Slides - Module 5
Slides - Module 5
Pramod Agrawal
1
• Accumulating information using computing devices
connected by some communication media
• Use of technology for:
• Computing;
• Storage;
• Retrieval; and
• Meaningful dissemination
of information
• Communication through:
• Wired
• Wireless
2
• The Information Technology Act, 2000 (ITA-2000)
was enacted with a view:
• to give a fillip to the growth of electronic based transactions,
• to provide legal recognition for e-commerce and e-
transactions,
• to facilitate e-governance,
• to prevent computer-based
crimes & ensure security
practices,
• legal recognition of electronic
documents & digital signatures
Numerous reasons:
• Extensive use of computers in banking & financial transactions
• Wide use of social media platforms
• All companies keeping their records in digital form
• Electronically filing of forms for any application
• Exponential use of plastic/digital money for shopping
• Communication thru Email, SMS etc.
• Purchasing of products thru E-commerce platforms
• Frequent use of Digital signatures and DSCs
• Pornography, viewing & creating obnoxious contents
3
• Following have started in full swing & become
common i.e. use of computers for payments:
• online banking frauds,
• credit card fraud,
• source code theft, virus attacks, phishing, email hijacking
• cyber sabotage, pornography bring malicious-ware
• denial of service (DOS),
• information hacking,
• online share trading frauds,
tax evasion etc.
4
• To provide legal recognition for transactions:
• Carried out by means of electronic data interchange (EDI),
and other means of electronic communication, commonly
referred to as "electronic commerce“.
• To facilitate electronic filing of documents with Government
agencies and E-Payments.
• The Act also provides for the constitution of the Cyber
Regulations Advisory Committee,
which shall advice the
government as regards
any rules, or for any
other purpose connected
with the said act.
5
• Helpful to promote e-commerce
• Enhance the corporate business through ICT
• High penalty for cyber crime
• Filling online forms
• Secure e-Transactions
• Record authentication
• Site legitimacy
• E-Record keeping
6
• EDI, EFT, E-Commerce
• Digital Signature & Secured Electronic records
• Electronic Documents, filing, storing and retrieval
• Certifying authorities issuing DSC, SSL etc.
• Penalties and adjudication
• Cyber regulations appellate tribunal
• Offences & Penalty
• E-Governance
• Encryption & Decryption
• Computer Source Code
• Cyber Terrorism
7
• The Indian Penal Code, 1860 was found insufficient to
cater to the needs of new crimes emerging from
Internet expansion. Even some of the traditional
crimes such as conspiracy, solicitation, securities,
fraud, espionage etc. are now being committed
through Internet which necessitates a new law to curb
them. It was in this background that the Information
Technology Act, 2000 was enacted in India for
prevention and control of cyber crimes.
8
• Trojan Attack
• The program that act like something useful but do the things that are
quiet damping. The programs of this kind are called as Trojans.
9
• Chapter-I (Definitions):
• "computer" means electronic, magnetic, optical or other
high-speed date processing device or system which
performs logical, arithmetic and memory functions by
manipulations of electronic, magnetic or optical impulses,
and includes all input, output, processing, storage, computer
software or communication facilities which are connected or
relates to the computer in a computer system or computer
network;
• "computer network" means the inter-connection of one or
more computers through-
• (i) the use of satellite, microwave, terrestrial lime or other
communication media; and
• (ii) terminals or a complex consisting of two or more interconnected
computers whether or not the interconnection is continuously
maintained;
10
• "electronic record" means date, record or date generated,
image or sound stored, received or sent in an electronic form
or micro film or computer generated micro file;
• “secure system” means computer hardware, software, and
procedure that-
• are reasonably secure from unauthorized access and misuse;
• provide a reasonable level of reliability and correct operation;
• are reasonably suited to performing the intended function; and
• adhere to generally accepted security procedures
11
• "originator" means a person who sends, generates, stores
or transmits any electronic message or causes any
electronic message to be sent, generated, stored or
transmitted to any other person but does not include an
intermediary;
• "subscriber" means a person in whose name the Digital
Signature Certificate is issued;
• "Act" means the Information Technology Act, 2000; (21 of
2000);
• "Agent" means a person duly authorized by a party to
present an application or reply on its behalf before the
Tribunal;
• "Application" means an application made to the Tribunal
under section 57;
12
• “Digital signature" means authentication of any electronic
record by a subscriber by means of an electronic method or
procedure ;
• "Digital Signature Certificate" means a Digital Signature
Certificate issued under subsection (4) of section 35;
• “Electronic form" with reference to information means any
information generated, sent, received or stored in media,
magnetic, optical, computer memory, micro film, computer
generated micro film or similar device
• “Key pair", in an asymmetric crypto system, means a
private key and its mathematically related public key, which
are so related that the public key can verify a digital
signature created by the private key;
• Electronics Records
attributed to originator:
• If it was sent by the
originator himself.
• By a person who had the
authority to act on behalf of
the originator in respect of
that electronic record
or
• By an information system
programmed by or on
behalf of the originator to
operate automatically.
13
• Acknowledgment of
receipt:
• Any communication by the
addressee, automated or
otherwise or
• Any conduct of the
addressee, sufficient to
indicate to the originator
that the electronic record
has been received.
• Where the originator has
stipulated that the
electronic record shall be
binding only on receipt of
an acknowledgement.
14
• Appointment of Controller &
other Officer (certifying officer):
• Central govt. may appoint no, of
deputy controllers and assistant
controllers as it deems fit.
• Controller shall perform the
functions assigned to them by the
controller under the general
superintendence and control of
the controller.
• The qualifications, experience
and T&C of service of controller
shall be such as may be
prescribed by the central govt..
• There shall be seal of controller.
• Functions of controller:
• Exercising supervision &
Certifying public keys
• Laying down the standards to be
maintained by the certifying
authorities.
• Specifying the contents of written,
printed or visual materials and
advertisement.
• Specifying the form and manner
in which accounts shall be
maintained.
• Specifying the T&C subject to
which auditors may be appointed.
15
• Duties of Subscribers:
• Generating key pair:
• The public key which
corresponds to the private key
of the subscribers which is to
be listed in the certificate
which the subscriber would
generate the key pair by
applying the security
procedure.
• Acceptance of digital
signature certificate:
• By accepting the certificate,
the subscriber certifies to all
who reasonably rely on the
information contained in the
certificate.
16
• Digital Signature:
• Subscriber authenticates
electronic record by digital
signature.
• Digital signature uses
asymmetric crypto system.
• Equivalent to handwritten
signature which acknowledges
• Digital Signature Certificate:
• Certifying Authority to issue
digital signature certificate.
• Notice for Suspension &
Revocation
• Offences:
• Tampering with computer source
document.
• Hacking protected computer
system.
• Publishing obscene information.
• Controller power & directions.
• Penalties:
• Penalty to damage computer
system & for misrepresentation
• Penalty for failure to furnish
information.
17
• Chapter-II (Digital Signature & Electronic Signature):
• Act specifically stipulates that any subscriber may authenticate
an electronic record by affixing his digital signature.
• Chapter III (Electronics Governance):
• This chapter explains the detail that aims to promote use of e-
governance electronic records and digital signatures
acceptability in Government and its agencies. It provides for filing
documents online with governmental authorities, grant of
licenses /approvals and receipt/payment of money.
• Chapter-IV (Acknowledgment of Electronic Rec.):
• This chapter gives for Regulation of CA. The Act envisages a
CCA who shall perform the function of exercising supervision
over the activities of the CA as also laying down standards and
conditions governing the CA as also specifying the various forms
and content of DSC
18
• Chapter VIII (Duties of Subscribers):
• The duties of subscribers regarding digital signature
certificate. It is the duty of subscriber to accept that all
information in digital signature certificate that is within his
knowledge is true
• Chapter-IX (Penalty and Adjudications):
• The penalties on offence for damage to computer, computer
systems etc. has been fixed as damages by way of
compensation.
• Chapter-X (The Appellate Tribunal):
• Establishment of the Cyber Regulations Appellate Tribunal,
which shall be an appellate body where appeals against the
orders passed by the Adjudicating Officers, shall be
preferred.
• Chapter-XI (Offences):
• It talks about various offences and the said offences shall be
investigated only by a Police Officer not below the rank of
Deputy Superintendent of Police. These offences include
tampering with computer source documents, publishing of
information, hacking which is obscene in electronic form.
• Chapter XII (Intermediaries):
• Police officers have also power to investigate dangerous
cyber crime under IPC 1860 , Indian Evidence Act 1872 and
RBI Act 1934
• Chapter XIII (Miscellaneous)
19
• Inspector level police officer has the right to
investigate these cases under the IT Act, section 78:
• Section 65 - Trying to tamper with computer resources
• Section 66 - Trying to hack into the data stored in the
computer
• Section 66B - Provision of penalties for misappropriation of
information stolen from computer or any other electronic
gadget
• Section 66C - Provision of penalties for stealing someone’s
identity
• Section 66D - Provision of penalties for access to personal
data of someone with the help of computer by concealing
their identity
• Section 66E - Provision of penalties for breach of privacy
20
• Section 72 - Provisions related to mutual trust and privacy
• Section 72A - The provisions relating to making public the
information violation of the terms of the Protocol
• Section 73 - Publication of electronic signature certificate
falls in certain particulars.
21
Section Contents Imprisonment Fine
Up to
44B For falling to file any return or furnish any Not Defined <=5000
information or other document within the per day per
prescribed time. failure
44C For not maintaining books of account or records. Not Defined <=10000
per day per
failure
45 Offences for which no penalty is separately Not Defined >=25000 to the
provided affected party
22
Section Contents Imprisonment Fine
Up to
23
Section Contents Imprisonment Fine
Up to
69A Failure to comply with directions for Blocking for 7 Years and Not Defined
Public Access of any information through computer
69B Failure to comply with directions to Monitor and 3 Years and Not Defined
Collect Traffic Data
70 Protected system. Any unauthorized access to such 10 years and Not Defined
system
70B (7) Failure to provide information called for by the I year or 1,00,000
*I.C.E.R.T or comply with directions
71 Penalty for Misrepresentation or suppressing any 2 years or/and 100,000
material fact
72 Penalty for breach of confidentiality and privacy of el. 2 years or/and 100,000
records, books, information, etc without consent of
person to whom they belong.
24
• The fundamental approach of the Act is towards
validating, legalising electronic & on-line transactions
• Legal framework against the offenders in the field of e-
commerce, payment, signatures, social platform etc.
• Awareness must be created.
• It leaves various issues untouched
• The Parliament keeps amending the law & enacting
new laws regularly
• That there are no reliable statistics on the problem
• India is amongst few of the countries in the world
which have legal framework for e-commerce and
e-governance
25
• Introducing Digital Signatures:
• With the passage of the IT (Amendment) Act,2008 India has become
technologically neutral due to adoption of electronic signatures as a
legally valid mode of executing signatures.
26
• Update on the role of Adjudicating Officer:
• As per the Section 46 in the amended ACT the Adjudicating officers
have been conferred with powers of execution of orders passed by it,
including order of attachment and sale of property, arrest and detention
of accused and appointment of receiver. This empowers the office of
Adjudicating officer and extends greater enforceability and
effectiveness of its orders.
27
• Defining “Critical Information Infrastructure”:
• The newly added Section 70 in the Amendment Act 2008 defines what
is “critical information infrastructure” and encompasses the protection of
information is equally important as is the maintaining of security and
sovereignty of India.
28
• Penalty and Compensation for the Damage to Computer, System and other
related devices
• email is now a valid and legal form of communication in our country, which
can be duly produced and approved in a court of law
• electronic commerce using the legal infrastructure provided by the Act
• Companies digital signatures to carry out their transactions online
• The Act also enables the companies to file any form, application or any
other document electronically for interaction
• The IT Act enables companies legally to retain the said information in the
electronic form which further can be usable at any place
• Electronic information given and received has a electronic time stamp
• Secure access of computer or web resources
• No identity theft, privacy, hacking, cyber frauds are allowed
• Downloaded copies are valid and legally accepted
• No computer can have virus over Internet which can infect another
computers
• Denial of services is not allowed
• It elaborates on offenses, penalties, and breaches
• No obscene or socially unwanted or revealing any human physical image
are not allowed and it is offence
29
1. Bazee.com case
• CEO of Bazee.com was arrested because a CD with objectionable
material was being sold on the website. The CD was also being sold in
the markets in Delhi.
30
5. Bomb Hoax Mail
• In an email hoax, sent by a 15-year-old boy from Bangalore, the Cyber
Crime Investigation Cell (CCIC) arrested him in 2009. The boy was
accused of sending an email to a private news company saying, “I have
planted 5 bombs in Mumbai, you have two hours to find them”. The
concerned authorities were contacted immediately, in relation to the
cyber case in India, who traced the IP address (Internet Protocol) to
Bangalore.
6. Cyber Terrorism
• Since the changes were carried out in the Information Technology Act in
Mumbai, this case of cyber terrorism was its first project. A threat email
had been delivered to the BSE and NSE, at 10:44 am on Monday. With
the MRA Marg police and the Cyber Crime Investigation Cell (CCIC)
working together on the cyber crime case, the accused has been
detained. The IP address had been traced to Patna, Bihar. When
checked for any personal details, two contact numbers were found,
which belonged to a photo frame maker in Patna.
7. Sexuality
• Punishment for publishing or transmitting of material depicting children
in sexually explicit act, etc. in electronic form
Relevant Case U/s Sec, 67B: Janhit Manch & Ors. v. The Union of India
10.03.2010 Public Interest Litigation: The petition sought a blanket ban
on pornographic websites. The NGO had argued that websites
displaying sexually explicit content had an adverse influence, leading
youth on a delinquent path.
31
• (Context: Digital signature certificates, Chapter IV, Section 11)
Provisioning of SSL certificates compulsorily for at least all e-commerce/
transactional websites may be incorporated in the Information Technology
Act, 2000 thereby conferring a degree of authenticity on these websites
and eliminating fraudulent transactions to a great extent.
• (Context: Data Protection, Chapter V section 16)
Data Protection in Internet Banking: Internet Banking involves not just the
banks and their customers, but numerous third parties too. Information
held by banks about their customers, their transactions etc. changes hand
several times. It is impossible for the banks to retain information within
their own computer networks. The Information Technology Act talks about
unauthorised access, but it does not talk about maintaining the integrity of
customer transactions. The act does not lay down any duty upon banks to
protect the details of customers and clients.
• (Context: Data Protection, Chapter V section 16)
Methods to deal with Proper Intellectual Property and Protection for
Electronic Data.
32
• (Context: Offences, Chapter XI section 66E)
This section may elaborate the definition of Privacy and the IT Act may lay
down strict rules of punishment for not withholding private data of any
person/entity.
• (Context: Nodal agency, Chapter XI section 70A)
Nodal agency to be set for cross border social media terrorism. Provision
for prosecution of International sources (of cybercrime) may be made.
• (Context: Nodal officer, Chapter XI section 70A)
A nodal officer of Social media platforms/websites with defined number of
users/hits in India (decided by the MeitY) to be appointed for any redressal
of public grievances. Mechanism or protocol to be set to address the
grievances of the users.
• (Context: Offences and Violation of privacy (66E), Penalty for Breach
of confidentiality and Privacy (72A), Chapter XI)
Provision on privacy may be more overarching and stricter
penalty/punishment may be applied for violation of any privacy under the
suitable Act/Law/Rules.
33
• (Context: Intermediaries not to be liable in certain cases, Chapter XII,
Section 79)
A regulatory body may be appointed to govern all OTT/ social media and
online platforms to make them more accountable for the content shared
on their platform.
• (Context: Act to address online gambling, Chapter XII)
The Internet makes it very easy for any person to gamble using a web site
which may be hosted anywhere in the world. The anonymity offered by the
Internet allows operators of fraudulent web sites to dupe unsuspecting
surfers of their money and escape prosecution. Keeping in the view of the
seriousness of the matter, it is recommended that appropriate
amendments may be made in the Gambling Prevention Act to address
online gambling.
34
• Just like company registrations/shop act registration has been recently
made permanent by tendering one-time fees, DSC may also be given for a
lifetime.
• Include a member from the state in the advisory committee.
• There are no provisions in the IT Act that deals with phishing. Though the
IPC talks about cheating, therefore, necessary provisions may be made in
the IT Act itself to prevent phishing and suggest suitable
punishments/penalties within the purview of applicable laws.
• All users must be informed through public awareness campaigns that they
shall be responsible for their doings/deeds online and if found guilty or
tracked down, may face charges and punishment.
• Provision of Policy/Guidelines/Training to States for dealing with relevant
matters to the IT Act.
• An "Electronic Evidence Study Centre" that would be responsible for
collection and processing all electronic evidence and track down any
hacking attempts and establishing the identity of the suspects in other IT
related cases.
36