Information Technology Act 2000

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

IT Act, 2000- Introduction

The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the
primary law in India for matters related to cybercrime and e-commerce.
• The act was enacted to give legal sanction to electronic commerce and electronic
transactions, to enable e-governance, and also to prevent cybercrime.
• Under this law, for any crime involving a computer or a network located in India, foreign
nationals can also be charged.
• The law prescribes penalties for various cybercrimes and fraud through digital/electronic
format.
• It also gives legal recognition to digital signatures.
• The IT Act also amended certain provisions of the Indian Penal Code (IPC), the Banker’s Book
Evidence Act, 1891, the Indian Evidence Act, 1872 and the Reserve Bank of India Act, 1934 to
modify these laws to make them compliant with new digital technologies.
• In the wake of the recent Indo-China border clash, the Government of India banned various
Chinese apps under the Information Technology Act. ‘TikTok, Other Chinese Apps Banned’.
Need and Objective of Information Technology Act

 To provide legal recognition for transactions


 Carried out by means of electronic data interchange, and other means
of electronic communication, commonly referred to as "electronic
commerce“
 To facilitate electronic filing of documents with Government agencies
and E-Payments
 To prevent cybercrimes.
 To amend the Indian Penal Code, Indian Evidence Act,1872, the
Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
Cyber Crime
 Cybercrime refers to illegal activates that involve the use of a
computer network, or other digital devices.
 The primary goal of these crimes is often to generate profit for the
criminals or to cause harm to individuals or computer systems.
Types of Cybercrimes
Most cybercrime falls under two main categories:
 Criminal activity that targets computers.
 Criminal activity that uses computers.

Cybercrime that targets computers often involves malware like viruses.

Cybercrime that uses computers to commit other crimes may involve


using computers to spread malware, illegal information or illegal
images.
Types of Cybercrimes
 Cyber Hacking
 Identity Theft
 Cyber Bullying
 Cyber Terrorism
 Intellectual Property Theft
 Online Scams
 Malware Attacks
Penalties
 The Information Technology Act 2000(IT Act), has been active since
17th October 2000, with a major amendment in 2008.
 According to this, the person committing cybercrime has to face the
punishment of imprisonment for 3 years, and bear a fine of 5 lakh.
Cyber space
• The complex environment resulting from the interaction of people,
software and services on the Internet by means of technology devices
and networks connected to it, which does not exist in any physical
form.
• An example of cyberspace is the home of Facebook, Yahoo, and
Google where everything works in a virtual environment.
Encryption & Decryption
• Encryption is the process by which a readable message (plaintext) is
converted to an unreadable (ciphertext) form to prevent
unauthorized parties from reading it.
• Encryption is the process of converting simple data into a coded one

• Decryption is the process of converting an encrypted message back to


its original (readable) format i.e., the ciphertext is converted into plain
text.
• The original message is called the plaintext message.
Encryption Decryption
It is a method of transforming a It is a method of transforming
plain or clear text into ciphertext ciphertext into plain or clear text.
using a key.
Process of encryption takes place Process of decryption takes place at
at the sender’s end. the receiver’s end.
The encrypted data is called Decrypted data is called Plain text.
Ciphertext.
A public key or secret key is used in A secret key or private key is used in
the process of Encryption. the process of Decryption.
In encryption the sender sends the In decryption, the receiver decodes
data once it is encrypted. the data once it is received.
Private Key and Public Key
Private Key:
In the Private key, the same key (secret key) is used for encryption and
decryption.

Public Key:
In a Public key, two keys are used one key is used for encryption and
another key is used for decryption
Digital Signature / Digital Signature Certificate
 Conventional signatures are the marks made by persons to authenticate a
document, and assure the receiver that he has signed it personally.
 Wide spread use of internet has resulted in cyber crimes which mandated
for stringent legislation for protecting the users from the crimes associated
with internet.
 At this juncture Digital signature is one of the various measures introduced
by IT Act, 2000 to curb the fraudulent use of technology. Hence, the
concept of digital signature has come up. The online transaction requires
unique and strong protection which is served by electronic signature.
 Hand written signature is prone to forgery and tampering and this
limitation can be overcome by digital signature to a greater extent.
 Digital signature is a mathematical scheme to verify the
authenticity of digital documents or messages.
 Digital Signature under Information Technology Act, 2000 –
primary law in India dealing with cyber crime and e-commerce.
 According to the Information Technology Act, 2000, digital
signatures mean authentication of any electronic record by a
subscriber by means of an electronic method or procedure in
accordance with the provisions of section 3.
 Further, the IT Act, 2000 deals with digital signatures under
sections 2, 3 and 15

You might also like