It act 2000 ppt. IT_Act_2000_.ppt 2022-10-27

It act 2000 ppt Rating: 8,6/10 1326 reviews

The Information Technology Act, 2000 (IT Act 2000) is a comprehensive legal framework in India that regulates electronic commerce and other forms of electronic communication. It was enacted by the Indian Parliament in 2000 and came into force on October 17, 2000.

The main objective of the IT Act 2000 is to provide legal recognition to electronic documents and digital signatures, as well as to facilitate electronic filing of documents and electronic transfer of money. The Act also aims to establish a legal framework for the use of electronic records and digital signatures in various activities, such as electronic commerce, electronic governance, and electronic banking.

The IT Act 2000 defines electronic records as any data, record, or information generated, transmitted, received, or stored in digital form. It also defines digital signatures as an electronic method of authentication that uses a combination of a public key and a private key to verify the authenticity of an electronic document.

One of the major provisions of the IT Act 2000 is the legal recognition of electronic documents and digital signatures. This means that electronic documents and digital signatures are given the same legal recognition as physical documents and handwritten signatures. This provision is important because it allows for the use of electronic documents and digital signatures in various legal and commercial transactions, such as the sale of goods and services, the execution of contracts, and the transfer of assets.

Another significant provision of the IT Act 2000 is the establishment of a legal framework for electronic commerce. The Act defines electronic commerce as the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network. It also provides for the regulation of electronic payment systems, such as credit card transactions and electronic banking.

In addition to regulating electronic commerce, the IT Act 2000 also provides for the regulation of electronic governance. This includes the use of electronic records and digital signatures in government transactions, such as the filing of tax returns and the submission of applications for various government services.

The IT Act 2000 also establishes a cybercrime and cybersecurity framework in India. It provides for the punishment of various types of cybercrimes, such as hacking, cyberstalking, and identity theft. It also establishes a Cyber Appellate Tribunal to hear appeals related to cybercrimes and disputes arising from electronic transactions.

In summary, the IT Act 2000 is a comprehensive legal framework in India that regulates electronic commerce, electronic governance, and electronic communication. It provides legal recognition to electronic documents and digital signatures, and establishes a legal framework for electronic transactions and the use of electronic records and digital signatures in various activities. It also provides for the regulation of electronic payment systems and the punishment of cybercrimes.

information technology act childhealthpolicy.vumc.org

it act 2000 ppt

A sound enforcement machinery: A law might have been properly enacted and may be theoretically effective too but it is useless unless enforced in its true letter and spirit. Under the IT Act, 2000, it shall now be possible for corporate to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The Computer as a Weapon Using a computer to commit real world crimes. To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934 CHAPTERS INCLUDING IT ACT1. Various Objectives of IT ACT 2000 Chapter-II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature.

Next

IT_Act_2000_.ppt

it act 2000 ppt

Cyber law defined as a though full group conversation about core values and distinct benefits to the society will persist. Offences Tampering with computer source documents — 3 years imprisonment, or fine of Rs. Digital Signature Very brief authorization for use of digital signatures for electronic records 3. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance. Any subscriber may authenticate an electronic record by affixing his digital signature.


Next

5,000+ It Act 2000 PPTs View free & download

it act 2000 ppt

To facilitate electronic filing of documents with Government agencies and E-Payments. REGULATION OF CERTIFYING AUTHORITIES chapter 6 of IT ACT 2000 Appointment of Controller and other officers. Trojan AttackThe program that act like something useful but do the things that are quiet damping. Simply speaking cyber law is a generic term which refers to all the legal and regulatory aspects of internet and the world wide web. Need for Cyberlaw Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace.

Next

IT ACT childhealthpolicy.vumc.org

it act 2000 ppt

E-mail related crimesEmail Spamming Sending malicious codes through email Email bombingSending threatening emails Defamatory emails Email frauds Denial of Service attacksFlooding a computer resource with more requests than it can handle. Recognition of foreign Certifying Authorities 20. Chapter-VII of the Act details about the scheme of things relating to Digital Signature Certificates. Electronic governanceAttribution, acknowledgement and dispatch of electronic records Secure electronic records and secure digital signature 6. This present state of the Internet make the necessity of Cyberlaws more important.

Next

IT ACT 2000

it act 2000 ppt

Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities. It eases the task of companies of the filing any form, application or document by laying down the guidelines to be submitted at any appropriate office, authority, body or agency owned or controlled by the government. Justice Dispensation System for cyber crimes. Public Key: The public key. Issuer: The entity that verified the information and issued the certificate. Network Service Providers not to be Liable in Certain Cases If offence committed without his knowledge or due diligence was exercised. It is mainly based on the UNCITRAL Model law.


Next

Information Technology Act,2000 Ppt

it act 2000 ppt

Bankers book evidence act 1891Reserve Bank of India Act 1934 DIGITAL SIGNATURE A broader term that refers to any electronic data that carries the intent of a signature but not all electronic signatures use digital signatures. Based on a complaint made by the victim in Feb 2004,the Police traced the accused to Mumbai and arrested him, The accused was a known family friend of the victim and was reportedly interested in marrying her. Valid-To: The expiration date. CONT Key-Usage: Purpose of the public key e. Digital Signature Certificates Who can issue Digital Certificates, and what they should contain and rules for revocation 8. Various Objectives of IT ACT 2000 Chapter-IX of the said Act talks about penalties and adjudication for various offences. The penalties for damage to computer, computer systems etc.

Next

Cyber Law & It Act 2000

it act 2000 ppt

It is a generic term, which denotes all aspects, issues and the legal consequences on the Internet, the World Wide Web and cyber space. Its also known as Cyber Law. Chapter-XI of the Act talks about various offences and the said offences shall be investigated only by a Police Officer not below the rank of Deputy Superintendent of Police. The keys are provided by regulating authorities and are unique. Preliminary Digital signature 3. Thumb print Algorithm: The algorithm used to hash the public key.


Next

it act 2000 ppt

India was the 12th country to enact an act related to cyber laws. Thumb print: The hash itself, used as an abbreviated form of the public key. Computer related crimes under IPC Sec 503- Sending messages by threatening e-mails. SCHEDULES Acts which amended for IT ACT 1. A sound judicial system: A sound judicial system is the backbone for preserving the law and order in a society. CONTENTS OF A TYPICAL DIGITAL CERTIFICATE Serial Number: Used to uniquely identify the certificate. GROUP NO : 7 SANIYA ALAVI SWATHI K T IRSHAD.

Next