際際滷

際際滷Share a Scribd company logo
LAW
INFORMATION TECHNOLOGY ACT
Presented By
 Abhishek Seth 13001
 Chaitali Dhopatkar 13016
 Harmeet Dhindsa 13027
 Kinjal Jain
 Neetu Khatri 13045
 Rahul Jain 13052
 Rohit Dhanuka 13054
 Ronak Sangani 13056
 Ruchira Gaikwad 13058
 Salil Samant 13060
Introduction
CyberSpace:
Need
Purpose
IT ACT 2000
Ensure legal infrastructure for e-commerce within
India.
Chapters : Different chapters in the act
Objectives : To provide legal Framework .
Establish a Regulatory body
Terminologies
 Computer
 Computer System
 Communication Device
 Data
Digital Signature
A way to ensure that an electronic document (e-
mail, spreadsheet, text file, etc.) is authentic.
Authentic - you know who created the document and
you know that it has not been altered in any way since
that person created it.
Types:
 Class-1 certificates
 Class-2 certificates
 Class-3 certificates
Electronic Signature
An electronic signature is a typed name or a digitized
image of a handwritten signature.
It is an electronic indication to agree to or approve the
contents of a document.
Uses of an Electronic Signature
 Sign contracts, invoices, and work orders
 Approve project estimates and change orders
 Sign school forms and permission slips
 Complete and sign leases and rental agreements
 Sign NDAs and client agreements
 Sign bank documents and insurance forms
Electronic Governance
 Use of Internet, LAN, mobiles etc. by Government
to improve the effectiveness, efficiency, service
delivery and to promote democracy
Uses of E-governance
 To have access to public documents.
 For making online payments of various bills and
dues.
 To file statutory documents online.
Sections
43A - Compensation for failure to protect
data
 Responsibility on persons (including companies)
handling sensitive personal data for protection of data.
 Reasonable Security Practices
Security initiatives
Awareness Training
Conformance to Standards, certification
Policies and adherence to policies
Policies like password policy, Access Control, email
Policy etc
Periodic monitoring and review
 Adjudication & its role
Section 66
Hacking with Computer System
Hacking is committed by
 Whoever with the intent of causing damage
 Alters any information
Person committed hacking is
 imprisonment up to three years
 fine up to two lakh rupees
 Or Both
CITI Bank & Mphasis fund siphoning
Section 66 F
Whoever intends to threaten the
unity, integrity, security or soverginity of India to
strike terror among the people by an unauthorised
access to computer system
Punishment
 Imprisonment which may extend to life
Section 69
It empowers the government to intercept, monitor any
information generated, transmitted, received or stored in
any computer resource that may be related to integrity of
India, Security of India or any state, friendly relations with
Foreign States, etc.
Attack on parliament
Section 67
 It deals with publishing or transmitting obscene
material in electronic form
 Pornography and obscene
information
 Pornography being not illegal
Cyber Crimes
Term for any illegal activity that uses a
computer as its primary means of
commission.
Its is not a physical attack but a virtual
attack
Some types of Cyber Crimes
 Hacking
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
 Software Piracy
 Cyber Pornography
Cont..
 Credit Card Fraud
 Vishing
Case on Freedom of Expression  Azeem
Trivedi
Case on  Death of Shiv Sena Chief
Statistics
Law ppt   final
Role of IT in banking
Information Technology
Opened up new markets , products , and services .
 Increased speed and reliability of financial operation .
 Met ever increasing demands of customers by providing an instant
anytime anywhere service .
 Provided solutions to take care of accounting and back office
work .
Products offered to
Customers
 Net Banking
 Credit Card Online
 Insta Alerts
 Phone Banking / Mobile Banking
 e-Monies Electronic Fund Transfer / e-
Cheques
 Online Payment of Excise & Service
Tax
 Card to Card Funds Transfer
NASSCOM
What NASSCOM is?
Nasscom's Vision
Aims and Objectives
Partnership with the Government
NASSCOM INITIATIVES
INCLUDE:
 Domestic Market Initiative
 Education Initiative
 Security Initiative
 Women in Leadership-IT Initiative
Case Studies
True Caller
 Allows users to look up for anonymous mobile and
landline numbers on the web or on their Internet-enabled
mobile
True Callers database has been hacked by Syrian
Electronic Army hackers.
Hackers downloaded more than 7 databases of 450GB in
size.
The issue with the app is that a person is not in control if
their number is being shared on the service by one of their
 10 million  Jan 2013
 20 million users globally  Feb 2013
RS 400 MILLION SMS SCAM
 Nadar brothers along with Gala allegedly took help
of SMS technology and launched the first-of-its-
kind SMS fraud in India.
 Launched an advertisement campaign - "Nothing
is impossible. The word itself is: I M Possible.
 Earn Rs 10000/pm & deposit Rs 500
 www.getpaid4sms. Com
NMIMS
 6 peoele identified for having impersonated 87
candidates in the (NMAT) held from October 11 to
December 19, 2012
 Employed a dummy candidate to take the test in
place of the student
 students scored 220 marks or above in NMAT
 More than Rs 13 crore changed hands in the
process.
Recent News
 HYDERABAD
 VISAKHAPATNAM
 AURANGABAD
 CHENNAI
 GURGAON
 Territorial Jurisdiction is a major issue
which is not satisfactorily addressed in
the ITA or ITAA
 Awareness
 Computer forensics Labs
Conclusion
India needs a good combination of laws and
technology, in harmony with the laws of other
countries and keeping in mind common security
standards. In the era of e-governance and e-
commerce, a lack of common security standards
can create havoc for global trade as well as
military matters.

More Related Content

Law ppt final

  • 2. Presented By Abhishek Seth 13001 Chaitali Dhopatkar 13016 Harmeet Dhindsa 13027 Kinjal Jain Neetu Khatri 13045 Rahul Jain 13052 Rohit Dhanuka 13054 Ronak Sangani 13056 Ruchira Gaikwad 13058 Salil Samant 13060
  • 4. IT ACT 2000 Ensure legal infrastructure for e-commerce within India. Chapters : Different chapters in the act Objectives : To provide legal Framework . Establish a Regulatory body
  • 5. Terminologies Computer Computer System Communication Device Data
  • 6. Digital Signature A way to ensure that an electronic document (e- mail, spreadsheet, text file, etc.) is authentic. Authentic - you know who created the document and you know that it has not been altered in any way since that person created it. Types: Class-1 certificates Class-2 certificates Class-3 certificates
  • 7. Electronic Signature An electronic signature is a typed name or a digitized image of a handwritten signature. It is an electronic indication to agree to or approve the contents of a document. Uses of an Electronic Signature Sign contracts, invoices, and work orders Approve project estimates and change orders Sign school forms and permission slips Complete and sign leases and rental agreements Sign NDAs and client agreements Sign bank documents and insurance forms
  • 8. Electronic Governance Use of Internet, LAN, mobiles etc. by Government to improve the effectiveness, efficiency, service delivery and to promote democracy Uses of E-governance To have access to public documents. For making online payments of various bills and dues. To file statutory documents online.
  • 10. 43A - Compensation for failure to protect data Responsibility on persons (including companies) handling sensitive personal data for protection of data. Reasonable Security Practices Security initiatives Awareness Training Conformance to Standards, certification Policies and adherence to policies Policies like password policy, Access Control, email Policy etc Periodic monitoring and review Adjudication & its role
  • 11. Section 66 Hacking with Computer System Hacking is committed by Whoever with the intent of causing damage Alters any information Person committed hacking is imprisonment up to three years fine up to two lakh rupees Or Both
  • 12. CITI Bank & Mphasis fund siphoning
  • 13. Section 66 F Whoever intends to threaten the unity, integrity, security or soverginity of India to strike terror among the people by an unauthorised access to computer system Punishment Imprisonment which may extend to life
  • 14. Section 69 It empowers the government to intercept, monitor any information generated, transmitted, received or stored in any computer resource that may be related to integrity of India, Security of India or any state, friendly relations with Foreign States, etc.
  • 16. Section 67 It deals with publishing or transmitting obscene material in electronic form Pornography and obscene information Pornography being not illegal
  • 17. Cyber Crimes Term for any illegal activity that uses a computer as its primary means of commission. Its is not a physical attack but a virtual attack
  • 18. Some types of Cyber Crimes Hacking White Hat Hackers Black Hat Hackers Grey Hat Hackers Software Piracy Cyber Pornography
  • 19. Cont.. Credit Card Fraud Vishing
  • 20. Case on Freedom of Expression Azeem Trivedi
  • 21. Case on Death of Shiv Sena Chief
  • 24. Role of IT in banking Information Technology Opened up new markets , products , and services . Increased speed and reliability of financial operation . Met ever increasing demands of customers by providing an instant anytime anywhere service . Provided solutions to take care of accounting and back office work .
  • 25. Products offered to Customers Net Banking Credit Card Online Insta Alerts Phone Banking / Mobile Banking e-Monies Electronic Fund Transfer / e- Cheques Online Payment of Excise & Service Tax Card to Card Funds Transfer
  • 26. NASSCOM What NASSCOM is? Nasscom's Vision Aims and Objectives Partnership with the Government
  • 27. NASSCOM INITIATIVES INCLUDE: Domestic Market Initiative Education Initiative Security Initiative Women in Leadership-IT Initiative
  • 28. Case Studies True Caller Allows users to look up for anonymous mobile and landline numbers on the web or on their Internet-enabled mobile True Callers database has been hacked by Syrian Electronic Army hackers. Hackers downloaded more than 7 databases of 450GB in size. The issue with the app is that a person is not in control if their number is being shared on the service by one of their
  • 29. 10 million Jan 2013 20 million users globally Feb 2013
  • 30. RS 400 MILLION SMS SCAM Nadar brothers along with Gala allegedly took help of SMS technology and launched the first-of-its- kind SMS fraud in India. Launched an advertisement campaign - "Nothing is impossible. The word itself is: I M Possible. Earn Rs 10000/pm & deposit Rs 500 www.getpaid4sms. Com
  • 31. NMIMS 6 peoele identified for having impersonated 87 candidates in the (NMAT) held from October 11 to December 19, 2012 Employed a dummy candidate to take the test in place of the student students scored 220 marks or above in NMAT More than Rs 13 crore changed hands in the process.
  • 32. Recent News HYDERABAD VISAKHAPATNAM AURANGABAD CHENNAI GURGAON
  • 33. Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA Awareness Computer forensics Labs
  • 34. Conclusion India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards. In the era of e-governance and e- commerce, a lack of common security standards can create havoc for global trade as well as military matters.