Notification under IT(Amendment) Act, IT (Amendment) Act MB IT Act Rules for the Information Technology Act THE INFORMATION TECHNOLOGY ACT, ACT NO. 21 OF [9th June, ] An Act to provide legal recognition for transactions carried out by means. President on the 9th June, , and is hereby published for general (1) This Act may be called the Information Technology Act, Short title.

Information Technology Act 2000 Pdf In Hindi

Language:English, Japanese, Dutch
Country:El Salvador
Published (Last):30.12.2015
ePub File Size:16.42 MB
PDF File Size:19.75 MB
Distribution:Free* [*Registration Required]
Uploaded by: ELIZABETH

The Act is called The Information Technology Act and is They are made in one program (e.g. Microsoft, Word, Adobe, PDF) so they. amend the Indian Penal Code, the Indian Evidence Act, , the Bankers' (1) This Act may be called the Information Technology Act, Short Title: The Information Technology Act, Long Title: An Act to provide legal recognition for transactions carried out by means of electronic data.

It provides for the constitution of the Cyber Regulations Advisory Committee. It adds a provision to Section 81, which states that the provisions of the Act shall have overriding effect. The provision states that nothing contained in the Act shall restrict any person from exercising any right conferred under the Copyright Act, Scheme of I.

T Act The following points define the scheme of the I. Act contains 13 chapters and 90 sections. The last four sections namely sections 91 to 94 in the I. It commences with Preliminary aspect in Chapter 1, which deals with the short, title, extent, commencement and application of the Act in Section 1.

Section 2 provides Definition. Chapter 2 deals with the authentication of electronic records, digital signatures, electronic signatures, etc. Chapter 11 deals with offences and penalties.

A series of offences have been provided along with punishment in this part of The Act.

Failure is an offence. Any person who fails to comply with any such order shall be guilty of an offence. The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information.

The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. Imprisonment up to seven years and possible fine. The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems.

If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. The company had shut down a website over non-payment of dues. Punishment for sending offensive messages through communication service, etc.

Hindustan Times. India Today. Retrieved 23 April Court scraps charges against Palghar girls". The Times of India. RS MPs". The student who took on India's internet laws". BBC News. Live Mint. Key points of court verdict".

The Washington Post. Special Correspondent. Home ministry's blanket surveillance order must be tested against fundamental right to privacy".

Times of India Blog. MHA officials".

Information Technology Act, 2000

Devendra Fadnavis". The Economic Times. Why we need a new Section 66A". Indian legislation.

Retrieved from " https: Hidden categories: CS1 errors: Namespaces Article Talk. Views Read Edit View history. This page was last edited on 21 March , at By using this site, you agree to the Terms of Use and Privacy Policy. Information Technology Act, IT Amendment Act If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force.

Hacking with computer system. If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. A person fradulently uses the password, digital signature or other unique identification of another person.

Salient Features of I.T Act

If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyberterrorism.

Publishing information which is obscene in electronic form. If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it.

Publishing images containing sexual acts.

Publishing child porn or predating children online. If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act.This leads to harassment of the victim. Special Correspondent. The rules require firms to obtain written permission from customers before collecting and using their personal data.

Jharkhand Police

He is convicted and sentenced for the offence as follows: As per of IPC he has to undergo rigorous imprisonment for 2 years and to pay fine of Rs. A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. In fact, it cannot be too. It would, on the whole, be fair to say that with this ruling, India, which is a democracy in progress, took a solid step towards the maturing of democratic principles.

Scheme of I.T Act

Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. Section 45 — Residuary Penalty Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided,shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees.

T Act The I.

MARYLN from Boise City
Look over my other posts. I have only one hobby: high power rifle. I do enjoy reading comics punctually.