IT ACT, 2000 (Information Technology Act, 2000)

MsParasmaniJangid 8,242 views 75 slides Oct 27, 2021
Slide 1
Slide 1 of 75
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75

About This Presentation

Information Technology Act, 2000 – Definitions, objectives, Exception, Digital Signature/Electronic Signatures & Electronic Signature Certificate, Certifying Authority, E-Governance, Offences and Penalties, Cyber Appellate Tribunal


Slide Content

The Information
Technology Act, 2000
Asst Prof. Parasmani Jangid
SDJ International College

Content to be covered
Information Technology Act, 2000 –Definitions,
objectives, Exception
Digital Signature/Electronic Signatures & Electronic Signature Certificate
Certifying Authority
E-Governance
Offences and Penalties
Cyber Appellate Tribunal

Terms to be focused
Cyber crime : Cyber crime means criminal activities carries out by means
of computer or internet.
E-Commerce : Buying & Selling good and Services over electronic network
or internet.
Electronic Records : Information captured through electronic means. In pen
drive or in form of file, image, in mails, which are in readable form in
machine.
Digital signature : A way to ensure that an electronic document is authentic.
Authentic : confirmation about the sender, that is not been altered in any
way.
Access: "access", with its grammatical variations and cognate expressions,
means gaining entry into, instructing or communicating with the logical,
arithmetical or memory function resources of a computer, computer system
or computer network

Asymmetric Crypto System: "asymmetric crypto system" means a system of a
secure key pair consisting of a private key for creating a digital signature and a
public key to verify the digital signature
Communication Device: "communication device" means cell phones, personal digital
assistance or combination of both or any other device used to communicate, send or
transmit any text, video, audio or image
Computer: "computer" means any electronic, magnetic, optical or other high-speed
data processing device or system which performs logical, arithmetic and memory
functions by manipulations of electronic, magnetic or optical impulses, and includes
all input, output, processing, storage, computer software or communication facilities
which are connected or related to the computer in a computer system or computer
network
Computer Network: "computer network" means the inter-connection of one or more
computers or computer systems or communication device through-
(i)the use of satellite, microwave, terrestrial line, wire, wireless or other
communication media; and
(ii)terminals or a complex consisting of two or more inter-connected computers
or communication device whether or not the inter-connection is continuously
maintained

Computer System: "computer system" means a device or collection of
devices, including input and output support devices and excluding
calculators which are not programmable and capable of being used in
conjunction with external files which contain computer programmes,
electronic instructions, input data and output data that performs logic,
arithmetic, data storage and retrieval, communication control and other
functions
Cyber Security: "cyber security" means protecting information, equipment,
devices computer, computer resource, communication device and
information stored therein from unauthorised access, use, disclosure,
disruption, modification or destruction
Secure System: "secure system" means computer hardware, software, and
procedure that-
(a)are reasonably secure from unauthorised access and misuse;
(b)provide a reasonable level of reliability and correct operation;
(c)are reasonably suited to performing the intended functions; and
(d)adhere to generally accepted security procedures

Introduction
The United Nations General Assembly by resolution A/RES/51/162,
dated the 30 January 1997 has adopted the Model Law on Electronic
Commerce as adopted by the United Nations Commission on
International Trade Law. This is referred to as the UNCITRAL Model Law
on E-Commerce.
Following the United Nation(s) Resolution, India passed the Information
Technology Act, 2000 on 9
th
May 2000, which came into force on
October 17, 2000 (presented by Mr. PramodMahajan, IT Minister and
passed by president K.R. Narayan). The Information Technology
Act, 2000(also known asITA-2000, or theIT Act) is an Act of theIndian
Parliament(No 21 of 2000).
It is the primary law inIndiadealing withcyber crimeandelectronic
commerce.

The Information Technology Act, 2000 provides legal recognition tothe
transaction done via electronic exchange of data and other electronic
means of communication or electronic commerce transactions.
This also involves the use of alternatives to a paper-based method of
communication and information storage to facilitate the electronic filing
of documents with the Government agencies.

IT Act consists total 13 chapters, 94 sections and 4 schedules.
Section 1 to 16 : Legal Aspects & digital Signature
Section 17 to 42: Certifying Authorities
Section 43 to 47: Penalties & Compensation
Section 48 to 64: Appellate tribunals & appeal to High court
Section 65 to 78: Offences
Section 79 to 94: Miscellaneous of the act

Objectives
The Information Technology Act, 2000 was made applicable in India with following
objectives
1.To give legal recognition to any transaction (done electronically)or use of internet
2.To give legal recognition to digital signature for accepting any agreement via computer.
3.To provide facility of filling document online relating to school admission or registration in
employment exchange.
4.To provide legal recognition for storagein electronic format.
5.To stop computer crime and protect privacy of internet users.
6.To give legal recognition for keeping books of accounts by bankers and other companies
in electronic form.
7.To make more power to IPO, RBI and Indian Evidence Act, 1872 for restricting electronic
crime.
8.To amendthe Indian Penal Code, 1860, Indian Evidence Act, 1872, The Bankers’ Books
Evidence Act, 1891 and the Reserve Bank of India Act, 1934

Scope of the Act, section 1(4)
Information Technology Act, 2000 is applicable to all electronic transactions
exceptthe following –
a)A negotiable instrument (other than a cheque) as defined in section 13 of
the Negotiable Instruments Act, 1881;
b)A power-of-attorneyas defined in section 1A of the Powers of Attorney Act,
1882;
c)A trust (an obligations annexed to the ownership of the property) as defined
in section 3 of the Indian Trusts Act, 1882;
d)A willas defined in clause (h) of section 2 of the Indian Succession Act,
1925 including any other testamentary disposition by whatever name called;
e)Any contractfor the sale or conveyance of immovable property or any
interest in such property;
f)Any such class of documents or transactions as may be notified by the
Central Government in the Official Gazette.

Digital Signature Section: 3
As per Section 2(1) (p) of Information
Technology Act, 2000 “Digital
signature” means authentication of
any electronic record by a
subscriber by means of an
electronic method or procedure in
accordance with the provisions of
section 3.

What is a digital signature?
A Digital signature (standard electronic signature) takes the
concept of traditional paper-basedsigning and turns it into an
electronic “fingerprint”.
This fingerprint or coded message, is unique to both the
document and the signer and binds both of them together.
The digital signature ensures the authenticity of the signer.
Any changesmade to the document after it is signed
invalidatethe signature, thereby protecting against signature,
forgery and information tampering.
Digital signatures help organizations to sustain signer
authenticity, accountability, data integrity and non-repudiation
of electronic documents and forms.
Generally it used in electronic mail, contracts, or a message
sent etc.

Who issues digital Signature?
A digital signature is issued by a Certifying
Authority (CA) and is signed with the CA’s private
key.
A digital signature typically contains the: Owner’s
public key, the Owner’s name, Expiration date of
the public key, the Name of the issuer (the CA
that issued the Digital ID), Serial number of the
digital signature, and the digital signature of the
issuer. Digital signatures deploy the Public Key
Infrastructure (PKI) technology.

Cryptography
Cryptographyis the science of secret
writing with the intention of keeping the
data secret. Cryptography is classified
into symmetric cryptography,
asymmetric cryptography and hashing.

Type of cryptography
Symmetrical (private key)and Asymmetrical(public key)
Digital signatures employasymmetric cryptography.
In public key/ asymmetric cryptographycryptography, two
keys are used, one key is used for encryption and while the
other is used for decryption.
In public key cryptography, one of the two keys is kept as a
secret.
In this cryptography, sender and receiver does not need to
share the same key.
In this cryptography, public key can be public and private key
is private. (key just a sequence of no. it can be generated
randomly)

Electronic Signature Section:
3A
According to the US Federal ESIGN Act, that was passed in 2000,
“Electronic signature can be defined as an electronic symbol,
sound or process that is associated with a record or a contract
logically. An electronic signature is created or adopted by a
person in order to sign the record.”

Difference

Is Digital/Electronic Signature
Legal?
The electronic signatures are legalized and acts as a legal binding.
In the United States, the electronic signatures are legal and
recognized as the handwritten signatures after the approval of the
following acts:
Uniform Electronic Transactions Act (UETA) in 1999
Electronic Signatures in Global and National Commerce Act
(ESIGN) in 2000
Combined together, these two acts –UETA and ESIGN ACTallow
the usage of electronic signatures to replace the handwritten
signatures. It is required that an electronic signature meets the four
legal hallmarks of the e-signature.

four requirements for an
electronic signature (valid by
US Law)
The signer is who he/she claims to be.An electronic signature is
the identity of the signer. If required, the identity of the signer could
be authenticated or verified using a number of digital markers such
as an IP address.
The intention of the signer to sign is clear.The terms of the
document/ contract/ transaction should have been communicated
well with the signer. The signer should be intentionally agreed to
undergo the e-signing procedure.
It could be verified that the signature is associated with the
signed document.This parameter basically involves the signing
process such as how the document was signed, which process the
signer completed, and which documentation supports the electronic
transaction involving e-signature.
The record should be retained by the creator or sender.The
electronic signature records and documents should be created to
retain and reproduce accurately for further reference by all the
parties and individuals who are responsible to retain the record or
contract.

Types of Electronic Signature
Click-to-Sign Signatures (check box)
Basic Electronic Signatures (witness digital signature,
just like paper sign)
Advanced Electronic Signatures (standard
signature, legally binding). eIDAS-regulation regarding
electronic identification and electronic transactions in the
internet market, is known as the advanced electronic
signature.
Qualified Electronic Signatures (produced through
qualified trust service providers (QTSPs), carries the
highest probative value)

“Click to
Sign”
Basic e-
Signatures
Advanced
eSignatures
Qualified
eSignatures
User Authentication No No Yes Yes
User Consent No No Yes Yes
User’s Signature Mark Yes Yes Yes Yes
Document Integrity No Yes Yes Yes
Bind Signer’s ID to DocNo No Yes Yes
Certify Signature No No Yes Yes
Embedded Evidence No No Yes Yes
Long Term VerifiabilityNo No Yes Yes

Electronic Signature Used for
Invoices, sales contracts, and NDAs
Employee paperwork, timesheets, and approve
proposals
School forms, permission slips, and release
forms
Leases, property, and other housing and rental
agreements
Bank forms, tax documents, and insurance forms

can not use e-signatures
while dealing with
Marriage registration
Family law, and
Inheritance rights

Benefits of Using Electronic
Signature
Get documents signed fast
Sign documents from anywhere
Save money with e-signature software
packages
Collect secure and legally binding signatures
Effort and time saving to handle technical
hassles
Increased service and efficiency

Certifying Authorities
Section 2 (1)(g)
Certifying authority means a person
who has been granted a licenceto
issue and electronic signature
certificate under section 24 of IT ACT,
2000.

Certifying Authorities
The information Technology Act, 2000 has established a
Certifying Authority to regulate the electronic
transactions.
Trusted person who issue Digital Certificates & public-
private key pairs.
It assures that the one who is transferring the certificate
is, in fact, he or she claims to be/ proves the owner of
the certificate. (authentication)
When one applies for digital license or digital. Certificate
thenthe third party who verifies the physical documents
is also certifying authorities
Introduction & roles of Certifying Authorities

The Act provide for the Controller of
Certifying Authorities (CCA) to licence
and regulate the working of Certifying
Authorities (CAs). CCA also ensures
that none of the provisions of the Act
are violated.

The regulation of certifying authorities or electronic signature
infrastructure in India consists of :
Controller of Certifying Authority (CCA). The IT Act, 2000
provides for an appointment, functions, powers, duties of CCA
(the apex regulatory body for certifying authorities in India) and
other officers.
Certifying Authorities (CAs). A certifying authority is a trusted
third party or entity that will get licence from the controller and
will issue electronic signature certificate to the users of e-
commerce. These authorities will function under the supervision
and control of the controller of certifying authorities.

Who can be applicant for CA
Individual
Company
Partnership Firm
Government

General Conditions for
applicants
No conditions will apply to government but other three
entities must fulfill the same.
No licenceshall be provided in case of failure in
satisfying conditions with respect to Qualification,
expertise, manpower, financial resources and
infrastructure facilities as prescribed by the central
government.
Licencegranted under this section shall be :
Valid for period prescribed by Central govt.
Not be transferable or heritable
Subjected to such terms and conditions as may be
specified by the regulations.

Conditions for an individual
Citizen of India
Must have capital of 5 crorerupees or
more in his business or profession

Conditions for a Company
Must have paid-up capital of not less than 5
crorerupees and networthof not less than 50
crorerupees
Provided no company shall be eligible for
grant of licenceif equity share capital held by
NRI exceeds 49% of its capital.
Provided further company must have the
networthof its majority shareholders holding
at least 51 % of paid up capital

Conditions for a Partnership
Firm
Must have subscribed capital of not less than 5
crorerupees and networthof not less than 50
crorerupees (total of all partners)
Partner and partnership shall have the meaning
under Indian Partnership Act, 1932.
Provided no company shall be eligible for grant of
licenceif equity share capital held by NRI
exceeds 49% of its capital.
Provided further company must have the
networthof its majority shareholders holding at
least 51 % of paid up capital

Condition regarding
performance bond
Except government , other three applicants must
submit the performance bond in the form of a
banker’s guarantee from a schedule bank of 50
lacrupees.
In case of newly registered company or firm
must have submit the bond of 1 crorerupees,
not applicable only when , newly established
company or firm acquired net worth not less
than 50 crorein last one year only

Some licencecertifying
authorities in India
Safescrypt
National Informatics Centre (NIC)
TataConsultancy Services (TCS)
e Mudra
Capricorn

Regulation of Certifying
Authorities (Section 17 to 34)
Section 17 : Appointment of controller &other officers
(Certifying Authorities).
The Central government may appoint a controller but after
notifying in the official gazette. they may also appoint deputy
controllers and assistant controllers.
Controller works under the direction of central government
while deputy controllers and assistant controllers shall perform the
functions under the control of controller.
Qualification of the officer shall be prescribed by central government
and the controller will be given a office seal.
The Head office and branch office will be decided by Central
government.
There will be office seal of controller.

Section 18 functions of controller.
basically the controller supervisethe activity of certifying
authorities.
It also lay down the duties of certifying authorities.
Controller resolve any conflictbetween certifying authorities and
subscribers.
Maintain a database containing record of every certifying authority.
It certifies public keys of the certifying Authorities
It specifies manner in which books of account shall be maintained.
It also specify the terms and conditions subject to which auditors
may be appointed and the remuneration to be paid

Section 19 : It is for recognition of foreign certifying
authority.
Controller first get the approval from central government
and by notification in official gazette, foreign certifying
authority will be recognized.
The digital signature certificate will be valid for the purpose of
this act.
The controller may revoke such recognition if certifying
authority contravened any condition subject to which it was
recognised.

Section 20 : Controller to act as repository
Controller shall be repository of all digital signature
certifiacate
shall observe the standards as may be prescribed by
central govt. to ensure the security and secrecy of digital
signature.
Maintained a computeriseddata base of all the public
keys
Shall use hardware software and procedure that are
secure

Section 21 : Licenceto issue digital signature certificates
any person may make an applicationto the controller for a
licenceto issue digital signature certificates.
No licenceshall be provided in case of failure in satisfying
conditions with respect to Qualification, expertise, manpower,
financial resources and infrastructure facilities as prescribed
by the central government.
Licencegranted under this section shall be :
Valid for period prescribed by Central govt.
Not be transferable or heritable
Subjected to such terms and conditions as may be specified
by the regulations.

Section 22 : Application for licence
must be in prescribed form given by central
government
A certification practice statement
Statement including identification of applicant
Payment of fees (not exceed 25 k)
Other documents

Section 23 : Renewal of Licence
In a prescribed form, accompanied by
prescribed form,
Have to apply not less than 45 days
before the date of expiry.

Section 24: Procedure for grant or
rejection of licence
Verifying the documents with application
and then he will grant or reject the
application
Reasonable opportunity of presenting
applicants case will be given before
rejecting the application.

Section 25 : Suspension of licence
in case of incorrect or false statement
presented by CA or not complying with
terms and conditions.

section 26 notice of suspension or revocation of license (published in
database)
Section 27 power to delegate (duties & all to subordinates)
section 28 power to investigate contraventions (rights with all CA)
section 29 access to computers and data (in case of breach of
conditions)
section 30 certifying authority to follow certain procedure (hardware
software must be secured)
section 31 certifying authority to ensure compliance of the act et
cetera(comply course of rule)
section 32 display of license
section 33 surrender of license (after revocation of license)
section 34 disclosure (materially or adversely affecting the reliability
of digital signature certificates.)

E-Governance
Electronic Governance is the process
with the aim of enhancing govt. ability to
address the need of the general public.
The basic purpose of e-Governance is
to simplify process for all i.e. Govt.,
citizen, business etc. at National, State
and local level.

E-Governance
E-governance is the application of information
and communication technology (ICT) for
delivering government services, exchange of
information, communication transactions,
integration of various stand-alone system.
The basic purpose of e-governance is to
simplify processes for all, i.e. government,
citizens, businesses, etc. at National, State and
local levels.

In short, it is the use of electronic means,
topromote good governance. It connotes the
implementation of information technology in the
government processes and functions so as to
causesimple, moral, accountable and
transparent governance. It entails the access
and delivery of government services,
dissemination of information, communication in
a quick and efficient manner.

Types of Interactions in E-
Governance
G2G (Government to Government): When the exchange of
information and services is within the periphery of the
government, is termed as G2G interaction. This can be both
horizontal, i.e. among various government entities and vertical,
i.e. between national, state and local government entities and
within different levels of the entity.
G2C (Government to Citizen): The interaction amidst the
government and general public is G2C interaction. Here an
interface is set up between government and citizens, which
enables citizens to get access to wide variety of public
services. The citizens has the freedom to share their views
and grievances on government policies anytime, anywhere.
(E-voting or tax file)

Types of Interactions in E-
Governance
G2B (Government to Business): In this case, the e-
governance helps the business class to interact with the
government seamlessly. It aims at eliminating red-tapism,
saving time, cost and establish transparency in the business
environment, while interacting with government. (E-tender, e-
finacialsupport)
G2E (Government to Employees): The government of any
country is the biggest employer and so it also deals with
employees on a regular basis, as other employers do. ICT
helps in making the interaction between government and
employees fast and efficient, along with raising their level of
satisfaction by providing perquisites and add-on benefits.
(online payment to govt. employees)

Benefits
Reduced Corruption
High Transparency (linked AD card, PAN card)
Increased Convenience
Growth in GDP
Direct participation of Constituents
Expanded reach of government
Increases speed and saving cost

E-Governance (Section 4 to10
A)
Section 4: Legal Recognition of Electronic record
Section 5: Legal Recognition of Electronic Signature
Section 6: Use of e-records and e-signature in govt.
and it’s agencies.
Section 6 A: Delivery of services by service provider
Section 7: Retention of electronic records
Section 7 A: Audit of documents etc. maintained in
electronic form.

Section 8: Publication of rule, regulations
etc. in electronic gazette.
Section 9: Sec 6, 7 & 8 not to confer rights
to insist document should be accepted in
electronic form
Section 10: power to make rules by central
govt. in respect or e-signature.
Section 10 A: Validity of contracts formed
through electronic means.

Offences and penalties under
IT Act,2000 (Section 65 to 71)
Section 65 : Tampering with computer source documents (conceals,
destroys, alters, etc. intentionally done) The object of the section is to
protect the “intellectual property” invested in the computer.
Section 66 : Hacking with computer system (related to Sec 43)
Section 66 A : 2009 amendment for sending offensive messages
Section 66 B: Receiving stolen computer or communication device
Section 66 C: using password of another person& identity theft
(fraudulently using password, signature or UID or OTP)
Section 66 D: Cheating by personating by using computer resource
Section 66 E: (Violation of privacy) Publishing Private images of others
Section 66 F: Acts of cyber terrorism, to strike terror (against country’s
integrity, security, sovereignty, unity)

Section 67: Publishing information which is obscene in electronic
form. ( immoral, not decent)
Section 67 A: Publishing images containing sexual act
Section 67 B: Publishing child porn or predating children online
Section 67 C:Failure to maintain /retain records
Section 68: Failure/refusal to comply with orders of controller
Section 69: Failure/ refusal to decrypt the data (for india)
Section 70: Securing access or attempting to secure access to a
protected system
Section 71: Misrepresentation (about material Fact)

Case-law
Girl victim Boy culprit
Obscene message
Published offensive message
Create fake FB profile, uploaded obscene image
Section applied 66C 66D 67 67A
ShreyaSinghalvsUnion of India (sec 66A)
2015
Bal Thackery’sdeath and Mumbai was announced to be shut down;
2012
2 Girls posts against it on face book
Sec 66A, 69A and 79 of IT Act are against Article 19(1)(a)-(Freedom of
expression), Article 14-(Right to Equality), Article 21-(Right to life)

Feb 2017 Delhi based E-commerce
company portal (hackers done the
digital shop lifting)
Raj Kundracase
Sec 67 publishing or transmission of obscene
Sec 67 A Publishing images
Sec 67 B Child pornography

Section
Offence Penalty
65 Tampering with computersource documents
Imprisonment up to 3 years, or/and with fine up
toRs200,000
66 Hackingwith computer system
Imprisonment up to 3 years, or/and with fine up
toRs500,000
66B Receiving stolen computer or communication device
Imprisonment up to 3 years, or/and with fine up
toRs100,000
66C Using password of another person
Imprisonment up to 3 years, or/and with fine up
toRs100,000
66D Cheating using computer resource
Imprisonment up to 3 years, or/and with fine up
toRs100,000
66E Publishingprivate imagesof others
Imprisonment up to 3 years, or/and with fine up
toRs200,000
66F Acts ofcyber terrorism Imprisonment up to life.
67
Publishing information which isobscenein
electronic form.
Imprisonment up to 5 years, or/and with fine up
toRs1,000,000
67A Publishing images containingsexual acts
Imprisonment up to 7 years, or/and with fine up
toRs1,000,000
67B Publishingchild pornorpredating childrenonline
Imprisonment up to 5 years, or/and with fine up
toRs1,000,000 on first conviction. Imprisonment up
to 7 years, or/and with fine up toRs1,000,000 on
second conviction.
67C Failure to maintain records Imprisonment up to 3 years, or/and with fine.

Section Offence Penalty
68 Failure/refusal to comply with orders
Imprisonment up to 2 years, or/and with fine up
toRs100,000
69 Failure/refusal todecrypt data Imprisonment up to 7 years and possible fine.
70
Securing access or attempting to secure access to
a protected system
Imprisonment up to 10 years, or/and with fine.
71 Misrepresentation
Imprisonment up to 2 years, or/and with fine up
toRs100,000
72 Breach of confidentiality and privacy
Imprisonment up to 2 years, or/and with fine up
toRs100,000
72A
Disclosure of information in breach of lawful
contract
Imprisonment up to 3 years, or/and with fine up
toRs500,000
73
Publishing electronic signature certificate false in
certain particulars
Imprisonment up to 2 years, or/and with fine up
toRs100,000
74 Publication for fraudulent purpose
Imprisonment up to 2 years, or/and with fine up
toRs100,000

Penalties and Compensation
(Section 43 to 45)
Section 43: Penalty & compensation for damage to computer, computer
system, etc. (access or copy or destroy or delete)( penalty shall not
exceeds 1 crorerupees) (spyware)
Section 43 A: Compensation for failure to protect data (for corporate
body)(penalty shall not exceed 5 crorerupees)
Section 44: penalty for failure to furnish information, returns, etc. (for an
individual) (penalty shall not exceed 1.5 lacrupees)
Section 44 B: Required to file any returns within time period (for an
individual) (penalty shall not exceed 5 K rupees)
Section 44 C: Fails to maintain books of accounts(for an individual)
(penalty shall not exceed 10 k rupees)
Section 45: Residuary Penalty(such contravention and penalties (for a
person) which are not mentioned seperately(penalty shall not exceed 25 K
rupees)

Cyber Appellate Tribunal
(Section 48 to 58)
Section 48 Establishment
The central government notifies and
establishes appellate tribunals called
Cyber Regulations Appellate Tribunal.
Central government also specifies all the
matters and places which fall under the
jurisdiction of the tribunal.

Section 49 Composition
Central government only appoints a person in a tribunal
“The Presiding Officer” of cyber appellate tribunal
(before amendments)
After 2008, one chairperson and few members ( central
govt. can consult with CJI)
One branch includes one chairperson and two members
(can use CAT’s power)
Transfer of two other member is possible by chair
person

Section 50 Qualification for appointment as Chairperson &
Members
For chairpersonSame as Judge of a high court (article 217,
Indian citizen and 10 years experience as advocate in HC or
10 years experience as judicial officer in india)
For Members(special knowledge & professional Experience
in IT, Telecommunications, Industry. Management, Consumer
Affairs)
Must have worked in service of central or state govt. or
additional secretary of govt. of indiaorequivalent post for at
least 1 year or joint secretary or equivalent post for at least 7
year.

Section 51: The term of Office
5 years from the date of joining or until
he turns into 65, w.i.e.
Must not have personal benefit.
Must retire from the current services.

Section 52: Salary, allowances and other terms
and conditions of service of Presiding Officer.
Decided by central govt.
The salary and allowances payable to, and the
other terms and conditions of service including
pension, gratuity and other retirement benefits of,
the Presiding Officer of a Cyber Appellate
Tribunal shall be such as may be prescribed

Section 52 A: Power of chairperson General
superintendence & directions in affairs of tribunal
Section 52 B: Distribution of business among
benches/branches
Section 52 C: Power of chairperson to transfer
casesApplication by the party, after hearing the
case, without notice also
Section 52 D: Decision by Majority

Section 53 Filling up of vacancies
To fill the vacancy central government
hires another person except temporary
reason
Proceedings will continue with new
officer.

Section 54: Resignation or Removal
Notice to central government
Holds the office for 3 month after notice (can leave early
only if govt. permits)
Or
Till appointment of successor
Or
Expiry of his office, w.i.e.
Removal in case of misbehavior by officer, case will be
file by supreme court and enough opportunity will be
given to defend himself.

Section 55: Orders constituting Appellate Tribunal
to be final and not to invalidate its proceedings
Section 56: Staff of the Cyber Appellate Tribunal
The Central Government shall provide the
Cyber Appellate Tribunal with such officers
and employeesas that Government may think fit.
The officers and employees of the Cyber Appellate
Tribunal shall discharge their functions under
general superintendence of theChairperson.

Section 57: Appeal to cyber Appellate Tribunal
If not satisfied with controller or adjudicating officer’s
order then only one can go to appeal in CAT within 45
days with fees.
In case of any considerable reason of being late in
appealing, the tribunal can consider such case.
2 copies of orders one with adjudicating officer and
other with all parties.
CAT ties to dispose such appeal within 6 month

Section 58: Procedure and powers of Cyber Appellate Tribunal
All proceedings will be same as judicial proceedings of civil
court.(principles of natural justice, code of civil procedures,1908)
According to code of civil procedures,1908 Summon, examining on
Oath
Production of documents
Evidence on affidavits
Issuing commission for examining
CAT can review its own decisions
Dissmissthe application

Section 59: right to legal representation (self or
legal practitioner)
Section 60:limitation (Act 1963)
Section 61: Civil court not to have Jurisdiction
Section 62: Appeal to HC within 60 days to order or
judgement
Section 63: Compounding of contraventions
(should not exceed the max. amt of penalty)
Section 64: Recovery of penalty or compensation
(land revenue or suspension of ESC)