it act 2000-ppt

18
IT ACT 2000,DIGITAL SIGNATURE & DIGITAL CERFICATE

Upload: hussain-rashid-mohammed

Post on 30-Oct-2014

687 views

Category:

Documents


31 download

TRANSCRIPT

Page 1: IT ACT 2000-PPT

IT ACT 2000,DIGITAL SIGNATURE & DIGITAL CERFICATE

Page 2: IT ACT 2000-PPT

GROUP NO : 7

SANIYA ALAVI 48

SWATHI K T 57

IRSHAD.PP 18

ASIF MON 8

RASHID MOHAMMAD 39

Page 3: IT ACT 2000-PPT

THE INFORMATION TECHNOLOGY ACT, 2000

An Act to provide legal recognition for transactions carried out by means

of electronic data interchange.

It came in to effect on 17-10-2000

It have 13 chapters and 4 schedules.

Heavy penalty can be imposed for those indulging computer crimes and

hacking.

India was the 12th country to enact an act related to cyber laws.

Page 4: IT ACT 2000-PPT

OBJECTIVES OF THE IT ACT

Legal Recognition for transactions.

Offenses and Contraventions.

Justice Dispensation System for cyber crimes.

To facilitate electronic filing of documents with Government

agencies and E-Payments.

To amend the Indian Penal Code, the Indian Evidence Act, 1872,

the Banker's Book Evidence Act, 1891 and the Reserve Bank of

India Act, 1934

Page 5: IT ACT 2000-PPT

CHAPTERS INCLUDING IT ACT

1. Preliminary

2. Digital signature

3. Electronic governance

4. Attribution, acknowledgement and dispatch of electronic records

5. Secure electronic records and secure digital signature

6. Regulation of certifying authorities

7. Digital signature certificates

8. Duties of subscribers

9. Penalties and adjudications

10. Cyber regulations appellate tribunal ,establishment of appellate tribunal

11. Offences

Page 6: IT ACT 2000-PPT

12. Network services providers not to be liable in certain cases

13. Miscellaneous.

SCHEDULES ( Acts which amended for IT ACT )

14. Indian penal code Act 1860

15. Indian evidence Act 1872

16. Bankers book evidence act 1891

17. Reserve Bank of India Act 1934

( CONT…)

Page 7: IT ACT 2000-PPT

A broader term that refers to any electronic data that carries the intent of a

signature but not all electronic signatures use digital signatures.

Digital signatures are commonly used for software distribution, financial

transactions, and in other cases where it is important to detect forgery and

tampering.

Digital signature is an authentication of any electronic record by a

subscriber by means of an electronic method.

Any subscriber may authenticate an electronic record by affixing his

digital signature.

DIGITAL SIGNATURE

Page 8: IT ACT 2000-PPT

It consist of public key and private key

Private key is allocated to an individual which enables the user to

fix a digital signature.

Public key is available to all who want to check authentication of

records.

The keys are provided by regulating authorities and are unique.

( CONT…)

Page 9: IT ACT 2000-PPT

Appointment of Controller and other officers.

Functions of Controller

Recognition of foreign Certifying Authorities

License to issue Digital Signature Certificates

Application for license

Renewal of license

Procedure for grant or rejection of license

Suspension of license

Display of license

Surrender of license

REGULATION OF CERTIFYING AUTHORITIES( chapter 6 of IT ACT 2000 )

Page 10: IT ACT 2000-PPT

It is an electronic document that uses a digital signature to bind a public

key with an identity information such as the name of a person or an

organization, their address, etc..

Also known as a Digital Certificate or Identity Certificate.

Any person may make an application to the Certifying Authority for issue

of Digital Signature Certificate. The Certifying Authority while issuing

such certificate shall certify that it has complied with the provisions of the

Act.

The Certifying Authority has to ensure that the subscriber holds the

private key corresponding to the public key listed in the Digital Signature

Certificate.

DIGITAL SIGNATURE CERTIFICATES

Page 11: IT ACT 2000-PPT

Serial Number: Used to uniquely identify the certificate.

Subject: The person or entity identified.

Signature Algorithm: The algorithm used to create the signature.

Signature: The actual signature to verify that it came from the issuer.

Issuer: The entity that verified the information and issued the certificate.

Valid-From: The date the certificate is first valid from.

Valid-To: The expiration date.

CONTENTS OF A TYPICAL DIGITAL CERTIFICATE

Page 12: IT ACT 2000-PPT

Key-Usage: Purpose of the public key (e.g. decipherment, signature,

certificate signing...).

Public Key: The public key.

Thumb print Algorithm: The algorithm used to hash the public key.

Thumb print: The hash itself, used as an abbreviated form of the public

key.

( CONT…)

Page 13: IT ACT 2000-PPT

Class 0 : This certificates shall be issued for demonstration /test

purposes.

Class 1 : This certificates shall be issued to individuals and

private subscribers.

Class 2 : These certificates will be used for both individual and

personal use

Class 3 : These certificates will be issued to individuals as well

as organizations

CLASSES OF DIGITAL CERTIFICATES

Page 14: IT ACT 2000-PPT

Penalty for damage to computer, computer system or computer network Without proper permission:

• Accessing

• Download, copies or extraction of information

• Denies access to authenticated user of Secured System

• Virus

• Denial and assistance Accused is liable to pay compensation not exceeding one crore.

Penalty for failure to furnish information return

Residuary penalty

PENALTIES

( Chapter 9 of IT ACT )

Page 15: IT ACT 2000-PPT

Tampering with computer source documents.

Hacking with computer system.

Power of Controller to give directions.

Protected system

Penalty for misrepresentation

Penalty for breach of confidentiality and privacy

Publication for fraudulent purpose

Confiscation

OFFENCES

(Chapter 11 of IT ACT 2000 )

Page 16: IT ACT 2000-PPT

CYBERCRIMES

The Computer as a Target

Using a computer to attack other computers.

Eg : Hacking, Virus/Worm attacks, DOS attack etc.

The Computer as a Weapon

Using a computer to commit real world crimes.

Eg : Cyber Terrorism, IPR violations, Credit card frauds,

EFT frauds, Pornographies, etc…..

Page 17: IT ACT 2000-PPT

Sec 503- Sending messages by threatening e-mails.

Sec 499, 500- Sending defamatory messages through e-mails.

Sec 463, 470, 471- Forgery of Electronic records.

Sec 420- Bogus websites, Cyber frauds.

Online sale of arms- Arms Act.

Online sale of drugs- NDPS Act.

Computer related crimes under IPC

Page 18: IT ACT 2000-PPT

THE END

Thank You……