Notification under IT(Amendment) Act, IT (Amendment) Act MB IT Act Rules for the Information Technology Act THE INFORMATION TECHNOLOGY ACT, ACT NO. 21 OF [9th June, ] An Act to provide legal recognition for transactions carried out by means. President on the 9th June, , and is hereby published for general (1) This Act may be called the Information Technology Act, Short title.
|Language:||English, Japanese, Dutch|
|ePub File Size:||16.42 MB|
|PDF File Size:||19.75 MB|
|Distribution:||Free* [*Registration Required]|
The Act is called The Information Technology Act and is They are made in one program (e.g. Microsoft, Word, Adobe, PDF) so they. amend the Indian Penal Code, the Indian Evidence Act, , the Bankers' (1) This Act may be called the Information Technology Act, Short Title: The Information Technology Act, Long Title: An Act to provide legal recognition for transactions carried out by means of electronic data.
It provides for the constitution of the Cyber Regulations Advisory Committee. It adds a provision to Section 81, which states that the provisions of the Act shall have overriding effect. The provision states that nothing contained in the Act shall restrict any person from exercising any right conferred under the Copyright Act, Scheme of I.
T Act The following points define the scheme of the I. Act contains 13 chapters and 90 sections. The last four sections namely sections 91 to 94 in the I. It commences with Preliminary aspect in Chapter 1, which deals with the short, title, extent, commencement and application of the Act in Section 1.
Section 2 provides Definition. Chapter 2 deals with the authentication of electronic records, digital signatures, electronic signatures, etc. Chapter 11 deals with offences and penalties.
A series of offences have been provided along with punishment in this part of The Act.
Failure is an offence. Any person who fails to comply with any such order shall be guilty of an offence. The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information.
The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. Imprisonment up to seven years and possible fine. The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems.
If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. The company had shut down a website over non-payment of dues. Punishment for sending offensive messages through communication service, etc.
Hindustan Times. India Today. Retrieved 23 April Court scraps charges against Palghar girls". The Times of India. RS MPs". The student who took on India's internet laws". BBC News. Live Mint. Key points of court verdict".
The Washington Post. Special Correspondent. Home ministry's blanket surveillance order must be tested against fundamental right to privacy".
Times of India Blog. MHA officials".
Information Technology Act, 2000
Devendra Fadnavis". The Economic Times. Why we need a new Section 66A". Indian legislation.
Hacking with computer system. If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. A person fradulently uses the password, digital signature or other unique identification of another person.
Salient Features of I.T Act
If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyberterrorism.
Publishing information which is obscene in electronic form. If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it.
Publishing images containing sexual acts.
Publishing child porn or predating children online. If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act.This leads to harassment of the victim. Special Correspondent. The rules require firms to obtain written permission from customers before collecting and using their personal data.
He is convicted and sentenced for the offence as follows: As per of IPC he has to undergo rigorous imprisonment for 2 years and to pay fine of Rs. A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. In fact, it cannot be too. It would, on the whole, be fair to say that with this ruling, India, which is a democracy in progress, took a solid step towards the maturing of democratic principles.
Scheme of I.T Act
Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. Section 45 — Residuary Penalty Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided,shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees.
T Act The I.
- OLD NCERT HISTORY BOOK IN HINDI
- INDIA TODAY HINDI MAGAZINE PDF
- WEB COMMERCE TECHNOLOGY HANDBOOK PDF
- ACTIVE KOREAN 1 EBOOK
- VERMICULTURE TECHNOLOGY PDF
- ABRAMELIN EL LIBRO DE LA MAGIA SAGRADA EPUB DOWNLOAD
- TRUYEN KIM DUNG PDF
- ALCHEMIST NOVEL IN ENGLISH PDF
- CRYPTOGRAPHY AND NETWORK SECURITY BY BEHROUZ A FOROUZAN EBOOK
- PAPER PRESENTATION PDF S
- ANDREW GLYN CAPITALISM UNLEASHED PDF
- FRESH OFF THE BOAT EDDIE HUANG PDF
- PROGRAM EDIT PDF KE WORD