IT Act 2000 - PPT
IT Act 2000 - PPT
Shivam Agarwal Shubham Dikshit Rajat Garg Ankit Kandoi Aditi Kaul Sahil Rawat Aditya Sharma Anchit Verma A002 A014 A016 A028 A029 A045 A051 A060
Contents
Objectives E-Governance & Electronic Records Digital Signature Digital Signature Certificates Penalties & Adjudication Cyber Appellate Tribunal Cyber Crime Scope References
Objectives
To grant legal recognition to transactions carried out through electronic data interchange and other means of electronic communication commonly referred to as electronic commerce replacing the paperbased communication To give legal recognition to Digital Signature for authentication of any information or matter which requires authentication under any law To facilitate electronic filing of documents with Government Departments
Objectives
To facilitate electronic data storage; To facilitate and give legal sanction to electronic funds transfers between banks and financial institutions; To give legal recognition for keeping of books of account by Bankers in electronic form; To amend the Indian Penal Code, the Indian Evidence Act, 1872; the Bankers Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934.
e-Governance
The use by government agencies of the information technologies (IT) to improve and transform relations with the citizens, businesses and other arms of the government for availing services to its citizens, and providing them an efficient way of complying with the norms/rules/regulations set by the government, is known as e-governance
Goals of e-Governance
The goals of e-Governance are:
better service delivery to citizens Ushering in transparency and accountability Empowering people through information Improved efficiency within Governments
News Headlines
SSA's e-governance pilot project launched in Coimbatore E-registration facility for sales tax launched by UT MHA launches project to create database of crimes, criminals Direct Cash transfer
Economic
Securities
ISSUES
Political will Power Social
Infrastructure
Objectives
Provide friendly and efficient interface between government and citizens
A citizens concern
Different branches for different services Not familiar with the procedures Has to frequently visit the branch to ensure movement of the case and to enquire the status Services are not delivered as scheduled Has to visit many offices for a single service Small payments require visiting banks for services
Simplified architecture
Section 9:Sections 6,7 and 8 not to confer right to insist document should be accepted in electronic form.
Objectives
Bridge the digital divide Providing information regarding local resources,local demographic parameters, Internet connectivity and services delivery to citizen. Enabling a platform for interaction. Distance learning programme.
Generation opportunities
of
employment
A citizen's concerns
Unaware of the schemes being implemented for economically backward people. Low level of literacy. Feel uncomfortable while using the facilities. Not aware of source of information. Concern related to market. No information on Educational opportunities. No information on Job.
Solution
Solution in the form of CIC: Government to Citizen(G2C) services delivered from the CICs such as Birth and Death Registration Prices and other market information of Agricultural produce Information on Educational opportunities Job portals etc. Effective and cheap medium for reaching the masses. Know Your CIC helped to reduce corruption. Motivation and awareness camps for different purposes.
Impact of E-Governance
Promotes Inclusion of Citizens Fosters Cutting process costs.
Manages
Process
Encourages Empowerment
Conclusion
The ability of Central government to understand all needs from ordinary local citizens is limited. Therefore, the participation of citizens in local level is extremely important. The true e-governance should be attained by interaction of citizens both with central and local government. This can shift the paradigm of the EGovernance in to success.
DIGITAL SIGNATURE
WHAT IS DS ?
A Digital Signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Asymmetric Cryptography Key Pair (i)Private key of the subscriber used for signing. (ii)Public key of the subscriber used for verification of DS
Components of DS
Customers public key , name and e-mail address Expiration date of the public key Name of the company Serial number of the Digital ID
How it Works
SENDERs END :- Copy and paste document Special software(Encryption) Private Key RECEIVERs END :- Receives the document Special software(Decryption) Public Key If everything matches, he will be able to view the document
How It Works
Characteristics of DS
It ensures 3 specific security requirements include: AUTHENTICATION: The process of proving one's identity. INTEGRITY: Assuring the receiver that the received message has not been altered in any way from the original. NON-REPUDIATION: A mechanism to prove that the sender really sent this message.
Capable of identifying such subscriber Exclusive control of the subscriber If electronic record were altered , the digital signature would be invalidated
ADVANTAGES OF DS
It is portable It cannot be copied It is prompt It reduces time and cost It completes transaction securely
DS FORGERY CASE
INDIA:Hassan: Tahsildar K Mathai has issued showcause notices to three government officials for allegedly forging the signature of the tahsildar and issuing landholding certificate (LHC), which is not in their power According to the rules only a tahsildar has the right to put the signature on a LHC, which, he added, should be a digital signature.
Issuance of DSC
Certifying Authority to issue DSC on receipt of Form Fees different fees may be prescribed for different classes of applicants, Max Rs 25,000 Other mandates private key corresponding to the public key of DSC private key capable of creating a DSC Complied with the provisions of IT ACT and the rules and regulations Information contained in the DSC is accurate
Revocation of DSC
Certifying Authority may revoke a DSC issued by it upon subscriber request upon the death of the subscriber upon the dissolution or winding up of company Subject to the provisions of sub-section false or concealed fact represented in the DSC requirement for issuance of the DSC was not satisfied
Suspension of DSC
May be suspended
If its in public interest On receipt of a request to that effect from
the subscriber any person duly authorised to act on behalf of that subscriber On suspension of DSC the Certifying Authority shall communicate the same to the subscriber DSC shall not be suspended for a period exceeding 15 days unless the subscriber has been given an opportunity of being heard in the matter
DUTIES OF SUBSCRIBERS
DUTIES OF SUBSCRIBERS
Generating key pair Control of private key Acceptance of Digital Signature Certificate
Acceptance of DSC
(1) A subscriber shall be deemed to have accepted a DSC if he publishes or authorises the publication of a DSC
to one or more persons in a repository, or otherwise demonstrates his approval of the Digital Signature Certificate in any manner
all information in the DSC that is within the knowledge of the subscriber is true
in the DSC has been compromised, then, the subscriber shall communicate the same without any delay to the Certifying Authority in such manner as may be specified by the regulations
DS FRAUD CASE
ITALY : - A Rome businessman discovered all his companys shares had been registered without his knowledge to a man named David, who has appointed himself as sole director of the company. - By means of the activation of an electronic smart card with a digital signature
CASE : Baazee.com
Facts of the case Avnish Bajaj, CEO of Baazee.com, was arrested for distributing cyber pornography. Someone had sold copies of a pornographic CD through the Baazee.com website. Factors considered by the court 1. No evidence that Mr. Bajaj directly or indirectly published the pornography 2. The actual obscene recording could not be viewed on Baazee.com 3. The sale consideration was not routed through the accused Issues raised by the Defence Contended that mere listing could not be construed as crime under Section 67 of the Information Technology Act 2000. Decision of the court The court granted bail to Mr. Bajaj subject to furnishing two sureties of Rs. 1 lakh each.
Legal consequences This incident brought to light the inefficiency of the I-T Act, 2000 and the need to amend was felt. Need to define the corporate liability for data protection and information security at the corporate level was felt. Section 43-A : dealing with compensation for failure to protect data was introduced in the ITAA -2008.
To break it down..
Cyber - A prefix that means "computer" or "computer network" Regulation - A principle, rule, or law designed to control or govern conduct
Appellate - Having the power to hear court appeals and to review court decisions
Tribunal - A committee or board appointed to adjudicate in a particular matter. In other words, something that has the power to determine or judge
Introduction
Established under the protection of Controller of Certifying Authorities (C.C.A.) In accordance with the provisions contained under Section 48(1) of the IT Act. Has been set up to hear appeals arising out of decisions of Adjudicating Officers. Has the same powers as are vested in a civil court under the Code of Civil Procedure, 1908. The Tribunal is also guided by the principles of natural justice.
History
Initially known as Cyber Rgulations Appellate Tribunal (CRAT). Started functioning from October, 2006 in a portion of the DIT building at CGO Complex, Lodhi Road, New Delhi. Honble Mr. Justice R.C. Jain, a retired Judge of Delhi High Court was the first Presiding Officer. The CRAT after the amendment of the IT Act in the year 2008 is known as the Cyber Appellate Tribunal (CAT).
Filling up of Vacancy
If, for reason other than temporary absence, any vacancy occurs in the office of the Presiding Officer of a Cyber Appellate Tribunal, then the Central Government shall appoint another person in accordance with the provisions of this Act to fill the vacancy and the proceedings may be continued before the Cyber Appellate Tribunal from the stage at which the vacancy is filled.
Challenges faced
To strike a balance between the interests of the Government and end users of Internet Intermixing of legal and technical issues, an appropriate multi-member Tribunal has to be constituted to look into the cyber contraventions Red Tape mesh problem: (a)High court judge retired at 62 (b) Left with only a 3 year term to serve his office
Current Scenario
For about a year and a half now, the 12-member staff at Indias Cyber Appellate Tribunal is forced to adjourn cases, as it has no chairperson to pass judicial orders. Happened due to the expiration of term of Sri Rajesh Tandon on 30th June 2011 due to his attaining the age of superannuation. Cases related to internet fraud in ICICI Bank, Punjab National Bank and cyber crime in IIIT Allahabad are pending at CAT. Cases relating to objectionable content against internet giants, like Google and Facebook, are being filed in courts having little or no experience in delivering justice in cyber crimes. Government needs to realize the importance of Cyber Appellate Tribunal and appoint a chairperson as soon as possible.
Cyber Crime
Word-Meaning
Crime :
Harmful act or omission against the public which the State wishes to prevent and which, upon conviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country
Cyber Crime :
Unlawful acts wherein the computer is either a tool or target or both
Classification of Cyber-Crimes
Harassment via E-Mails or Social Network Cyber-Stalking Dissemination of Obscene Material Defamation Hacking Spoofing
Online Gambling
Financial crimes Forgery
Section 72: Breach of confidentiality and privacy Section 73: Penalty for publishing Digital Signature Certificate false in certain particulars Section 74: Publication for fraudulent purpose Section 75: Act to apply for offences or contravention committed outside India Section 76: Confiscation Section 77: Penalties and confiscation not to interfere with other punishments Section 78 : Power to investigate offences
Section 66A : Sending offensive messages through communication service, causing annoyance etc through an electronic communication or sending an email to mislead or deceive the recipient about the origin of such messages (commonly known as IP or email spoofing) are all covered here. Punishment for these acts is imprisonment upto three years or fine Section 66B : Dishonestly receiving stolen computer resource or communication device with punishment upto three years or one lakh rupees as fine or both. Section 66C : Electronic signature or other identity theft like using others password or electronic signature etc .Punishment is three years imprisonment or fine of one lakh rupees or both.
Section 66D : Cheating by personation using computer resource or a communication device. Punishment is an imprisonment for a term which extend to three years and shall also be liable to fine which may extend to one lakh rupees
Section 66E : Privacy violation or Publishing or transmitting private area of any person without his or her consent etc. Punishment is three years imprisonment or two lakh rupees fine or both Section 66F : Cyber terrorism Intent to threaten the unity, integrity, security or sovereignty of the nation and denying access to any person authorized to access the computer resource or attempting to penetrate or access a computer resource without authorization or attempts for computer containment are dealt with in this section.Punishment is life imprisonment
Section 69A : Power to issue directions for blocking for public access of any information through any computer resource
Section 69B : Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security
Amendment to Section 72
Section 72A has been introduced for data protection purpose. It provides for punishment for disclosure of information in breach of lawful contract. Imprisonment of 3 years or fine upto Rs 5 lakhs or both for cases relating to data breach has been provided.
Section 73 : Penalty for publishing Digital Signature Certificate false in certain particulars
(1) No person shall publish a Digital Signature Certificate or otherwise make it available to any other person with the knowledge that-
(a) the Certifying Authority listed in the certificate has not issued it; or
(b) the subscriber listed in the certificate has not accepted it; or
(c) the certificate has been revoked or suspended, unless such publication is for the purposes of verifying a digital signature created prior to such suspension or revocation.
(2) Any person who contravenes the provisions of subsection (1) shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
Section 77: Penalties and confiscation not to interfere with other punishments
No penalty imposed or confiscation made under this Act shall prevent the imposition of any other punishment to which the person affected thereby is liable under any other law for the time being in force
Amendments to Section 77
Section 77 A: Compounding of Offences:
(1)A Court of competent jurisdiction may compound offences other than offences for which the punishment for life or imprisonment for a term exceeding three years has been provided under this Act Provided that the Court shall not compound such offence where the accused is by reason of his previous conviction, liable to either enhanced punishment or to a punishment of a different kind Provided further that the Court shall not compound any offence where such offence affects the socio-economic conditions of the country or has been committed against a child below the age of 18 years or a woman
(2) The person accused of an offence under this act may file an application for compounding in the court in which offence is pending for trial and the provisions of section 265 B and 265 C of Code of Criminal Procedures, 1973 shall apply
Scope
This Act is applicable to whole of India, unless otherwise provided in the Act. It also applies to any offence or contravention there under committed outside India by any person.
The Act shall not apply to the following: A negotiable instrument as defined in Section 13 of the Negotiable Instruments Act, 1881; A power - of - attorney as defined in Section 1A of the Powers of-Attorney Act, 1882. A trust as defined in Section 3 of the Indian Trusts Act, 1882. A will as defined in Section (h) of Section 2 of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called. Any contract for the sale or conveyance of immovable property or any interest in such property. Any such class of documents or transactions as may be notified by the Central Government in the Official Gaze
References
www.tcs-ca.tcs.co.in/pdf/IS_Government.pdf www.tcs-ca.tcs.co.in/pdf/E-Returns-Government.pdf www.egov.mit.gov.in http://ijedict.dec.uwi.edu//viewarticle.php?id=332&lay out=html http://www.riseproject.eu/_fileupload/RISE%20Confer ence/Presentations/Vinayak%20Godse.pdf http://articles.economictimes.indiatimes.com/2012-0420/news/31373888_1_cyber-crimes-chairperson-cyberappellate-tribunal http://deity.gov.in/sites/upload_files/dit/files/downloa ds/itact2000/itbill2000.pdf http://indiankanoon.org/doc/1965344/
THANK YOU