Documente Academic
Documente Profesional
Documente Cultură
TECHNOLOGY
ACT, 2000
Tushar Gataum
Archit Sharma
Riddhisha Rane
I060
I062
Varsha Sharma
I072
M069
Purab Morwal
M068
INTRODUCTION
The United Nations Commission on International
OBJECTIVES
DEFINITIONS
DIGITAL SIGNATURE :- Authentication of any electronic
AFFIXING
A statement
issued by a Certifying Authority to specify the practices that
the Certifying Authority employs in issuing Digital Signature
DEFINITIONS
ELECTRONIC
PROVISIONS
Digital Signature
Recognition of Electronic Document
Formation of Contract
Data Protection
Offences and Penalties
Digital Signature
Digital Signature
3A. Electronic Signature.
(1)Notwithstanding anything contained in section 3, but
subject to the provisions of subsection
(2)a subscriber may authenticate any electronic record
by
such
electronic
signature
or
electronic
authentication technique which(a) is considered reliable ; and
(b) may be specified in the Second Schedule
Recognition of Electronic
Document
4. Legal Recognition of Electronic Records.
Where any law provides that information or any other
matter shall be in writing or in the typewritten or
printed
form,
then,
notwithstanding
anything
contained in such law, such requirement shall be
deemed to have been satisfied if such information or
matter is(a) rendered or made available in an electronic form;
and
(b) accessible so as to be usable for a subsequent
reference.
Formation of Contract
10A. Validity of Contracts Formed Through Electronic Means.
Where in a contract formation, the communication of
proposals, the acceptance of proposals, the revocation of
proposals and acceptances, as the case may be, are
expressed in electronic form or by means of an electronic
record, such contract shall not be deemed to be
unenforceable solely on the ground that such electronic
form or means was used for that purpose.
Formation of Contract
In case the parties involved in an agreement have not
Data Protection
The amendment to the IT Act, 2000 has provided for the protection of
Data Protection
The
Offences
Section 43 of the Act gives a description of all IT related
offences.
43. Penalty and compensation for damage to computer,
computer system, etc. - If any person without
permission of the owner or any other person who is
in-charge of a computer, computer system or
computer network1.
2.
3.
Offence
or causes to be damaged any computer;
sdamages
disrupts or causes disruption of any computer;
4.
5.
6. denies
Penalty
Section 66 prescribes the penalty for the offences
Amendments: 2008
SECTIO
N
CHANGE
66
66A
66B
66C
66D
66E
stolen
computer
Four call centre employees obtained PIN codes from four customers of
The call centre employees opened new accounts at Indian banks using
false identities
They used the PINs and account information to transfer money from the
bank
Arrests were made when those individuals attempted to withdraw cash
E-mail spoofing
Spamming
Defamation
Cyber stalking
AGAINST
INDIVIDUA
LS
Computer vandalism
Intellectual Property crimes
Internet time thefts
AGAINST
PROPERT
Y
Unauthorized access
of computer system
Denial of service
Logic bomb
Distribution of
pirated software etc
Pornography
(basically child
pornography)
Financial crimes
Web jacking
Forgery
AGAINST
ORGANIZATIO
NS
AGAINST
SOCIETY AT
LARGE
OBJECTIVES OF NASSCOM
Simplification of trade and business in software and
service industry.
To enhance cyber security.
Establish India as a hub for innovation and professional
services
To maintain Indias leadership position as a safe place to
do business
Work with government to shape policy in all key areas of
activities such as skill development, trade and business
services
Provide platforms for members and other stakeholders to
work together.
Expand the countrys pool of relevant and skilled talent
and harness the benefits of ICT to drive inclusive and