UNIT-2: Definitions and Terminology (Information Technology Act, 2000)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

UNIT-2

Definitions and Terminology


(Information Technology Act,
2000)

introduction

The Information Technology Act, 2000 was


introduced in India in 2000 to deal with
the cases of cyber crimes.
The present chapter covers the difference
between conventional and cyber crimes,
the changing nature of cyber crimes
reasons for growing cyber crimes, cyber
criminals and the models and manners in
which cyber crimes are taken place.

Cyber Security
: According to Sec. 2 (nb) Cyber
security means protecting
information, equipment, deices,
computer, computer resources,
communication devices, computer,
computer resources, communication
device and information stored therein
from unauthorized access, use,
disclosure, disruption, modification or
destruction.

Data
:According to Sec 2 (o), data means a
representation of information, knowledge facts,
concepts or instructions which are being
prepared or have been prepared in a formalized
manner, and is intended to be processed, is
being processed or has been processed or has
been processed in a computer system or
computer network, and may be in any form
including computer or optical storage media,
punched card, punched tapes) stored internally
in a the memory of the computer.

Data Security
Data security also know as
information security (15) of computer
security refers to protective digital
privacy measures that are applied to
prevent unauthorized access to
computers, database and websites.
Data security also protects data from
corruption.

Digital Signature
According to Sec. 2(p), digital signature means
authentication of any electronic record by a subscribe
by eans of an electronic method or procedure in
accordance with the provisions of section 3.
As per the information Technology (Amendment) Act,
2000, for the words digital signature occurring in the
Chapter, section, sub-section and clause, the words
electronic signature shall be substituted.
Sec.2(a) states that electronic signature means
authentication of any electronic record by a subscriber
by means of the electronic technique specified in the
Second Schedule and includes digital signature.

Digital Signature
Certificate
:According to Sec.2(q). Digital
Signature Certificate means a
Digital Signature Certificate
(electronic signature certificate)
issued under sub section (4) of
section 35.

Electronic Signature
Certificate
Electronic Signature Certificate
means an Electronic Signature
Certificate issued under section 35
and includes Digital Signature
Certificate.

Electronic Gazette
Electronic Gazette: It means the
Official Gazette published in the
electronic form, sec. 2(s).

Electronic Record
Electronic Record: According to Sec
2(t) electronic record means data,
record or data generated,image or
sound stored, received or sent in an
electronic form or micro film or
computer generated micro fiche.

E-contract
E-contract: E-contract also known as
electronic contrat is any kind of contract
formed by two or more individual using
electronic means, such as e-mail, the
E-contract with an electronic
interaction of an individual
agent, such as a computer program, or the
interaction of at least two electronic agentw
that the programmed to recognize the
existence of a contract traditional contract
principles and remedies also apply to econtracts.

Encyption
Encyption: The word encryption
comes from the Greek crytos,
meaning hidden or secret Encyption
is the process of encoding messages
or information in such a way that
only aturhorized parties can read it.
The primary purpose of encryption is
to protect the confidentiality of
digital data stored on computer
system or transmitted via Internet or

Function
Function: According to Sec. 2(u)
function, in relation to a computer
includes logic control, arithmetical
process, deletion, storage and
retrieval and communication or
telecommunication from or within a
computer.

Information
Information: According to Sec 2(v)
function, Includes data, text,
images, sound, voice, codes,
computer programmes, software and
data bases or micro film or computer
generated micro fiche.

Intermediary
Intermediary: According to Sec.
2(w) intermediary with respect to
any particular electronic message,
means any person who on behalf of
another person receives stores or
transmits that message or provides
any service with respect to that
message

Internet
Internet: The internet has revolutionized the
21 century and helped people all over the
world do things they could have been
imagined. It is a means of connecting a
computer to any other computer anywhere in
the world via dedicated routers and servers.
When two computers are connected over the
Internet, they can send and receive all kinds
of information such as text, graphics, voice,
video, and computer programs.

Key Pair
Key Pair: According to Sec 2(x) key
pair, in an asymmetric crypto
system, means a private key and its
mathematically related public key,
which are so related that the public
key can verify a digital signature
created by the private key

License
License: According to Sec. 2(z)
license means a license granted to
a Certifying Authority under section
24.

Originator
Originator: According to Sec: 2(zap)
originator means a person who
sends generate, stores or transmits
any electronic message, or causes
any electronic message to be sent,
generated, stored or transmitted to
any other person but does not
include an intermediary.

Private Key
Private Key: According to Sec 2(zc)
private key means the key of a key
pair used to

3.7 DEFINITIONS AS PR I.T.ACT, 2000


Following concepts and definitions have been
commonly used in the information Technology Act:
Access: According to Sec 2(a) access, with its
grammatical variations and cognate expression,
means gaining entry into, instructing or
communicating with the logical, arithmetical or
memory function resources of a computer,
computer system or computer network.
Addresse: According to Sec. 2(b) addresse: means
a person who is intended by the originator to
receive the electronic record but does not include
any intermediary.

DEFINITIONS AS PR
I.T.ACT, 2000
Adjudicating Officer: According to Sec. 2,
adjudicating officer means and adjudicating
officer appointed under sub-section (1) of
section 46.
Affixing Digital Signature: According to Sec
2(d), affixing digital signature, with its
grammatical variations and cognatre
expressions means adoption of any
methodology or procedure by a person for the
purpose of authenticating an electronic record
by means of digital signature.

DEFINITIONS AS PR
I.T.ACT, 2000
Appropriate Government: According to
Sec 2(e), appropriate Government means
to respects to any matter.
Enumerate in List II of the Seventh
Schedule to the Constitution;
Relating to any State law enacted under
List III of the Seventh Schedule to the
Constitution.
The State Government and in any other
case, the Central Government.

DEFINITIONS AS PR
I.T.ACT, 2000
Asymmetric Crypto System: According to Sec. 2(f),
asymmetric crypto system means system of a
secure key pair consisting of a private key for creating
a digital signature and a public key to verify the digital
signature.
Public Key: According to Sec 2(zd) public key
means the key of a key pair used to verify a digital
signature and listed in the Digital Signature Certificate.
Public Key Vs Private Key
1.(Secrecy)
2.(Use)
3.(Listed)

DEFINITIONS AS PR
I.T.ACT, 2000
Secure System: According to Sec 2(ze) secure system
means computer hardware software, and procedure that Are reasonably secure from unauthorized access and
misuse.
Provide a reasonable level of reliability and correct
operaton.
Are reasonably suited to performing the intended
functions; and
Adhere to generally accepted security procedures.
Security Procedure: According to Sec 2(z) security
procedure means the security procedure prescribed
under section 16 by the Central Government.

DEFINITIONS AS PR
I.T.ACT, 2000
Subscriber: According to Sec 2(zh) subscribed
means a person in whose name the Digital
Signature Certificate is issued.0
Verify : According to Sec 2 (zh) Verify, in relation
to a digital signature, electronic record or public
key with its grammatical variations and cognate
expressions, means to determine whether The initial electronic record was affixed with the
digital signature by the use of private key
corresponding to the public key of the subscriber.
The initial electronic is retained intact or has been
altered since such electronic record was so affixed
with the digital signature.

DEFINITIONS AS PR
I.T.ACT, 2000
Intermediary: According to Sec 2 (w)
Intermediary with respect to any particular
electronic records, means any person who on
behalf of another person receives, storm or
transmits that record or providers any service
with respect to that record and includes
telecom service providers, network service
providers, internet service providers, webhosting service providers, search engines,
online payment sites, online-auction sites, online market places and cyber cafes.

You might also like