Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Similar presentations


Presentation on theme: "The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,"— Presentation transcript:

1 The Information Technology Act 2000

2 Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet, Intranet, Extranet Data Security Data Security Poaching Poaching Morphology Morphology

3 Terms (Contd) Hacking Hacking Ethical Hacking Ethical Hacking Netizen Netizen ISP ISP Search Engines Search Engines WILFER WILFER SPAM SPAM Cyber Espionage Cyber Espionage Domain Names Domain Names

4 Definitions Access: Gaining entry into, instructing or communicating with the logical, arithmetical or memory function of a Computer. Access: Gaining entry into, instructing or communicating with the logical, arithmetical or memory function of a Computer. COMPUTER; Conversion Of Mental Power Used for Technology, Education and Resources. COMPUTER; Conversion Of Mental Power Used for Technology, Education and Resources. VIRUS : Vital Information Resource Under Siege VIRUS : Vital Information Resource Under Siege

5 Originator: One who originates the message Originator: One who originates the message Addressee: To whom the message is addressed to. Addressee: To whom the message is addressed to. Affixing Digital Signature: Key Pair Affixing Digital Signature: Key Pair Private Key- Creates Digital Signature Private Key- Creates Digital Signature Public Key – Verifies Digital Signature Public Key – Verifies Digital Signature (a.k.a Asymmetric Crypto System)

6 Electronic Records Authentication of Electronic Records: Authentication of Electronic Records: Hash Function: An algorithm that maps or translates one set of bits into another so that it yields the same result everytime. Hash Function: An algorithm that maps or translates one set of bits into another so that it yields the same result everytime. EDI: Transfer of structured Data EDI: Transfer of structured Data By agreed message standards By agreed message standards From one Computer System to another From one Computer System to another By Electronic Means By Electronic Means

7 E-Governance Legal recognition of electronic records Legal recognition of electronic records Legal recognition of Digital Signature Legal recognition of Digital Signature Use of E-records and Digital signature in Government and its Agencies Use of E-records and Digital signature in Government and its Agencies Retention of E-records Retention of E-records Publication of rules, regulations in E- Gazette Publication of rules, regulations in E- Gazette

8 Duties of Subscribers Generating Key Pair Generating Key Pair Acceptance of Digital Signature Acceptance of Digital Signature Control of Private Key Control of Private Key

9 Offences/Penalties Penalty for damage to Computer, computer system etc., (Virus, Disruption, Deletion, Hacking) Penalty for damage to Computer, computer system etc., (Virus, Disruption, Deletion, Hacking) Penalty for failure to furnish information, returns etc., Penalty for failure to furnish information, returns etc., Tampering with computer source documents Tampering with computer source documents Penalty for misrepresentation Penalty for misrepresentation Penalty for breach of confidentiality and privacy Penalty for breach of confidentiality and privacy Publication for fraudulent purpose Publication for fraudulent purpose


Download ppt "The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,"

Similar presentations


Ads by Google