Technology Act, 2000: Data Theft - Information
Technology Act, 2000: Data Theft - Information
Technology Act, 2000: Data Theft - Information
file:///.file/id=6571367.210
4625
SUBMITTED BY
The Government of India enacted its Information Technology Act 2000 with the
objectives stating officially as:
to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as
"electronic commerce", which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with
the Government agencies and further to amend the Indian Penal Code, the Indian Evidence
Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934
and for matters connected therewith or incidental thereto.
WHAT DOES THE IT ACT DEAL WITH ?
Inclusion of some additional cyber crimes like child pornography and cyber terrorism
Authorizing an Inspector to investigate cyber offences (as against the DSP earlier)
ADVANTAGES OF THE IT ACT, 2008 (Amended)
The Act throws open the doors for the entry of corporate
companies in the business of being Certifying Authorities
for issuing Digital Signatures Certificates.
Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means of, or in
relation to, a computer system or network, including such crimes as illegal possession and offering or
distributing information by means of a computer system or network.
Section 65
Related Case
Syed Asifuddin and Ors. Vs. The State of Andhra Pradesh
Section 66
Related Case
Kumar v/s Whiteley
Section 66A
Related Case
Fake profile of President posted by imposter
Section 66B
Related Case
Bomb Hoax mail
Section 66C
Related Case
Sandeep Vaghese v/s State of Kerala
Section 66E
Related Case
Jawaharlal Nehru University MMS scandal
Section 66F
Related Case
Mumbai Police v/s Shahab MD
Section 67
Related Case
Yahoo Message group
Section 67A
Provisions
Online hate community is created inciting a
Applicable:
Online Hate Community religious group to act or pass objectionable
remarks against a country, national figures etc. Section 66A of IT
Act
Provisions
Applicable:-
If victims email account is hacked and obscene emails
Email Account Hacking are sent to people in victims address book. Sections 43, 66,
66A, 66C, 67, 67A
and 67B of IT Act.
CYBER-CRIME SCENARIOS
Provisions
Unsuspecting victims would use infected Applicable:-
Credit Card Fraud
computers to make online transactions Sections 43, 66,
66C, 66D of IT Act
Provisions
Introducing Viruses,
All of the above are some sort of malicious Applicable:-
Worms, Backdoors, programs which are used to destroy or gain Sections 43, 66,
Rootkits, Trojans, Bugs access to some electronic information
66A of IT Act
Provisions
Applicable:-
The homepage of a website is replaced with a Sections 43 and
pornographic or defamatory page. 66 of IT Act and
Web Defacement Government sites generally face the wrath of
hackers on symbolic days. Sections 66F, 67
and 70 of IT Act
also apply in
CYBER-CRIME SCENARIOS
Provisions
Among the largest businesses on Internet. Applicable:-
Cyber Pornography Pornography may not be illegal in many Sections 67, 67A
countries, but child pornography is. and 67B of the IT
Act.
Provisions
Applicable:-
Online sale of illegal Where sale of narcotics, drugs weapons Generally
Articles and wildlife is facilitated by the Internet conventional laws
apply in these
cases
Provisions
Applicable:
Many terrorists are use virtual(GDrive, FTP Conventional
Cyber Terrorism sites) and physical storage media(USBs, terrorism laws
hard drives) for hiding information and may apply along
records of their illicit business. with Section 69
of IT Act
CYBER-CRIME SCENARIOS
Provisions
A Source code generally is the most
applicable:-
Source Code Theft coveted and important "crown jewel"
asset of a company Sections 43, 66,
66B of IT Act
Provisions
Phishing involves fraudulently acquiring
Phishing and Email Applicable:-
sensitive information through masquerading a
Scams Section 66, 66A
site as a trusted entity. (E.g. Passwords, credit
card information) and 66D of IT Act
CYBER-CRIME SCENARIOS
Provisions
Money launderers and people doing illegal
Tax Evasion and Money applicable:-
business activities hide their information
Laundering in virtual as well as physical activities Sections 43, 66,
66B of IT Act