Documente Academic
Documente Profesional
Documente Cultură
48 57 18 8 39
An Act to provide legal recognition for transactions carried out by means of electronic data interchange.
It came in to effect on 17-10-2000 It have 13 chapters and 4 schedules. Heavy penalty can be imposed for those indulging computer crimes and hacking.
India was the 12th country to enact an act related to cyber laws.
Legal Recognition for transactions. Offenses and Contraventions. Justice Dispensation System for cyber crimes. To facilitate electronic filing of documents with Government
To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of
3.
4. 5.
Electronic governance
Attribution, acknowledgement and dispatch of electronic records Secure electronic records and secure digital signature
6.
7. 8.
9.
10. 11.
( CONT)
12. 13.
1. 2.
3.
4.
DIGITAL SIGNATURE
A broader term that refers to any electronic data that carries the intent of a signature but not all electronic signatures use digital signatures.
Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery and tampering.
Any subscriber may authenticate an electronic record by affixing his digital signature.
( CONT)
Private key is allocated to an individual which enables the user to fix a digital signature.
Appointment of Controller and other officers. Functions of Controller Recognition of foreign Certifying Authorities License to issue Digital Signature Certificates Application for license Renewal of license Procedure for grant or rejection of license Suspension of license Display of license Surrender of license
It is an electronic document that uses a digital signature to bind a public key with an identity information such as the name of a person or an
Also known as a Digital Certificate or Identity Certificate. Any person may make an application to the Certifying Authority for issue
The Certifying Authority has to ensure that the subscriber holds the
private key corresponding to the public key listed in the Digital Signature Certificate.
( CONT)
Key-Usage: Purpose of the public key (e.g. decipherment, signature, certificate signing...).
Public Key: The public key. Thumb print Algorithm: The algorithm used to hash the public key. Thumb print: The hash itself, used as an abbreviated form of the public key.
purposes.
Class 1 : This certificates shall be issued to individuals and private subscribers.
PENALTIES
( Chapter 9 of IT ACT )
OFFENCES
(Chapter 11 of IT ACT 2000 )
CYBERCRIMES
The Computer as a Weapon Using a computer to commit real world crimes. Eg : Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornographies, etc..
Sec 503- Sending messages by threatening e-mails. Sec 499, 500- Sending defamatory messages through e-mails. Sec 463, 470, 471- Forgery of Electronic records.
THE END
Thank You