Information Technology Act 2000 Pdf In Marathi

It is the primary law in India dealing with cybercrime and electronic commerce. The bill was passed in the budget session of and signed by President K.

Information Technology Act 2000

Narayanan on 9 May The bill was finalised by group of officials headed by then Minister of Information Technology Pramod Mahajan. The original Act contained 94 sections, divided into 13 chapters and 4 schedules. The laws apply to the whole of India. If a crime involves a computer or network located in India, persons of other nationalities can also be indicted under the law,.

The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures.

It also established a Cyber Appellate Tribunal to resolve disputes rising from this new law. A major amendment was made in It introduced Section 66A which penalized sending "offensive messages". It also introduced Section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource".

Additionally, it introduced provisions addressing child porn , cyber terrorism and voyeurism.

Information Technology Act, 2000

The amendment was passed on 22 December without any debate in Lok Sabha. The next day it was passed by the Rajya Sabha. It was signed into law by President Pratibha Patil , on 5 February List of offences and the corresponding penalties: [8] [9].

If a person who secures access or attempts to secure access to a protected system, then he is committing an offence.

Changer un format pdf en jpg gratuit

From its establishment as an amendment to the original act in , Section 66A attracted controversy over its unconstitutional nature:. He was supported by D. P Rajeev pointed that cartoons and editorials allowed in traditional media, were being censored in the new media.

He also said that law was barely debated before being passed in December Rajeev Chandrasekhar suggested the 66A should only apply to person to person communication pointing to a similar section under the Indian Post Office Act, Shantaram Naik opposed any changes, saying that the misuse of law was sufficient to warrant changes. He also said that a similar provision existed under Indian Post Office Act, However, P Rajeev said that the UK dealt only with communication from person to person.

They said that the section was vague and frequently misused. She argued that the Section 66A was vaguely phrased, as result it violated Article 14, 19 1 a and Article 21 of the Constitution.

The PIL was accepted on 29 November The court said that Section 66A of IT Act is "arbitrarily, excessively and disproportionately invades the right of free speech" provided under Article 19 1 of the Constitution of India.

But the Court turned down a plea to strike down sections 69A and 79 of the Act, which deal with the procedure and safeguards for blocking certain websites. The data privacy rules introduced in the Act in have been described as too strict by some Indian and US firms. The rules require firms to obtain written permission from customers before collecting and using their personal data.

This has affected US firms which outsource to Indian companies. However, some companies have welcomed the strict rules, saying it will remove fears of outsourcing to Indian companies.

The Section 69 allows intercepting any information and ask for information decryption. To refuse decryption is an offence. The Indian Telegraph Act, allows the government to tap phones. But, according to a Supreme Court verdict the government can tap phones only in case of a "public emergency".

But, there is no such restriction on Section On 2 April , the Chief Minister of Maharashtra , Devendra Fadnavis revealed to the state assembly that a new law was being framed to replace the repealed Section 66A. Fadnavis was replying to a query Shiv Sena leader Neelam Gorhe. Gorhe had said that repeal of the law would encourage online miscreants and asked whether the state government would frame a law to this regard.

Fadnavis said that the previous law had resulted in no convictions, so the law would be framed such that it would be strong and result in convictions.

Navigation menu

On 13 April , it announced that the Ministry of Home Affairs would form a committee of officials from the Intelligence Bureau , Central Bureau of Investigation , National Investigation Agency , Delhi Police and ministry itself to produce a new legal framework.

This step was reportedly taken after complaints from intelligence agencies that, they were no longer able to counter online posts that involved national security matter or incite people to commit an offence, such as online recruitment for ISIS. From Wikipedia, the free encyclopedia. The Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to nusta editing electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, , the Bankers' Books Evidence Act, and the Reserve Bank of India Act, and favour matters connected therewith or incidental thereto.

See also: Mandatory decryption.

Information Technology Act, 2000

Indian Penal Code. India: Eastern Book Company. Retrieved 14 April Essentials of Information Technology Law. Notion Press. Centre for Internet and Society India. The Indian Express.

Objectives of the Act

How they played". The Telegraph India.

Anexos cutaneous pdf to word

Retrieved 6 May The Hindu. Retrieved 8 May Retrieved 7 May Information Technology Act.

Information technology act 2000 pdf in marathi

Outlook India. The Guardian. Hindustan Times. India Today. Retrieved 23 April The Times of India. BBC News.

Search form

Live Mint. The Washington Post. Special Correspondent. Retrieved 27 December Home ministry's blanket surveillance order must be tested against fundamental right to privacy".

Times of India Blog. The Economic Times.

Indian legislation. Hidden categories: CS1 maint: others Use dmy dates from August Use Indian English from August All Wikipedia articles written in Indian English Pages using collapsible list with both background and text-align in titlestyle Pages using a deprecated parameter in the legislation infobox.

Namespaces Article Talk. Views Read Edit View history. By using this site, you agree to the Terms of Use and Privacy Policy. Long title The Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to nusta editing electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, , the Bankers' Books Evidence Act, and the Reserve Bank of India Act, and favour matters connected therewith or incidental thereto.

Information Technology Act, IT Amendment Act If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force.

Hacking with computer system. If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

Kreyszig advanced engineering mathematics 10e pdf merge

A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. A person fradulently uses the password, digital signature or other unique identification of another person. If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyberterrorism.

(Marathi) Information Technology Act 2000 (Amendment 2008)

Publishing information which is obscene in electronic form. If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it.

Publishing images containing sexual acts.

Information Technology Act 2000 -- What is Digital Signature?

Publishing child porn or predating children online. If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act.