many Trojan viruses or Malware came which turned out to be a threat or the most popular malware attack. The Trojans are a bit tougher to be identified. Trojans can be found in MP3 songs that the user may have downloaded, downloading games from an unsecured website, or advertisement that pops up when the user is browsing the page.
  • 9. PUNISHMENT  Section 43-This section of IT Act, 2000 states that any act of destroying, altering or stealing computer system/network or deleting data with malicious intentions without authorization from owner of the computer is liable for the payment to be made to owner as compensation for damages.  Section 66-Hacking of a Computer System with malicious intentions like fraud will be punished with 3 years imprisonment or the fine of Rs.5,00,000 or both.  Section 66F-This section of IT Act, is on Cyber Terrorism affecting unity, integrity, security, sovereignty of India through digital medium is liable for life imprisonment.