Beruflich Dokumente
Kultur Dokumente
Technology Act
and
Some Applications
Rajnish Kumar
Professor, Information Technology
National Academy of Indian Railways
pit@nair.railnet.gov.in
Structure of Lecture
Creating
Trust in
Electronic
Environment
IT Act, 2000
Enacted on 17th May
2000- India is 12th
nation in the world to
adopt cyber laws
IT Act is based on Model
law on e-commerce
adopted by UNCITRALUnited Nations
Commission on
International Trade
Law
JURISDICTION
Extent of application
Extends to whole of India and also
applies to offence or contravention
committed outside India by any
person irrespective of his nationality,
if such act involves a computer,
computer system or network located
in India
section 1 (2) read with Section 75
Secures access
Downloads, copies, extracts any data
Introduces any viruses etc.
Damages or causes to be damaged any
computer resource
Investigation by
ADJUDICATING OFFICER normally IT
Secretary of State.
Appeal to
Cyber Appellate Tribunal
Powers of a civil court
For claims upto Rs 5 crore to the
affected party (Jurisdiction)
Needs to be popularized
Example of Adjudicator
https://
it.maharashtra.gov.in/1130/Filing-Complaints-under-IT-Act
Screensh
ot of
CAT webs
ite
Not very
popular
Brief Description
Relevant Section
in IT Act
Punishments
Cyber Stalking
43, 65, 66
3 years, or with
fine up to 2 lakh
Cyber Pornography
including child pornography
67, 67 (2)
Intellectual Property
65
3 years, or with
fine up to 2 lakh
Cyber Terrorism
69
Imprisonment for
a term, may
extend to 7 years
Cyber Hacking
66
3 years, or with
fine up to 2 lakh
Phishing
43, 65, 66
3 years, or with
fine up to 2 lakh
Privacy
2 years, or with
fine up to 1 lakh
Case on 16-3-2015
http://
timesofindia.indiatimes.com/india/Teen-arrested-for-Facebook-post-attribu
ted-to-Azam-Khan-gets-bail/articleshow/46620033.cms
Care.
But it will be imperative that you exercise due diligence when
you send information on the Internet, social media and mobile
networks.
There is section 67
Punishment for publishing or transmitting obscene
material in electronic form.
Suggested Reading
http://catindia.gov.in/pdfFiles/IT_Act_2000_vs_2008.pdf
http://www.csi-india.org/c/document_library/get_file?uu
id=2ce4b842-aca6-4f54-87b6-d778093925d9&groupId=10157
http://www.slideshare.net/NIIConsulting/it-act-2000-penaltie
s-offences-with-case-studies
http://deity.gov.in/content/cyber-laws
http://delhidistrictcourts.nic.in/ejournals/CYBER%20LAW.pdf
http://www.police.mizoram.gov.in/uploads/files/cyber-pornog
raphy-it-act.pdf
Information and
Responsibility
Data Protection
Sections in IT ACT 2000/2008
Section 43-A primarily deals with
compensation for negligence in
implementing and maintaining reasonable
security practices and procedures in relation
to sensitive personal data or
information (SPDI).
Section 72-A deals with personal
information and provides punishment for
disclosure of information in breach of lawful
contract or without the information
providers consent.
Passwords;
Financial information
such as bank
account or credit
card or debit card or
other payment
instrument details;
Physical,
physiological and
mental health
condition;
Sexual orientation;
Biometric
information.
http://www.cert-in.org.in/
User
or
Service Provider
In such cases the company/firm as well as its incharge are liable under section 85 of the Information
Technology Act, 2000.
http://deity.gov.in/content/cyber-laws
Clause 5.1.d.viii:
Passwords
Strong Passwords:
Phrases, mixed case, special characters,
and long:
- 5db10mw! (Slow Down Buddy Im On
My Way!)
- w@yD0wny0nd3r#% (Way Down
Yonder #%)
A sample of a
fraudulent email that can
be sent to
ICICIBank.co
m customers.
It purports to
be from
ICICIBank.co
m but it is
not. Its intent
is to get you
to enter
sensitive
information
about your
account and
to then use
this
information
to commit
fraud.
To ensure a
legitimate
and safe sign
on, always
enter www.
Padlock sign
VERIFY
APPLE ID
SCAM
FACEBOOK
SCAM
Your
unread
messages
will be
deleted in a
few days
Some useful
applications
Cloud Computing
Simply put- using remote servers as
your storage cum processor, ultra
light and minimum memory devices
can be used.
For us, CLOUD STORAGE is relevant
now.
Wireless Printing
google cloud print
https://www.google.com/cloudprint#printers
Wireless Printing
google cloud print
How to connect - https://support.google.com/cloudprint/answer/1686197?rd=1
Once Google Chrome is installed, follow the steps below to enable the Google Cloud Print
connector in Google Chrome.
Log in to your user account on the Windows, Mac, or Linux computer.
Open Google Chrome.
Click the Chrome menuon the browser toolbar.
SelectSettings.
Click theShow advanced settingslink.
Scroll down to the Google Cloud Print section. ClickManage.
The next screen will show a list of devices already registered with Google Cloud Print, and
new devices available on the network.
In the "Classic printers" section, clickAdd printers.
You'll see a confirmation that Google Cloud Print has been enabled. ClickManage your
printersto learn more.
The printer is now associated with your Google Account and connected to Google Cloud
Print. You can print to this printer using Google Cloud Print whenever youre signed in
with the same Google Account.
https://www.google.com/cloudprint#printers
Slack
latest trend in Office Communication
Description
All your team communication in one
place, instantly searchable, available
wherever you go.
* Powerful search and archiving,
meaning no one is ever left out of the
loop
* Dozens of integrations with tools
including: Dropbox, Asana, Google+
Hangouts, Twitter, Zendesk
* New integrations and features
added frequently
* Inline images and video, with rich
link summaries giving context without
leaving the app
* Instantly synced across all devices
* Configurable notifications for
desktop, mobile push and email
Mobile Utilities
My tracks
COURSERA
New way to learn
Humanities,
Medicine,
Biology,
Social
Sciences,
Mathematic
s,
Business,
Computer
Science
https://www.coursera.org/cou
rses
TRENDS IN THE
CYBERWORLD
http://www.wsj.com/articles/SB10001424053111903480904576512250915629460
http://www.claytonchrist
ensen.com
Remain Safe
in
cyberspace!!!!