law ppt final
DESCRIPTION
STUDY OF IT ACT IN LAWTRANSCRIPT
LAWLAWINFORMATION TECHNOLOGY ACT
Presented ByPresented ByAbhishek Seth 13001Chaitali Dhopatkar 13016Harmeet Dhindsa 13027Kinjal JainNeetu Khatri 13045Rahul Jain 13052Rohit Dhanuka 13054Ronak Sangani 13056Ruchira Gaikwad 13058Salil Samant 13060
IntroductionIntroduction
CyberSpace:
Need
Purpose
IT ACT 2000IT ACT 2000•Ensure legal infrastructure for e-commerce within India.
•Chapters : Different chapters in the act
•Objectives : To provide legal Framework . Establish a Regulatory body
TerminologiesTerminologiesComputer
Computer System
Communication Device
Data
Digital SignatureDigital SignatureA way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic.
Authentic - you know who created the document and you know that it has not been altered in any way since that person created it.
Types: Class-1 certificates Class-2 certificates Class-3 certificates
Electronic SignatureElectronic SignatureAn electronic signature is a typed name or a digitized image of a handwritten signature.
It is an electronic indication to agree to or approve the contents of a document.
Uses of an Electronic Signature•
Sign contracts, invoices, and work orders• Approve project estimates and change orders• Sign school forms and permission slips• Complete and sign leases and rental agreements• Sign NDAs and client agreements• Sign bank documents and insurance forms
Electronic GovernanceElectronic GovernanceUse of Internet, LAN, mobiles etc. by
Government to improve the effectiveness, efficiency, service delivery and to promote democracy
Uses of E-governanceTo have access to public documents.For making online payments of various bills
and dues.To file statutory documents online.
Sections
43A - Compensation for failure to 43A - Compensation for failure to protect dataprotect data
•Responsibility on persons (including companies) handling sensitive personal data for protection of data.
• Reasonable Security Practices
Security initiativesAwareness TrainingConformance to Standards, certificationPolicies and adherence to policiesPolicies like password policy, Access Control,
email Policy etcPeriodic monitoring and review
•Adjudication & its role
Section 66Section 66Hacking with Computer SystemHacking is committed by•Whoever with the intent of causing damage•Alters any information
Person committed hacking is•imprisonment up to three years•fine up to two lakh rupees•Or Both
CITI Bank & Mphasis fund siphoning
Section 66 FSection 66 F
Whoever intends to threaten the unity, integrity, security or soverginity of India to strike terror among the people by an unauthorised access to computer system
Punishment Imprisonment which may extend to life
Section 69Section 69
It empowers the government to intercept, monitor any information generated, transmitted, received or stored in any computer resource that may be related to integrity of India, Security of India or any state, friendly relations with Foreign States, etc.
Attack on parliament
Section 67Section 67 It deals with publishing or transmitting
obscene material in electronic form
Pornography and ‘obscene information’
Pornography being not illegal
Cyber CrimesCyber Crimes
Term for any illegal activity that uses a computer as its primary means of commission.
Its is not a physical attack but a virtual attack
Some types of Cyber CrimesSome types of Cyber Crimes
• HackingWhite Hat Hackers Black Hat Hackers Grey Hat Hackers
• Software Piracy
Cyber Pornography
Cont..Cont..Credit Card Fraud
Vishing
Case on Freedom of Expression – Azeem Trivedi
Case on “ Death of Shiv Sena Chief”
StatisticsStatistics
Role of IT in bankingRole of IT in banking
Information Technology
Opened up new markets , products , and services .
•Increased speed and reliability of financial operation .
•Met ever increasing demands of customers by providing an instant anytime anywhere service .
• Provided solutions to take care of accounting and back office work .
Products offered to Products offered to Customers Customers Net Banking Credit Card OnlineInsta AlertsPhone Banking / Mobile Bankinge-Monies Electronic Fund
Transfer / e-ChequesOnline Payment of Excise &
Service TaxCard to Card Funds Transfer
NASSCOMNASSCOM
What NASSCOM is?
•Nasscom's Vision
•Aims and Objectives
•Partnership with the Government
NASSCOM INITIATIVES NASSCOM INITIATIVES INCLUDE:INCLUDE:
Domestic Market InitiativeEducation InitiativeSecurity InitiativeWomen in Leadership-IT Initiative
Case StudiesCase StudiesTrue Caller • Allows users to look up for anonymous mobile and landline numbers on the web or on their Internet-enabled mobile
•True Caller‘s database has been hacked by Syrian Electronic Army hackers.
•Hackers downloaded more than 7 databases of 450GB in size.
•The issue with the app is that a person is not in control if their number is being shared on the service by one of their contact. While the service does offer an option to unlist a number.
10 million – Jan 2013
20 million users globally – Feb 2013
RS 400 MILLION SMS SCAM RS 400 MILLION SMS SCAM
Nadar brothers along with Gala allegedly took help of SMS technology and launched the first-of-its- kind SMS fraud in India.
Launched an advertisement campaign - "Nothing is impossible. The word itself is: I M Possible.“
Earn Rs 10000/pm & deposit Rs 500
www.getpaid4sms. Com
NMIMSNMIMS
6 peoele identified for having impersonated 87 candidates in the (NMAT) held from October 11 to December 19, 2012
Employed a dummy candidate to take the test in place of the student
students scored 220 marks or above in NMAT
More than Rs 13 crore changed hands in the process.
Recent NewsRecent NewsHYDERABADVISAKHAPATNAMAURANGABADCHENNAIGURGAON
Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA
AwarenessComputer forensics Labs
ConclusionConclusion
India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards. In the era of e-governance and e-commerce, a lack of common security standards can create havoc for global trade as well as military matters.