Shivam LAB

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

IT ACT

2000
SHIVAM PANDEY - 20131 DIVISION A
TABLE OF CONTENTS
01 69 04 70
Power to issue directions
. for interception. . Protected system.

02 69A
Power to issue directions
05 70A

. for blocking for public


access.
. National Nodal Agency.

03 69B 06 70B
Power to authorise to Indian computer emergency
. monitor. . response team.
69
Power to issue directions for interception or monitoring or decryption
of any information through any computer resource
1. Central and state government can direct any agency to
intercept/decrypt any information stored in device.
2. Procedures are as prescribed.
3. Provide technical assistance by extending facilities to
a. Provide access to computer resource.
b. Intercept the information.
c. Provide information stored in device.
4. Any person who fails to assist shall be punished for a term of
seven years & fine.
69A
Power to issue directions for blocking for public access of any
information through any computer resource
1. Central government or officials can direct any agency to
block for access by the public any information in computer
resource.
2. The procedure may be carried out as prescribed.
3. The intermediary who fails to comply with the direction
shall be punished for a term of seven years & fine.
69B
Power to authorise to monitor & collect traffic data or information
through any computer resource for cyber security
1. Central and state government can direct any agency to collect &
monitor traffic data or information in any computer resource.
2. Intermediary needs to provide technical assistance & extend
facilities to enable online access.
3. Procedures for monitor in shall be prescribed.
4. Any person who contravenes shall be punished with an
imprisonment for a term extended to three years and fine.
70
Protected system
1. The appropriate government may declare any computer
resource as critical information infrastructure to be a
protected system
2. The government may authorise persons to access protected
systems.
3. Any person who secures access to any protected systems
shall be punished with imprisonment for upto ten years and
fine also.
4. The central government may prescribe the practices and
procedures for such sytems.
70A
National Nodal Agency.
1. The central government by notification can designate any
organization as the national nodal agency in respect of critical
information infrastructure protection.
2. Nodal agency be responsible for all measures including R&D to
protection of critical information infrastructure.
3. The manner of performing functions and duties of the agency
referred as such may be prescribed.
70B
Indian Computer Emergency Response Team to serve as national
agency for incident response.
1. Indian Computer Emergency Response team to serve as
national agency for incident response.
2. The central government shall provide the agency referred
to in with a Director General & such other officers and
employees.
3. The salary & allowances of these officers shall be
prescribed.
4. Indian Computer Emergency Response Team shall perform
in these areas :-
a)collection,analysis & dissemination of information on
cyber incidents.
70B
4. Indian Computer Emergency Response Team shall perform
in these areas :-
b)forecast & alerts of cyber security incidents.
c)emergency measures for handling cyber security
incidents.
d) coordination of cyber incidents.
e) issue guidelines relating to information security
practices.
f)such other functions to cyber security as may be
prescribed.
5. The manner of performing functions and duties of the
agency shall be prescribed.
6. For carrying out the provisions the agency might call for
information from service providers.
7. Failing to comply shall be punishable with imprisonment
for a year with fine.
THANKS!

You might also like