Professional Documents
Culture Documents
Ran B. Singh
Information Technology Act
Necessity
Computer crime differs from traditional crimes
Digital evidence is volatile and it is easily corrupted
Requires a few resources relative to potential damage they cause
Can be committed in a jurisdiction without physical presence
Often illegality not clearly defined.
facilitate e-governance,
10/21/19 5
Information Technology Act
meanwhile,
the information technology enabled services assumed greater
importance and required harmonization with the IT Act
the protection of Critical Information Infrastructure, vulnerable
to terrorist and subversive activities, became necessary
the increase in different types of cyber crime, and the advent of
10/21/19 7
Information Technology Act
10/21/19 8
Information Technology Act
VII Electronic Signature Certificates 35 to 39
VIII Duties of Subscribers 40 to 42
IX Penalties, Compensation and 43 to 47
Adjudication
X The Cyber Appellate Tribunal 48 to 64
XI Offences 65 to 78
XII Intermediaries not to be liable 79
in certain cases
XIIA Examiner of Electronic Evidence 79A
XIII Miscellaneous 80 to 90
First Schedule : Documents or Transactions to
which the Act shall not apply
Second Schedule : Electronic Signature or Electronic
Authentication Technique and Procedure
10/21/19 9
Information Technology Act
Definitions
Access (section 2.1.a)
Gaining entry into, instructing or communicating with the
logical, arithmetical or memory functions of a computer,
computer system or computer network
Computer (section 2.1.i)
Any electronic, magnetic, optical device or system
which performs logical, arithmetic, memory functions
is :
10/21/19 13
Information Technology Act
Secure Electronic Record (Section 14)
Where any security procedure has been applied to an electronic
record at a specific point of time,
10/21/19 15
Information Technology Act
Electronic signature (Section 2.1.ta; 3A.2)
authentication of any electronic record by a subscriber by means
of the electronic technique specified in the Second Schedule of the
I T Act and includes digital signature
any electronic signature or electronic authentication technique is
considered reliable if:
the signature creation data or the authentication data are linked
to the signatory
the signature creation data or the authentication data were, at the
time of signing, under the control of the signatory
any alteration to the electronic signature and the information
made after affixing such signature is detectable, and
it fulfils such other conditions which may be prescribed
10/21/19 16
Information Technology Act
10/21/19 17
Information Technology Act
Information (Section 2.1.v)
includes data, message, text, images, sound, voice, codes,
computer programmes, software and databases or micro film
or computer generated micro fiche:
10/21/19 19 ranbsingh
Information Technology Act
such that an electronic record yields the same hash result every
time the algorithm is executed with the same electronic record
as its input making it computationally infeasible
10/21/19 20
Information Technology Act
10/21/19 21
Information Technology Act
Attribution of electronic records (Section 11)
10/21/19 22
Information Technology Act
Indian Computer Emergency Response Team (Section 70B)
- Government Agency, which shall serve as the national agency for
performing the following functions in the area of cyber security;
10/21/19 25 ranbsingh
Information Technology Act
Liability of Intermediary (contd.)
his function is limited to providing access to a communication
system
he does not (i) initiate the transmission, (ii) select the receiver
of the transmission, and (iii) select or modify the information
contained in the transmission.
he observes due diligence while discharging his duties
provided that
the intermediary does not conspire or abet or aid or induce, the
commission of the unlawful act
the intermediary expeditiously removes or disables the access to
the material on the computer resource controlled by him, being
used to commit the unlawful act, without vitiating the evidence,
upon receiving actual knowledge of the unlawful activity
10/21/19 26 ranbsingh
Information Technology Act
10/21/19 28 ranbsingh
Information Technology Act
Cyber Contraventions Cyber Offences
10/21/19 29 ranbsingh
Information Technology Act
10/21/19 31 ranbsingh
Information Technology Act
Computer Crime, Penalty and Compensation (contd.)
10/21/19 32 ranbsingh
Information Technology Act
10/21/19 35 ranbsingh
Information Technology Act
Section Offences Punishment
66B dishonestly receiving stolen computer imprisonment up to 3 years or
resource or communication device fine up to 1 lakh rupees or both
10/21/19 36 ranbsingh
Information Technology Act
10/21/19 37 ranbsingh
Information Technology Act
10/21/19 38 ranbsingh
Information Technology Act
10/21/19 39 ranbsingh
Information Technology Act
Section Offences Punishment
10/21/19 40 ranbsingh
Information Technology Act
Section Offences Punishment
69A failing to comply with the direction of the imprisonment up to 7
Central Government to block for access by years and fine
the public or cause to be blocked for access
by the public any information generated,
transmitted, received, stored or hosted in
any computer resource.
10/21/19 41 ranbsingh
Information Technology Act
Section Offences Punishment
70B failing to provide the information called for imprisonment up to 1
or comply with the direction of the Indian year or fine up to 1
Computer Emergency Response Team lakh rupees or both
10/21/19 42 ranbsingh
Information Technology Act
Section Offences Punishment
72A disclosing, without the consent of the imprisonment up to 3 years,
person concerned, of any material or fine up to 5 lakh rupees, or
containing personal information, with with both
the intent to cause or knowing that he is
likely to cause wrongful loss or
wrongful gain, to any other person
10/21/19 43 ranbsingh
Information Technology Act
Tampering with Computer Source Code
( Section 65 )
10/21/19 47 ranbsingh
Information Technology Act
Confiscation (Section 76)
10/21/19 48 ranbsingh
Power to investigate offences (Section Information
78) Technology Act
a police officer, not below the rank of a Inspector shall
investigate any offense under the I T Act
may enter any public place and search and arrest without warrant
any person found therein who is reasonably suspected or having
committed or of committing or of being about to commit any
offence under the I T Act
10/21/19 50 ranbsingh
If any one abets any offence and
Information Technology Act
if the act abetted is committed in consequence of the
abetment
10/21/19 52 ranbsingh
Information Technology Act
10/21/19 53 ranbsingh
Information Technology Act
10/21/19 54 ranbsingh
Information Technology Act
Electronic Records and Evidence Act (contd.)
Conditions related to Information (Sec 65B(5))
Whether the information which leads to the output is
supplied directly or (with or without human intervention ) by
means of an equipment
10/21/19 55 ranbsingh
Information Technology Act
Produced by a computer
(as defined in section 2.1.i of the IT Act)
10/21/19 56 ranbsingh
Information Technology Act
10/21/19 60
Information Technology Act
Contraventions/offences Sections of Law
10/21/19 61 ranbsingh
Information Technology Act
Thank You
10/21/19 64