It act 2000

Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs All of the above are some sort of malicious programs which are used to destroy or gain access to some electronic information. The first accused and others sent e-mails from fake e-mail accounts of many of the customers, suppliers, Bank etc.

Imprisonment up to seven years and possible fine. Any contract for the sale or conveyance of immovable property or any interest in such property; Any such class of documents or transactions as may be notified by the Central Government Cases Studies as per selected IT Act Sections Here are the case studies for selected IT Act sections.

By Jocelyn Mackie Former civil litigation attorney. The police said an email challenging the security agencies to prevent a terror attack was sent by one Shahab Md with an ID sh. Jan 19, This article is not a substitute for professional legal advice.

Similar change has been brought about in the expression "Certified-copy" to include such printouts within its purview. Syed Asifuddin and Ors. Ltd, owner of Delhi based Ecommerce Portal www.

Information Technology Act, 2000

A good example of this implementation is BillDeska payment processing company. Offenses that occur in a corporate setting can result in further administrative penalties and bureaucratic monitoring that can prove burdensome to doing business.

Section 67B — Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. It act 2000 have been considered burdensome by many companies, although there is also an argument that they provide It act 2000. Section 67 — Punishment for publishing or transmitting obscene material in electronic form Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, It act 2000 regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it,shall be punished on first conviction with imprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees andin the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.

Section 66A — Punishment for sending offensive messages through communication serviceAny person who sends, by means of a computer resource or a communication device, Any information that is grossly offensive or has menacing character; Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to three years and with fine.

The email ID was created just four minutes before the email was sent. Tax Evasion and Money Laundering Money launderers and people doing illegal business activities hide their information in virtual as well as physical activities.

The Third and Fourth Schedule are omitted. It elaborates on offenses, penalties, and breaches. IT Act may apply case-wise. Act with some major objectives to deliver and facilitate lawful electronic, digital, and online transactions, and mitigate cyber-crimes.

The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized under sub-section 1provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating, transmitting, receiving or storing such traffic data or information.

As per of IPC he has to undergo rigorous imprisonment for 2 years and to pay fine of Rs. The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems.

Section 2 provides Definition. The ISP is Sify. The fourth schedule amends the Reserve Bank of India Act. Cyber Crime is not defined officially in IT Act or in any other legislation. Look into the Privacy by Design guidelines to not only have a tight Privacy Policy but also the IT security to back it up.

IT Act 2000 – Penalties, Offences With Case Studies

He is convicted and sentenced for the offence as follows: If your company is located in India and registered there, there is no doubt that you must comply with the act. The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section 3 shall be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.

According to the Nagpur rural police, the girl was in a relationship with Mithilesh Gajbhiye, 19, son of Yashodha Dhanraj Gajbhiye, a zila parishad member and an influential Congress leader of Saoner region in Nagpur district.

After the Section 66A was repealed on 24 March, the state government said that they would continue the prosecution under the remaining charges.

Section 72 — Breach of confidentiality and privacy Any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.

Act has brought amendment in four statutes vide section What is the applicability of IT Act? Amendments Brought in the I.

It pertains to the inclusion of electronic document in the definition of evidence. Section 66D — Punishment for cheating by impersonation by using computer resource Relevant Case: Web Defacement The homepage of a website is replaced with a pornographic or defamatory page. The company has a web-site in the name and and style www.Notification under IT(Amendment) Act, IT (Amendment) Act MB IT Act Rules for the Information Technology Act Report of the Expert Committee on Amendments to IT Act This is the General Knowledge Questions & Answers section on & Information Technology Act - & with explanation for various interview, competitive examination and entrance test.

Solved examples with detailed answer description, explanation are given and it would be easy to understand.

India IT Act of 2000 (Information Technology Act)

Information Technology Act, mi-centre.com intends to provide you with the bare act of Information Technology Act, as amended by Information Technology (Amendment) Act of. THE INFORMATION TECHNOLOGY ACT, (No. 21 OF ) [9th June, ] An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of.

Full text containing the act, Information Technology Act,with all the sections, schedules, short title, enactment date, and footnotes. The IT Actbeing the first legislation on technology, computers, e-commerce and e-communication, the was the subject of extensive debates, elaborate reviews with one arm of the industry criticizing some sections of the Act to be draconian and other stating it is too diluted and lenient.

Download
It act 2000
Rated 0/5 based on 44 review