filmov
tv
Information Technology Act 2000 | Chapters, Sections, Basis, Schedules | GS | UPSC| Latest| NET JRF
![preview_player](https://i.ytimg.com/vi/PxNu0SZTtT0/maxresdefault.jpg)
Показать описание
Science, Social Studies and Humanities more interesting topics subscribe @TestPrep
Lectures in Hindi: NCERT, Yojana, Kurukshetra, Down to Earth, Science, Social Studies and More interesting topics subscribe @solvedpyq
For kids videos subscribe @FunProf
For Science Class 11-12 and important topics subscribe @DoorstepTutor
Also visit
In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the model law on electronic commerce (e-commerce) to bring uniformity in the law in different countries.
Further, the General Assembly of the United Nations recommended that all countries must consider this model law before making changes to their own laws. India became the 12th country to enable cyber law after it passed the Information Technology Act, 2000.
According to Section 1 (2), the Act extends to the entire country, which also includes Jammu and Kashmir. In order to include Jammu and Kashmir, the Act uses Article 253 of the constitution. Further, it does not take citizenship into account and provides extra-territorial jurisdiction.
Section 1 (2) along with Section 75, specifies that the Act is applicable to any offence or contravention committed outside India as well.
Asymmetric crypto system: means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature
Certifying Authority means a person who has been granted a license to issue a electronic signature Certificate under section 24
Cyber security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction
Indian Computer Emergency Response Team means an agency established under subsection (1) of Section 70B
Chapter II: Digital Signature
Chapter III: Electronic Governance
Chapter IV: Attribution, Acknowledgement And Despatch Of Electronic Records
Chapter V: Secure Electronic Records And Secure Electronic Signature
Chapter VI: Regulation Of Certifying Authorities
Chapter VII: Electronic Signature Certificates
Chapter VIII: Duties Of Subscribers
Chapter IX: Penalties, Compensation And Adjudication
Chapter X: The Appellate Tribunal
Chapter XI: Offences
Chapter XII: Intermediaries Not To Be Liable In Certain Cases
Chapter XIIA: Examiner Of Electronic Evidence
Chapter XIII: Miscellaneous
Chapter II
3A. Electronic signature
Chapter III
6. Use of electronic records and electronic signatures in Government and its agencies.
6A. Delivery of services by service provider.
10A. Validity of contracts formed through electronic means.
Chapter V
14. Secure electronic record.
15. Secure electronic signature
Chapter VII
37. Suspension of Digital Signature Certificate.
38. Revocation of Digital Signature Certificate
Chapter VIII
41. Acceptance of Digital Signature Certificate.
42. Control of private key
Chapter IX
43. Penalty and compensation for damage to computer, computer system, etc.
43A. Compensation for failure to protect data
Chapter XI
65. Tampering with computer source documents.
66. Computer related offences.
66A. Punishment for sending offensive messages through communication service, etc.
66B. Punishment for dishonestly receiving stolen computer resource or communication device.
66C. Punishment for identity theft.
66D. Punishment for cheating by personation by using computer resource.
66E. Punishment for violation of privacy.
66F. Punishment for cyber terrorism
69A. Power to issue directions for blocking for public access of any information through any computer resource
69B. Power to authorise to monitor and collect traffic data or information through any computer resource for cyber security
70. Protected system.
70A. National nodal agency.
70B. Indian Computer Emergency Response Team to serve as national agency for incident response.
Chapters:
0:00 Information Technology Act 2000
0:11 Introduction
1:18 Objectives
1:47 Highlights
3:25 Terms
5:02 Chapters
5:41 Major Sections
8:57 Schedules
#informationtechnologyact #introduction #objectives #highlights #terms #chapters #majorsections #schedules #examrace #examrace #upsc #ugcnet
Lectures in Hindi: NCERT, Yojana, Kurukshetra, Down to Earth, Science, Social Studies and More interesting topics subscribe @solvedpyq
For kids videos subscribe @FunProf
For Science Class 11-12 and important topics subscribe @DoorstepTutor
Also visit
In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the model law on electronic commerce (e-commerce) to bring uniformity in the law in different countries.
Further, the General Assembly of the United Nations recommended that all countries must consider this model law before making changes to their own laws. India became the 12th country to enable cyber law after it passed the Information Technology Act, 2000.
According to Section 1 (2), the Act extends to the entire country, which also includes Jammu and Kashmir. In order to include Jammu and Kashmir, the Act uses Article 253 of the constitution. Further, it does not take citizenship into account and provides extra-territorial jurisdiction.
Section 1 (2) along with Section 75, specifies that the Act is applicable to any offence or contravention committed outside India as well.
Asymmetric crypto system: means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature
Certifying Authority means a person who has been granted a license to issue a electronic signature Certificate under section 24
Cyber security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction
Indian Computer Emergency Response Team means an agency established under subsection (1) of Section 70B
Chapter II: Digital Signature
Chapter III: Electronic Governance
Chapter IV: Attribution, Acknowledgement And Despatch Of Electronic Records
Chapter V: Secure Electronic Records And Secure Electronic Signature
Chapter VI: Regulation Of Certifying Authorities
Chapter VII: Electronic Signature Certificates
Chapter VIII: Duties Of Subscribers
Chapter IX: Penalties, Compensation And Adjudication
Chapter X: The Appellate Tribunal
Chapter XI: Offences
Chapter XII: Intermediaries Not To Be Liable In Certain Cases
Chapter XIIA: Examiner Of Electronic Evidence
Chapter XIII: Miscellaneous
Chapter II
3A. Electronic signature
Chapter III
6. Use of electronic records and electronic signatures in Government and its agencies.
6A. Delivery of services by service provider.
10A. Validity of contracts formed through electronic means.
Chapter V
14. Secure electronic record.
15. Secure electronic signature
Chapter VII
37. Suspension of Digital Signature Certificate.
38. Revocation of Digital Signature Certificate
Chapter VIII
41. Acceptance of Digital Signature Certificate.
42. Control of private key
Chapter IX
43. Penalty and compensation for damage to computer, computer system, etc.
43A. Compensation for failure to protect data
Chapter XI
65. Tampering with computer source documents.
66. Computer related offences.
66A. Punishment for sending offensive messages through communication service, etc.
66B. Punishment for dishonestly receiving stolen computer resource or communication device.
66C. Punishment for identity theft.
66D. Punishment for cheating by personation by using computer resource.
66E. Punishment for violation of privacy.
66F. Punishment for cyber terrorism
69A. Power to issue directions for blocking for public access of any information through any computer resource
69B. Power to authorise to monitor and collect traffic data or information through any computer resource for cyber security
70. Protected system.
70A. National nodal agency.
70B. Indian Computer Emergency Response Team to serve as national agency for incident response.
Chapters:
0:00 Information Technology Act 2000
0:11 Introduction
1:18 Objectives
1:47 Highlights
3:25 Terms
5:02 Chapters
5:41 Major Sections
8:57 Schedules
#informationtechnologyact #introduction #objectives #highlights #terms #chapters #majorsections #schedules #examrace #examrace #upsc #ugcnet
Комментарии