information technology act 2000
TRANSCRIPT
![Page 1: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/1.jpg)
![Page 2: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/2.jpg)
![Page 3: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/3.jpg)
INFORMATION TECHNOLOGY ACT
![Page 4: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/4.jpg)
INTRODUCTION
Bill was passed in the budget session of 2000
And signed by President K.R Narayan on 9th May 2000
The bill was finalized by group of offices headed by Minister Of Information Technology Pramod Mahajan
![Page 5: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/5.jpg)
IT ACT 66: HACKING WITH COMPUTER
Hacking: It is the practice of modifying the features of a system in order to accomplish a goal outside of the creators original purpose.
Computer Hacking: It is the practice of modifying computer hardware and software to accomplish a goal outside of creators original purpose.Example:
![Page 6: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/6.jpg)
EFFECTS OF HACKING
• Damage to information
• Theft of information
• Business secrets could be stolen sold to competitors
• Compromise/damage of systems
![Page 7: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/7.jpg)
IT ACT 66E: PUBLISHING PRIVATE IMAGES Intentionally or knowingly
captures, publishes or transmits the images.
Under circumstances violating the privacy of that person
Imprisonment - three years or with fine not exceeding two lakh rupees, or both.
![Page 8: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/8.jpg)
For the purpose of this Section:
1. Transmit 2. Capture 3. Private Area 4. Publishes 5. Under Circumstances Violating PrivacyI. He or she could disrobe in privacy,
without being concerned that an image of his private area was being captured.
II. Any part of his or her private area would not be visible to the public.
![Page 9: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/9.jpg)
SECTION 66CPUNISHMENT FOR IDENTITY THEFT
Phishing email – Disguises - as the real banker and uses the unique identifying feature of the bank or organization , say Logo, trademark etc.
Fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature
Imprisonment - 3 years
Rupees one lakh!
![Page 10: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/10.jpg)
CASE STUDY
* 2007-The CEO - Identity theft protection company, Lifelock, Todd Davis’s
* Social security number was exposed by Matt Lauer on NBC’s Today Show.
* $500 cash advance loan.
* 4 months later-Albany,Georgia
![Page 11: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/11.jpg)
67 C: PRESERVATION & RETENTION OF INFORMATION BY INTERMEDIARIES
Preserve information . Duration . Central government prescribe . 5 year . 10 lakh rupee .
![Page 12: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/12.jpg)
CONCLUSION …
![Page 13: Information Technology Act 2000](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d3949cbb61ebc51d8b45d9/html5/thumbnails/13.jpg)