Information Technology Act, 2000

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Flashcards about the Information Technology Act, 2000 and related concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Objective of the Information Technology Act, 2000

To provide legal recognition to electronic transactions, digital records, and punish cybercrimes.

2
New cards

Key Features of IT Act 2000

Legal recognition of digital signatures & e-documents, Facilitation of e-governance and e-commerce, Definition and punishment of cybercrimes, Certifying Authorities (CAs) and digital certificates, Jurisdiction beyond Indian territory if Indian IT systems are affected

3
New cards

New definitions added by the Information Technology (Amendment) Act, 2008

Cyber café, communication device, intermediary.

4
New cards

New cyber offenses included in the Information Technology (Amendment) Act, 2008

Identity theft (Section 66C), Phishing and cheating by impersonation (Section 66D), Privacy violation (Section 66E), Cyber terrorism (Section 66F)

5
New cards

Intermediary Liability (Section 79)

Protects platforms (like Facebook, YouTube) if they act on illegal content after being notified.

6
New cards

Section 69A

Website blocking powers to the Government.

7
New cards

Mandates of CERT-In Notification (April 2022 Guidelines)

Reporting cyber incidents within 6 hours, VPN providers to store user data for 5 years

8
New cards

Applicability of Intermediary Guidelines and Digital Media Ethics Code, 2021

Social media platforms, OTT platforms (e.g., Netflix), Digital news publishers

9
New cards

Highlights of Intermediary Guidelines and Digital Media Ethics Code, 2021

Mandatory grievance officer for platforms, Content takedown within 36 hours of court/official order

10
New cards

Digital Personal Data Protection Act, 2023

Focuses on data privacy rights of citizens, Introduces consent-based data usage, penalties for data breaches

11
New cards

Impact of IT Act on E-Commerce

Boosted online businesses.

12
New cards

Impact of IT Act on E-Governance

Enabled digital public services.

13
New cards

Impact of IT Act on Cybercrime Control

Defined punishable cyber offenses.

14
New cards

Impact of IT Act on Social Media Regulation

Clear liability of platforms.

15
New cards

Impact of IT Act on Digital Rights

Data privacy framework evolved.

16
New cards

Punishment for Identity Theft (Section 66C)

3 yrs + ₹1 lakh

17
New cards

Punishment for Cheating via impersonation (Section 66D)

3 yrs + ₹1 lakh

18
New cards

Punishment for Privacy Violation (Section 66E)

3 yrs + ₹2 lakh

19
New cards

Punishment for Cyber Terrorism (Section 66F)

Life Imprisonment

20
New cards

Punishment for Website Blocking (69A)

7 yrs + fine

21
New cards

Punishment for Breach of Lawful Contract (72A)

3 yrs + ₹5 lakh

22
New cards

Total Chapters in IT Act, 2000

13

23
New cards

Total Sections in IT Act, 2000

94 (including amendments)

24
New cards

Total Schedules in IT Act, 2000

2

25
New cards

Extent and Application of the Information Technology Act, 2000

It extends to the whole of India and also applies to offences committed outside India if it involves a computer or system located in India.

26
New cards

Cyber Cafe Definition

Facility offering internet access to the public.

27
New cards

Intermediary Definition

Any service provider like ISP, hosting, social media platform.

28
New cards

Offence under Section 43A – Failure to Protect Data

Companies mishandling sensitive personal data.

29
New cards

Offence under Section 43 – Damage to Computer Systems

Unauthorized access, downloading, introducing viruses, damaging data, disrupting services.

30
New cards

Offence under Section 66C – Identity Theft

Fraudulent use of someone else’s digital signature, password, etc.

31
New cards

Offence under Section 66F – Cyber Terrorism

Using computers to threaten national security, integrity or sovereignty.

32
New cards

Offence under Section 67 – Publishing Obscene Material

Online publication or transmission of obscene material.

33
New cards

The government can declare any computer resource as a (e.g. power grid, banking systems).

Protected System

34
New cards

Authority responsible for Critical Information Infrastructure

National Critical Information Infrastructure Protection Centre (NCIIPC)

35
New cards

Indian Computer Emergency Response Team (CERT-In)

Nodal agency for cyber incident response.

36
New cards

Breach of Confidentiality and Privacy

Discloses it without consent.

37
New cards

Bailability Offences

≤ 3 years imprisonment

38
New cards

Exemption for Intermediaries (Section 79)

Social media platforms or ISPs are not liable for third-party content if they act upon notice of illegality.

39
New cards

Power of Police to Enter and Search (Section 80)

Police can enter, search, and arrest without warrant for cyber offences under specific conditions.

40
New cards

Chairman and Members to be Public Servants

Central Government

41
New cards

Abetment of Offences

Anyone who abets (encourages or helps) the commission of a cyber offence will be punished just like the actual offender.

42
New cards

Offences by Companies

Every person in charge (e.g., directors, managers) at the time of the offence is liable, unless they prove no knowledge or due diligence.

43
New cards

Power to Make Rules

The Controller of Certifying Authorities (CCA)

44
New cards

GDPR (General Data Protection Regulation)

A data protection law enforced in the European Union (EU)

45
New cards

Right to be Forgotten

People can request deletion of their personal data if it is no longer needed.

46
New cards

Data Breach Notification

Companies must notify authorities and users within 72 hours of a data breach.

47
New cards

Article 33 – Data Breach Notification

Organizations must report data breaches within 72 hours.

48
New cards

A mobile app allows users to opt-in for location sharing instead of activating it by default.

Article 25 – Data Protection by Design and by Default