This document provides an overview of India's Information Technology Act with sections covering digital signatures, hacking, cybercrimes, and data privacy. It discusses cases related to freedom of expression, credit card fraud, and exam impersonation. The role of organizations like NASSCOM in the IT industry is also outlined. Overall, the document covers key concepts and sections of the IT Act 2000 while providing examples of cybercrimes and technology use in areas like banking.
4. IT ACT 2000
Ensure legal infrastructure for e-commerce within
India.
Chapters : Different chapters in the act
Objectives : To provide legal Framework .
Establish a Regulatory body
6. Digital Signature
A way to ensure that an electronic document (e-
mail, spreadsheet, text file, etc.) is authentic.
Authentic - you know who created the document and
you know that it has not been altered in any way since
that person created it.
Types:
Class-1 certificates
Class-2 certificates
Class-3 certificates
7. Electronic Signature
An electronic signature is a typed name or a digitized
image of a handwritten signature.
It is an electronic indication to agree to or approve the
contents of a document.
Uses of an Electronic Signature
Sign contracts, invoices, and work orders
Approve project estimates and change orders
Sign school forms and permission slips
Complete and sign leases and rental agreements
Sign NDAs and client agreements
Sign bank documents and insurance forms
8. Electronic Governance
Use of Internet, LAN, mobiles etc. by Government
to improve the effectiveness, efficiency, service
delivery and to promote democracy
Uses of E-governance
To have access to public documents.
For making online payments of various bills and
dues.
To file statutory documents online.
10. 43A - Compensation for failure to protect
data
Responsibility on persons (including companies)
handling sensitive personal data for protection of data.
Reasonable Security Practices
Security initiatives
Awareness Training
Conformance to Standards, certification
Policies and adherence to policies
Policies like password policy, Access Control, email
Policy etc
Periodic monitoring and review
Adjudication & its role
11. Section 66
Hacking with Computer System
Hacking is committed by
Whoever with the intent of causing damage
Alters any information
Person committed hacking is
imprisonment up to three years
fine up to two lakh rupees
Or Both
13. Section 66 F
Whoever intends to threaten the
unity, integrity, security or soverginity of India to
strike terror among the people by an unauthorised
access to computer system
Punishment
Imprisonment which may extend to life
14. Section 69
It empowers the government to intercept, monitor any
information generated, transmitted, received or stored in
any computer resource that may be related to integrity of
India, Security of India or any state, friendly relations with
Foreign States, etc.
16. Section 67
It deals with publishing or transmitting obscene
material in electronic form
Pornography and obscene
information
Pornography being not illegal
17. Cyber Crimes
Term for any illegal activity that uses a
computer as its primary means of
commission.
Its is not a physical attack but a virtual
attack
18. Some types of Cyber Crimes
Hacking
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
Software Piracy
Cyber Pornography
24. Role of IT in banking
Information Technology
Opened up new markets , products , and services .
Increased speed and reliability of financial operation .
Met ever increasing demands of customers by providing an instant
anytime anywhere service .
Provided solutions to take care of accounting and back office
work .
25. Products offered to
Customers
Net Banking
Credit Card Online
Insta Alerts
Phone Banking / Mobile Banking
e-Monies Electronic Fund Transfer / e-
Cheques
Online Payment of Excise & Service
Tax
Card to Card Funds Transfer
28. Case Studies
True Caller
Allows users to look up for anonymous mobile and
landline numbers on the web or on their Internet-enabled
mobile
True Callers database has been hacked by Syrian
Electronic Army hackers.
Hackers downloaded more than 7 databases of 450GB in
size.
The issue with the app is that a person is not in control if
their number is being shared on the service by one of their
29. 10 million Jan 2013
20 million users globally Feb 2013
30. RS 400 MILLION SMS SCAM
Nadar brothers along with Gala allegedly took help
of SMS technology and launched the first-of-its-
kind SMS fraud in India.
Launched an advertisement campaign - "Nothing
is impossible. The word itself is: I M Possible.
Earn Rs 10000/pm & deposit Rs 500
www.getpaid4sms. Com
31. NMIMS
6 peoele identified for having impersonated 87
candidates in the (NMAT) held from October 11 to
December 19, 2012
Employed a dummy candidate to take the test in
place of the student
students scored 220 marks or above in NMAT
More than Rs 13 crore changed hands in the
process.
33. Territorial Jurisdiction is a major issue
which is not satisfactorily addressed in
the ITA or ITAA
Awareness
Computer forensics Labs
34. Conclusion
India needs a good combination of laws and
technology, in harmony with the laws of other
countries and keeping in mind common security
standards. In the era of e-governance and e-
commerce, a lack of common security standards
can create havoc for global trade as well as
military matters.