
|
THE INFORMATION TECHNOLOGY ACT, 2000 |
|
|
CHAPTER I |
|
|
PRELIMINARY |
|
|
What is the short title of the Act? |
Information Technology Act, 2000 |
|
To what geographical extent does the IT Act, 2000 apply? |
The whole of India |
|
Does the IT Act, 2000 apply to offences committed outside India? |
Yes, to any person committing an offence or contravention outside India |
|
What does Section 1(2) of the IT Act, 2000 primarily deal with? |
Extent and application |
|
Section 2(a) defines |
access |
|
Section 2(b) defines |
Addressee |
|
Section 2(c) defines |
adjudicating officer |
|
Section 2(d) defines |
Affixing |
|
Section 2(da) defines |
Appellate Tribunal |
|
Section 2(e) defines |
appropriate Government |
|
Section 2(f) defines |
asymmetric crypto system |
|
Section 2(g) defines |
Certifying Authority |
|
Section 2(h) defines |
certification practice statement |
|
Section 2(ha) defines |
communication device |
|
Section 2(i) defines |
Computer |
|
Section 2(j) defines |
computer network |
|
Section 2(k) defines |
computer resource |
|
Section 2(l) defines |
computer system |
|
Section 2(m) defines |
Controller |
|
Section 2(na) defines |
cyber café |
|
Section 2(nb) defines |
cyber security |
|
Section 2(o) defines |
Data |
|
Section 2(p) defines |
digital signature |
|
Section 2(q) defines |
Digital Signature Certificate |
|
Section 2(r) defines |
electronic form |
|
Section 2(s) defines |
Electronic Gazette |
|
Section 2(t) defines |
electronic record |
|
Section 2(ta) defines |
electronic signature |
|
Section 2(tb) defines |
Electronic Signature Certificate |
|
Section 2(u) defines |
Function |
|
Section 2(ua) defines |
Indian Computer Emergency Response Team |
|
Section 2(v) defines |
Information |
|
Section 2(w) defines |
Intermediary |
|
Section 2(x) defines |
key pair |
|
Section 2(y) defines |
Law |
|
Section 2(z) defines |
Licence |
|
Section 2(za) defines |
Originator |
|
Section 2(zb) defines |
Prescribed |
|
Section 2(zc) defines |
private key |
|
Section 2(zd) defines |
public key |
|
Section 2(ze) defines |
secure system |
|
Section 2(zf) defines |
security procedure |
|
Section 2(zg) defines |
Subscriber |
|
Section 2(zh) defines |
verify |
|
Under the IT Act, who can commit an offence outside India and still be held liable under this law? |
Any person |
|
What does the term 'Access' mean under the IT Act, 2000? |
Gaining entry into, instructing, or communicating with the logical, arithmetical, or memory function resources of a computer, computer system, or computer network |
|
Who is considered an 'Addressee' in the context of electronic records? |
A person who is intended by the originator to receive the electronic record but does not include any intermediary |
|
What is the role of an 'Adjudicating Officer' under the IT Act, 2000? |
To resolve disputes related to cybercrimes and contraventions of the Act |
|
What does 'Affixing Electronic Signature' mean? |
Adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature |
|
Who is the 'Appropriate Government' as per the IT Act, 2000? |
The Central or State Government, depending on the matter |
|
What is an 'Asymmetric Crypto System'? |
A system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature |
|
Who is a 'Certifying Authority'? |
A person who has been granted a licence to issue a Digital Signature Certificate under section 24 |
|
What does 'Certification Practice Statement' refer to? |
A statement issued by a Certifying Authority to specify the practices that the Certifying Authority employs in issuing Digital Signature Certificates |
|
Define 'Computer' as per the IT Act, 2000. |
Any electronic, magnetic, optical, or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic, or optical impulses |
|
What constitutes a 'Computer Network'? |
The interconnection of one or more computers or computer systems or communication devices through communication media |
|
What does 'Computer Resource' include? |
Computer, communication device, computer system, computer network, data, computer database, or software |
|
Define 'Computer System'. |
A device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files |
|
Who is the 'Controller' under the IT Act, 2000? |
The Controller of Certifying Authorities appointed under sub-section (7) of section 17 |
|
What is a 'Cyber Appellate Tribunal'? |
A tribunal established to hear appeals against orders passed by the Adjudicating Officer |
|
Define 'Data' as per the IT Act, 2000. |
A representation of information, knowledge, facts, concepts, or instructions which are being prepared or have been prepared in a formalized manner |
|
What is a 'Digital Signature'? |
Authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3 |
|
What does 'Digital Signature Certificate' mean? |
A certificate issued under sub-section (4) of section 35 |
|
Define 'Electronic Form' with reference to information. |
Information generated, sent, received, or stored in media such as magnetic, optical, computer memory, microfilm, computer-generated microfiche, or similar device |
|
What is 'Electronic Gazette'? |
Official Gazette published in electronic form |
|
Define 'Electronic Record'. |
Data, record or data generated, image or sound stored, received, or sent in an electronic form or microfilm or computer-generated microfiche |
|
CHAPTER II |
|
|
DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE |
|
|
What is the primary focus of Section 3 of the IT Act, 2000? |
Authentication of electronic records |
|
How can an electronic record be authenticated under the IT Act, 2000? |
Using a secure digital signature |
|
As per Section 3, who is responsible for authenticating an electronic record? |
The subscriber |
|
Which cryptographic method is used for digital signatures in the IT Act, 2000? |
Asymmetric cryptography |
|
What are the components of the asymmetric crypto system used for authentication? |
A private key and a public key |
|
What does the private key do in the digital signature process? |
It is used by the subscriber to create the digital signature |
|
What is the role of the public key in the digital signature process? |
To verify the digital signature created by the private key |
|
Under Section 3, when is a digital signature considered secure? |
When it is created in a manner prescribed by the Central Government using a secure system |
|
What ensures the integrity and authenticity of an electronic record under Section 3? |
Use of a digital signature |
|
Which government authority prescribes the secure procedure for digital signatures under the IT Act? |
Central Government |
|
What is the focus of Section 3A of the IT Act, 2000? |
Electronic signatures as a means of authentication |
|
Section 3A was inserted into the IT Act, 2000 through which amendment? |
IT Amendment Act, 2008 |
|
What does Section 3A allow in addition to digital signatures? |
Other electronic signatures that are secure and reliable |
|
According to Section 3A(1), an electronic signature is considered valid if it is: |
Reliable and fulfills the conditions prescribed by the Central Government |
|
Who prescribes the conditions for reliability of electronic signatures under Section 3A? |
Central Government |
|
What is one of the key conditions under Section 3A(2) for an electronic signature to be reliable? |
It must be linked uniquely to the signatory |
|
Under Section 3A(2), any electronic signature or electronic authentication technique shall be considered reliable if any alteration to the electronic signature made after affixing such signature |
is detectable |
|
According to Section 3A(3), what power does the Central Government have regarding electronic signatures? |
To prescribe procedures and standards for electronic signatures |
|
Which term best describes the legal effect of a valid electronic signature under Section 3A? |
Legally recognized authentication |
|
The reliability test for electronic signatures under Section 3A(2) includes? |
Identification of the signatory and control over creation data |
|
What is the importance of Section 3A in the context of modern e-governance? |
It enables acceptance of multiple secure electronic authentication methods |
|
Section 3A(2)(d) states that an electronic signature shall be considered reliable if: |
any alteration to the information made after its authentication by electronic signature is detectable |
|
What is meant by "electronic signature creation data" as implied in Section 3A? |
Unique credentials like private keys or credentials used to generate a signature |
|
According to Section 3A, if an electronic signature meets the prescribed standards, it shall have: |
Presumptive legal validity |
|
CHAPTER III |
|
|
ELECTRONIC GOVERNANCE |
|
|
What does Section 4 of the IT Act, 2000 primarily deal with? |
Legal recognition of electronic records |
|
According to Section 4, if any law requires information to be in writing or printed form, it is deemed to be satisfied if: |
The information is available in an electronic form and accessible for future reference |
|
Section 4 grants electronic records: |
Equal legal status as written documents |
|
Which phrase best reflects the intent of Section 4 of the IT Act? |
“Digital equivalence of paper records” |
|
Is physical signature necessary for documents covered under Section 4? |
No, if the electronic record is valid and accessible |
|
What is implied when a law requires something to be in writing and it is presented electronically as per Section 4? |
The electronic form is sufficient if it can be retained and referred to later |
|
What is the primary focus of Section 5 of the IT Act, 2000? |
Legal recognition of electronic signatures |
|
According to Section 5, where any law requires a signature or any document to be signed, that requirement is deemed satisfied by: |
An electronic signature affixed in a manner prescribed by the Central Government |
|
Under Section 5, an electronic signature has the same legal validity as: |
A handwritten signature or a physical signature |
|
What is meant by “electronic signature” under Section 5? |
An electronic method of authentication using procedures prescribed by law |
|
What is the primary focus of Section 6 of the IT Act, 2000? |
Use of electronic records and electronic signatures in government and its agencies |
|
What is the primary focus of Section 6A of the IT Act, 2000? |
Delivery of services by service providers in electronic form |
|
What is the primary focus of Section 7 of the IT Act, 2000? |
Retention of electronic records |
|
According to Section 7, service providers or entities dealing with electronic records must ensure that the records are: |
Retained in their original electronic format for a prescribed period |
|
Section 7 of the IT Act mandates that electronic records be retained in a manner that: |
Ensures that the content remains accessible and usable for future reference |
|
The retention period for electronic records as prescribed under Section 7 is: |
Specified by the Central Government |
|
What is the primary purpose of Section 7A of the IT Act, 2000? |
To mandate the audit of documents maintained in electronic form |
|
Section 7A of the IT Act, 2000 requires that: |
Electronic records be audited periodically to ensure compliance with regulations |
|
What is the primary purpose of Section 8 of the IT Act, 2000? |
To mandate the publication of rules, regulations, and notifications in the Electronic Gazette |
|
Under Section 8, rules, regulations, and notifications issued under the IT Act must be published in: |
The Electronic Gazette |
|
Section 8 of the IT Act, 2000 applies to the publication of: |
Rules, regulations, and notifications under the IT Act |
|
What is the significance of publishing rules, regulations, etc., in the Electronic Gazette under Section 8? |
It ensures they are legally binding and publicly accessible |
|
Who is responsible for the publication of rules, regulations, etc., in the Electronic Gazette under Section 8? |
The Central Government or any authority designated by the government |
|
What is the legal effect of publishing a rule, regulation, or notification in the Electronic Gazette according to Section 8? |
It is considered legally binding and effective as if it had been published in a physical Gazette |
|
Who has the Power to make rules under section 10 in respect of electronic signature? |
by Central Government |
|
What is the primary focus of Section 10A of the IT Act, 2000? |
To ensure that contracts formed through electronic means are valid |
|
Which is a requirement for a contract to be valid under Section 10A? |
The contract must be formed through electronic means, in compliance with the IT Act |
|
CHAPTER IV |
|
|
ATTRIBUTION, ACKNOWLEDGEMENT AND DESPATCH OF ELECTRONIC RECORDS |
|
|
What is the main focus of Section 11 of the IT Act, 2000? |
Attribution of electronic records to their originator |
|
According to Section 11, an electronic record is attributed to the originator when: |
It is sent from the originator’s computer or device |
|
In the context of Section 11, what is meant by "originator" in relation to an electronic record? |
The person who sends or generates the electronic record |
|
What is the primary focus of Section 12 of the IT Act, 2000? |
To establish the process for acknowledging the receipt of electronic records |
|
According to Section 12, when an electronic record is received, the recipient is required to acknowledge the receipt? |
within a reasonable time |
|
What is the purpose of acknowledgment of receipt under Section 12 of the IT Act? |
To confirm that the recipient has received the electronic record |
|
Which provision deal with “Time and place of despatch and receipt of electronic record”? |
Sec.13 |
|
For the purposes of section 13 if the originator or the addressee has more than one place of business, the principal place of business |
shall be the place of business |
|
For the purposes of section 13 if the originator or the addressee does not have a place of business, his usual place of residence |
shall be deemed to be the place of business |
|
What is the primary focus of Section 14 of the IT Act, 2000? |
To ensure that electronic records are secure and protected from tampering |
|
Under Section 14, what is required for an electronic record to be considered "secure"? |
It must be encrypted and protected against unauthorized access |
|
What is the primary focus of Section 15 of the IT Act, 2000? |
To define the process for creating and validating electronic signatures |
|
According to Section 15, what is a "secure electronic signature"? |
A signature that is digitally signed with encryption techniques and linked to the signer |
|
An electronic signature shall be deemed to be a secure electronic signature if |
the signature creation data, at the time of affixing signature, was under the exclusive control of signatory and no other person |
|
An electronic signature shall be deemed to be a secure electronic signature if |
the signature creation data was stored and affixed in such exclusive manner as may be prescribed. |
|
In case of digital signature, “the signature creation data” means |
the private key of the subscriber. |
|
What is the primary objective of Section 16 of the IT Act, 2000? |
To ensure the implementation of security procedures for electronic records and transactions |
|
Who prescribe the security procedures and practices under Section 16 of the IT Act, 2000? |
Central Government |
|
CHAPTER VI |
|
|
REGULATION OF CERTIFYING AUTHORITIES |
|
|
According to Section 17 of the IT Act, 2000, who is responsible for the appointment of the Controller and other officers? |
The Central Government |
|
Section 17 of the IT Act, 2000, specifies the appointment of which positions? |
The Controller of Certifying Authorities |
|
The Central Government may, also by the same or subsequent notification appoint under sec 17: |
such number of Deputy Controllers, Assistant Controllers, other officers and employees |
|
The Controller shall discharge his functions under this Act subject to the general control and directions: |
of the Central Government |
|
The Deputy Controllers and Assistant Controllers shall perform the functions assigned to them by the Controller under the general superintendence and control of: |
the Controller |
|
The qualifications, experience and terms and conditions of service of Controller, Deputy Controllers, Assistant Controllers, other officers and employees shall be such as may be prescribed by: |
the Central Government. |
|
There shall be a seal of the Office of: |
the Controller |
|
What is the primary function of the Controller of Certifying Authorities as outlined in Section 18 of the IT Act, 2000? |
To oversee the working of Certifying Authorities and ensure they comply with the provisions of the Act |
|
Under Section 18 of the IT Act, 2000, the Controller is responsible for: |
Ensuring the proper functioning of Certifying Authorities and electronic signatures |
|
Which is a responsibility of the Controller under Section 18 of the IT Act? |
Issuing guidelines to Certifying Authorities for the issuance of digital certificates |
|
Which provision deal with “Recognition of foreign Certifying Authorities.”? |
Sec.19 |
|
Who recognise any foreign Certifying Authority as a Certifying Authority for the purposes of this Act? |
the Controller may with the previous approval of the Central Government, and by notification in the Official Gazette |
|
The Controller may, if he is satisfied that any Certifying Authority has contravened any of the conditions and restrictions subject to which it was granted recognition under sub-section (1) he may |
For reasons to be recorded in writing, by notification in the Official Gazette, revoke such recognition. |
|
Under Section 21 of the IT Act, 2000, who is authorized to issue electronic signature certificates? |
the Controller |
|
What is the primary requirement for an entity to issue electronic signature certificates under Section 21 of the IT Act, 2000? |
The entity must obtain a license from the Controller |
|
A licence granted under Section 21 of the IT Act, 2000 shall: |
(a) be valid for such period as may be prescribed by the Central Government; (b) not be transferable or heritable |
|
According to Section 22 of the IT Act, 2000, Every application for a licence to issue electronic signature certificates shall be in such form as may be prescribed by: |
the Central Government |
|
Every application for issue of a licence under Section 22 of the IT Act, 2000 shall be accompanied by: |
(a) a certification practice statement; (b) a statement including the procedures with respect to identification of the applicant; (c) payment of such fees, not exceeding twenty-five thousand rupees |
|
Which provision deal with “Renewal of licence”? |
Sec.23 |
|
An application for renewal of a licence shall be in such form and accompanied by such fees: |
not exceeding five thousand rupees, as may be prescribed by the Central Government |
|
An application for renewal of a licence shall be in such form and accompanied by such fees and shall be made: |
Not less than forty-five days before the date of expiry of the period of validity of the licence. |
|
Which provision deal with “Procedure for grant or rejection of licence”? |
Sec.24 |
|
What can the Controller do, on receipt of an application under sub-section (1) of section 21, after considering the documents accompanying the application and such other factor? |
grant the licence or reject the application |
|
Can an application be rejected under section 24 unless the applicant has been given a reasonable opportunity of presenting his case? |
No |
|
How can a Certifying Authority reinstate a suspended licence under Section 25 of the IT Act? |
By complying with the terms and conditions set by the Controller for reinstatement |
|
What happens if a Certifying Authority’s licence is suspended and it fails to comply with the terms of suspension under Section 25? |
The Controller may revoke the licence permanently |
|
Can a licence be revoked unless the Certifying Authority has been given a reasonable opportunity of showing cause against the proposed revocation? |
No Constitution Act Free One Liner Notes
|
|
No licence shall be suspended for a period exceeding how many days unless the Certifying Authority has been given a reasonable opportunity of showing cause against the proposed suspension? |
Ten days |
|
Can the Certifying Authority whose licence has been suspended issue any electronic signature Certificate during such suspension? |
No |
|
Under Section 26 of the IT Act, 2000, when a Certifying Authority’s licence is suspended or revoked, who must be notified? |
The Certifying Authority |
|
What is the primary purpose of the notice of suspension or revocation under Section 26 of the IT Act, 2000? |
To provide the Certifying Authority an opportunity to rectify the situation |
|
According to Section 26, who shall publish the notice of suspension or revocation must be sent in the data base maintained by the Certifying Authority: |
the Controller |
|
The data base containing the notice of such suspension or revocation, as the case may be, shall be made available through |
a web site which shall be accessible round the clock |
|
What must the notice of suspension or revocation include, as per Section 26 of the IT Act? |
The reason for the suspension or revocation |
|
Under Section 27 of the IT Act, 2000, who has the authority to delegate their powers? |
The Controller |
|
Section 27 of the IT Act, 2000, The Controller may, in writing, authorise to delegate powers to: |
the Deputy Controller, Assistant Controller or any officer |
|
Which provision deal with “Power to investigate contraventions”? |
Sec.28 |
|
Who shall take up for investigation any contravention of the provisions of this Act, rules or regulations made thereunder? |
The Controller or any officer authorised by him in this behalf |
|
The Controller or any officer authorised by him in this behalf shall exercise the like powers which are conferred on: |
Income-tax authorities under Chapter XIII of the Income-tax Act, 1961 |
|
Under Section 29 of the IT Act, 2000, who has reasonable cause to suspect that any contravention of the provisions of this Chapter has been committed, have access to any computer system, any apparatus, data or any other material connected with such system? |
the Controller or any person authorised by him |
|
Who direct any person in charge of, or otherwise concerned with the operation of, the computer system, data apparatus or material, to provide him with such reasonable technical and other assistance as he may consider necessary? |
the Controller or any person authorised by him may, by order |
|
Which provision deal with “Certifying Authority to follow certain procedures”? |
Sec.30 |
|
Which procedure is followed by Every Certifying Authority under Section 30 of the IT Act, 2000? |
make use of hardware, software and procedures that are secure from intrusion and misuse |
|
Which procedure is followed by Every Certifying Authority under Section 30 of the IT Act, 2000? |
provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions |
|
Which procedure is followed by Every Certifying Authority under Section 30 of the IT Act, 2000? |
adhere to security procedures to ensure that the secrecy and privacy of the electronic signatures are assured |
|
Which procedure is followed by Every Certifying Authority under Section 30 of the IT Act, 2000? |
be the repository of all electronic signature Certificates issued under this Act |
|
Which procedure is followed by Every Certifying Authority under Section 30 of the IT Act, 2000? |
publish information regarding its practices, electronic signature Certificates and current status of such certificates |
|
Under Section 31 of the IT Act, 2000, Certifying Authorities are required to ensure compliance with: |
The provisions of the Information Technology Act, 2000 rules, regulations and orders made thereunder |
|
Under Section 32 of the IT Act, 2000, which entity is required to display a license? |
Certifying Authorities |
|
Section 32 of the IT Act, 2000, mandates that Certifying Authorities must display their: |
Licenses issued under the Act |
|
Under Section 33 of the IT Act, 2000, which entity is responsible for surrendering the license? |
The Certifying Authority |
|
Section 33 of the IT Act, 2000, allows the Certifying Authority to surrender its licence to: |
The Controller of Certifying Authorities |
|
In case of surrender of the licence, Section 33 of the IT Act mandates that the Certifying Authority must: |
Return the licence to the Controller in the prescribed manner |
|
According to Section 33 of the IT Act, 2000, if a Certifying Authority wishes to surrender its licence, it must: |
Follow the procedure laid down by the Controller |
|
Under Section 33 of the IT Act, 2000, what is the consequence of surrendering a licence for the Certifying Authority? |
It ceases to be authorized to issue digital certificates |
|
Where any Certifying Authority fails to surrender a licence to the Controller, the person in whose favour a licence is issued, shall be guilty of an offence and shall be |
Liable to penalty which may extend to five lakhs rupees |
|
What does every Certifying Authority disclose under section 34 in the manner specified by regulations? |
its electronic signature Certificate, any certification practice statement, notice of the revocation or suspension of its Certifying Authority certificate, |
|
CHAPTER VII |
|
|
ELECTRONIC SIGNATURE CERTIFICATES |
|
|
According to Section 35 of the IT Act, 2000, which entity is responsible for issuing an electronic signature certificate? |
The Certifying Authority |
|
Who may make an application to the Certifying Authority for the issue of a electronic signature Certificate in such form as may be prescribed by the Central Government? |
Any person |
|
Every such application shall be accompanied by such fee not exceeding how many rupees as may be prescribed by the Central Government, to be paid to the Certifying Authority? |
twenty-five thousand |
|
Every such application shall be accompanied by |
a certification practice statement |
|
On receipt of an application, what can the Certifying Authority do, after consideration of the certification practice statement and after making such enquiries as it may deem fit? |
grant the electronic signature Certificate or for reasons to be recorded in writing, reject the application |
|
Whether an application be rejected unless the applicant has been given a reasonable opportunity of showing cause against the proposed rejection? |
No |
|
Which provision deal with “Representations upon issuance of Digital Signature Certificate”? |
Sec.36 |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
it has complied with the provisions of this Act |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
it has published the Digital Signature Certificate or otherwise made it available to such person relying on it and the subscriber has accepted it |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
the subscriber holds the private key corresponding to the public key, listed in the Digital Signature Certificate |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
the subscriber holds a private key which is capable of creating a digital signature |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
the public key to be listed in the certificate can be used to verify a digital signature affixed by the private key held by the subscriber |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
the subscriber's public key and private key constitute a functioning key pair |
|
What does a Certifying Authority while issuing a Digital Signature Certificate certify? |
the information contained in the Digital Signature Certificate is accurate |
|
The Certifying Authority which has issued a Digital Signature Certificate may suspend such Digital Signature Certificate on receipt of a request to that effect from: |
the subscriber listed in the Digital Signature Certificate or any person duly authorised to act on behalf of that subscriber |
|
A Digital Signature Certificate shall not be suspended for a period exceeding how many days unless the subscriber has been given an opportunity of being heard in the matter? |
fifteen days |
|
On suspension of a Digital Signature Certificate under section 37, the Certifying Authority shall communicate the same: |
to the subscriber. |
|
Who can revoke a Digital Signature Certificate Under Section 38 of the IT Act, 2000 issued by it? |
Certifying Authority |
|
When can Certifying Authority revoke a Digital Signature Certificate?. The Sexual Harrassment Of Woman At Workplace Act Free One Liner Notes |
where the subscriber or any other person makes a request; or upon the death of the subscriber or upon the dissolution of the firm or winding up of the company where the subscriber is a firm or a company. |
|
What is the first step the Certifying Authority must take when deciding to revoke a Digital Signature Certificate under Section 38 of the IT Act, 2000? |
Notify the subscriber about the decision |
|
According to Section 39 of the IT Act, 2000, Where a Digital Signature Certificate is suspended or revoked under section 37 or section 38, the Certifying Authority shall |
publish a notice of such suspension or revocation, in the repository specified in the Digital Signature Certificate for publication of such notice. |
|
Where one or more repositories are specified, the Certifying Authority shall |
publish notices of such suspension or revocation, in all such repositories. |
|
The Indecent Representation Of Woman Act Free One Liner Notes |
|
|
CHAPTER VIII |
|
|
DUTIES OF SUBSCRIBERS |
|
|
Under Section 40 of the IT Act, 2000, what is the purpose of generating a key pair? |
To allow secure data transmission |
|
Section 40 of the IT Act, 2000, specifies that the key pair generated consists of: |
One private key and one public key |
|
Under Section 40 of the IT Act, 2000, who is responsible for generating the key pair in a digital signature system? |
the subscriber shall generate |
|
What must be done after generating the key pair, according to Section 40 of the IT Act, 2000? |
The private key should be kept securely by the subscriber |
|
According to Section 40 of the IT Act, 2000, what is the relationship between the private key and the public key in a key pair? |
The public key is used for encryption, and the private key is used for decryption |
|
Under Section 40 of the IT Act, 2000, the key pair must be: |
Unique and must not be shared between subscribers |
|
According to Section 40A of the IT Act, 2000 Duties of subscriber of Electronic Signature Certificate: |
In respect of Electronic Signature Certificate the subscriber shall perform such duties as may be prescribed |
|
According to Section 41 of the IT Act, 2000, deals with |
Acceptance of Digital Signature Certificate |
|
A subscriber shall be deemed to have accepted a Digital Signature Certificate if he publishes or authorizes the publication of a Digital Signature Certificate: |
(a) to one or more persons; (b) in a repository |
|
By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate that: |
the subscriber holds the private key corresponding to the public key listed in the Digital Signature Certificate and is entitled to hold the same |
|
By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate that: |
all representations made by the subscriber to the Certifying Authority and all material relevant to the information contained in the Digital Signature Certificate are true |
|
By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate that: |
all information in the Digital Signature Certificate that is within the knowledge of the subscriber is true. |
|
Which provision deal with “Control of private key”? |
Sec.42 |
|
Who shall exercise reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Certificate and take all steps to prevent its disclosure? |
Every subscriber |
|
What happen if the private key corresponding to the public key listed in the Digital Signature Certificate has been compromised? |
the subscriber shall communicate the same without any delay to the Certifying Authority. |
|
CHAPTER IX |
|
|
PENALTIES, COMPENSATION AND ADJUDICATION |
|
|
Under Section 43 of the IT Act, 2000, which actions would result in a penalty? |
Hacking a computer system, Accessing a computer system without authorization, Destroying data on a computer system |
|
The person will be liable Under Section 43(a) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
accesses or secures access to such computer, computer system or computer network or computer resource |
|
The person will be liable Under Section 43(b) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium |
|
The person will be liable Under Section 43(c) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network |
|
The person will be liable Under Section 43(d) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network |
|
The person will be liable Under Section 43(e) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
disrupts or causes disruption of any computer, computer system or computer network |
|
The person will be liable Under Section 43(f) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means |
|
The person will be liable Under Section 43(g) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder |
|
The person will be liable Under Section 43(h) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network |
|
The person will be liable Under Section 43(i) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means |
|
The person will be liable Under Section 43(j) of the IT Act, 2000-If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network |
steal, conceal, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage |
|
What is the Penalty and compensation for damage to computer, computer system, etc under Section 43 of the IT Act, 2000? |
he shall be liable to pay damages by way of compensation to the person so affected |
|
The penalty for failure to furnish information, return, or report as per Section 44 of the IT Act, 2000, is imposed by the: |
Controller of Certifying Authorities |
|
The penalty for failure to furnish information, return, or report as per Section 44 of the IT Act, 2000 is |
Fifteen lakhs |
|
Section 44(b) of the IT Act, 2000, stipulates that the fine for failure to furnish information, return, can go up to: |
₹50 thousand |
|
Section 44 of the IT Act, 2000 if any person maintain books of account or records, fails to maintain the same, he shall be liable to a penalty not exceeding |
One lakhs |
|
Which provision deal with Residuary penalty? |
Section 45 |
|
Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided shall be liable for: |
"Penalty not exceeding one lakh rupees, in addition to compensation to the person affected by such contravention not exceeding— (a) ten lakh rupees, by an intermediary, company or body corporate; or (b) one lakh rupees, by any other person.". |
|
Which provision deal with Power to adjudicate? |
Section 46 |
|
Under Section 46 of the IT Act, 2000, the authority empowered to adjudicate on matters relating to the provisions of the Act is the: |
Adjudicating Officer |
|
whether any person has committed a contravention of any of the provisions of this Act or of any rule, regulation, direction or order made thereunder which renders him liable to pay penalty or compensation, the Central Government shall appoint: |
any officer not below the rank of a Director to the Government of India or an equivalent officer of a State Government to be an adjudicating officer |
|
The adjudicating officer appointed shall exercise jurisdiction to adjudicate matters in which the claim for damage: |
does not exceed rupees five crore |
|
If the jurisdiction in respect of the claim for damage exceeding rupees five crores shall vest with: |
the competent court |
|
Whether any person appointed as an adjudicating officer unless he possesses such experience in the field of Information Technology and legal or judicial experience as may be prescribed by the Central Government? |
No |
|
Which provision deals with Factors to be taken into account by the adjudicating officer: |
Section 47 |
|
While adjudging the quantum of compensation the adjudicating officer shall have due regard to the following factors, namely:
|
(a) the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; (b) the amount of loss caused to any person as a result of the default; (c) the repetitive nature of the default. |
|
CHAPTER X |
|
|
THE APPELLATE TRIBUNAL |
|
|
Under Section 48 of the IT Act, 2000, the authority established to hear appeals against decisions made by the adjudicating officer is the: |
Appellate Tribunal |
|
Under Section 48 of the IT Act, 2000 deal with |
Establishment of Appellate Tribunal |
|
Who will be the Appellate Tribunal for the purposes of this Act |
The Telecom Disputes Settlement and Appellate Tribunal established under section 14 of the Telecom Regulatory Authority of India Act, 1997 |
|
By which amendment Section 48 of the IT Act, 2000 substituted |
Finance Act, 2017 (7 of 2017) |
|
Under Section 57 of the IT Act, 2000, an appeal can be made to the Appellate Tribunal against an order passed by: |
controller or an adjudicating officer |
|
Section 57 of the IT Act, 2000, grants the right to appeal to the Appellate Tribunal in cases where the individual is aggrieved by: |
An order passed by the Adjudicating Officer |
|
Whether an appeal lies to the Appellate Tribunal from an order made by an adjudicating officer with the consent of the parties? |
No |
|
According to Section 57 of the IT Act, 2000, who can file an appeal to the Appellate Tribunal? |
Any person or party aggrieved by the adjudicating officer's order |
|
Every appeal to the Appellate Tribunal shall be filed within a period of |
forty-five days from the date on which a copy of the order made by the Controller or the adjudicating officer is received. |
|
The appeal filed before the Appellate Tribunal shall be dealt with by it as expeditiously as possible and endeavour shall be made by it to dispose of the appeal finally within |
six months from the date of receipt of the appeal. |
|
According to Section 58 of the IT Act, 2000, the Appellate Tribunal must follow the procedure prescribed by: |
The Code of Civil Procedure, 1908 |
|
Under Section 58 of the IT Act, 2000, the Appellate Tribunal has the power to: |
Take evidence on oath, summon witnesses, Examine documents and evidence |
|
In accordance with Section 58 of the IT Act, 2000, the Appellate Tribunal can: |
(a) summoning and enforcing the attendance of any person and examining him on oath; (b) requiring the discovery and production of documents or other electronic records; |
|
In accordance with Section 58 of the IT Act, 2000, the Appellate Tribunal can: |
(a) receiving evidence on affidavits; (b) issuing commissions for the examination of witnesses or documents; (c) reviewing its decisions; (d) dismissing an application for default or deciding it ex parte; |
|
According to Section 58 of the IT Act, 2000, the Appellate Tribunal has the authority to: |
Direct the production of evidence or documents from parties, Overturn orders based on new evidence, pass an order to enforce compliance |
|
Under Section 58 of the IT Act, 2000, the Appellate Tribunal can call for records from the: |
Adjudicating Officer |
|
According to Section 58 of the IT Act, 2000, the Appellate Tribunal’s powers to hear appeals and pass orders are: |
Exclusive to the Appellate Tribunal and not subject to review |
|
Under Section 59 of the Information Technology Act, 2000, a person has the right to: |
Be represented by an advocate in any appeal, appoint any person as their legal representative, Represent themselves in an adjudicating process |
|
In terms of Section 59 of the IT Act, 2000, if an individual does not wish to be represented by an advocate, they can: |
Appear in person during the proceedings |
|
Section 60 of the Information Technology Act, 2000 the provisions of the Limitation Act, 1963 (36 of 1963), shall, as far as may be |
apply to an appeal made to the Appellate Tribunal |
|
Section 60 of the Information Technology Act, 2000 deals with the limitation for: |
Instituting a legal proceeding or complaint |
|
Under Section 60 of the IT Act, 2000, which is true regarding the limitation period for a complaint? |
The limitation period starts from the date the person knows of the offence |
|
According to Section 60 of the IT Act, 2000, a limitation period can be extended if: |
The appellant can show valid reasons for the delay |
|
Under Section 61 of the IT Act, 2000, which is true regarding the jurisdiction of civil courts? |
Civil courts are excluded from cases covered under the IT Act |
|
Section 61 of the Information Technology Act, 2000 specifies that civil courts will not have jurisdiction in which cases? |
Digital signature violations, Appeal against a penalty imposed under the IT Act, Cases related to offenses under the IT Act |
|
Under Section 61 of the Information Technology Act, 2000, in matters involving the violation of the Act, the jurisdiction lies with: |
The Adjudicating Officer or the Appellate Tribunal |
|
Section 62 of the Information Technology Act, 2000 provides for an appeal to the High Court against which? |
Orders passed by the Appellate Tribunal |
|
According to Section 62 of the IT Act, 2000, an appeal against the decision of the Appellate Tribunal must be filed in: |
The High Court |
|
Under Section 62 of the Information Technology Act, 2000, the time frame for filing an appeal to the High Court is: |
sixty days from the date of communication of the decision or order of the Appellate Tribuna |
|
The High Court, in an appeal under Section 62 of the IT Act, 2000, can: |
Set aside the order of the Appellate Tribunal if it finds a legal error |
|
The High Court’s decision on an appeal filed under Section 62 of the IT Act, 2000, is: |
Final and binding on all parties |
|
As per Section 62 of the IT Act, 2000, if the High Court dismisses the appeal, the decision of the Appellate Tribunal will: |
Stand confirmed and be final |
|
According to Section 62 of the IT Act, 2000, who is authorized to file an appeal to the High Court? |
Any person aggrieved by the decision of the Appellate Tribunal |
|
Section 63 of the Information Technology Act, 2000 deals with: |
Compounding of contraventions |
|
According to Section 63 of the IT Act, 2000, a contravention can be compounded by: |
by the Controller or such other officer as may be specially authorised by him in this behalf or by the adjudicating officer |
|
The process of compounding under Section 63 of the IT Act, 2000 allows the contravention to be |
Settled by mutual consent without prosecution |
|
Under Section 63 of the Information Technology Act, 2000, the term 'compounding' refers to: |
A settlement or fine for violating the provisions of the IT Act |
|
Section 64 of the Information Technology Act, 2000 deals with the: |
Recovery of penalty or compensation |
|
Section 64 of the IT Act, 2000 allows the penalty or compensation to be recovered as: |
an arrear of land revenue and the licence or the electronic signature Certificate, as the case may be, shall be suspended till the penalty is paid. |
|
CHAPTER XI |
|
|
OFFENCES |
|
|
Section 65 of the Information Technology Act, 2000 deals with the offense of: |
Tampering with computer source documents |
|
According to Section 65 of the IT Act, 2000, a person is said to have tampered with computer source documents if they: |
Alter, destroy, or conceal any computer source code |
|
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable under sec 65 |
with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. |
|
Section 66 of the Information Technology Act, 2000 deals with: |
Computer-related offenses |
|
Under Section 66 of the IT Act, 2000, –If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable |
with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both. |
|
Section 66 of the IT Act, 2000, covers which type of computer-related offense? |
Unauthorized access to a computer system or network |
|
Section 66 of the IT Act, 2000, provides a penalty for offenses such as: |
Hacking |
|
Section 66A strucked down in which case? |
Shreya singhal v. Union of India (2015) |
|
On which ground sec. 66A Was strucked down by supreme court? |
It violates the Article 19(1) |
|
Section 66B of the Information Technology Act, 2000 deals with the punishment for: |
Dishonestly receiving stolen computer resources or communication devices |
|
Whoever dishonestly receive or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished |
with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both. |
|
Section 66C of the Information Technology Act, 2000 deals with the punishment for: |
Identity theft |
|
According to Section 66C of the IT Act, 2000, identity theft is defined as the act of: |
Using someone's personal information without their consent |
|
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person shall be punished |
with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh. |
|
Section 66D of the Information Technology Act, 2000, deals with the punishment for: |
Cheating by personation using computer resources |
|
Under Section 66D of the IT Act, 2000, the act of cheating by personation involves: |
Using someone else's identity to deceive or mislead others |
|
In Section 66D of the IT Act, 2000, "personation" refers to: |
Pretending to be someone else to deceive or cheat |
|
Which actions can be punishable under Section 66D of the IT Act, 2000? |
Sending fraudulent emails pretending to be from a bank, using a fake identity to open an online account |
|
Section 66D of the IT Act, 2000, applies when someone pretends to be: |
A person or entity to gain financial or other benefits |
|
Whoever, by means of any communication device or computer resource cheats by personation under Section 66D shall be punished with |
imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. |
|
In Section 66D of the IT Act, 2000, "cheating by personation" is when: |
Someone impersonates another person for malicious purposes |
|
Section 66E of the Information Technology Act, 2000, deals with the punishment for: |
Violation of privacy |
|
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished |
with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. |
|
Section 66F of the Information Technology Act, 2000, deals with the punishment for: |
Cyber terrorism |
|
Under Section 66F of the IT Act, 2000, cyber terrorism refers to: |
Using computer resources to cause fear or harm to individuals or the country |
|
Section 66F of the IT Act, 2000, punishes acts that threaten the sovereignty, integrity, and security of: |
The country |
|
Under Section 66F of the IT Act, 2000, an individual is punished for cyber terrorism if they: |
Use computer systems to cause damage to national security |
|
Section 66F of the IT Act, 2000, applies when the act of cyber terrorism causes: |
Damage to the sovereignty and integrity of India |
|
Cyber terrorism under Section 66F of the IT Act, 2000, includes acts that: |
Damage computer systems, Disrupt or destroy the operation of computer systems or networks, Harm the security and integrity of the nation |
|
In Section 66F of the IT Act, 2000, cyber terrorism is classified as: |
A criminal offense |
|
Whoever commits or conspires to commit cyber terrorism shall be punishable |
with imprisonment which may extend to imprisonment for life. |
|
Section 67 of the Information Technology Act, 2000, deals with the punishment for: |
Publishing or transmitting obscene material in electronic form |
|
Under Section 67 of the IT Act, 2000, which is considered an offense? |
Publishing obscene material on social media platforms, sharing offensive or sexually explicit content through email, Transmitting obscene material via instant messaging |
|
Which actions would be punishable under Section 67 of the IT Act, 2000? |
Posting an adult video on a website, sharing a nude image without consent, Distributing explicit content through a messaging app |
|
Section 67 of the IT Act, 2000, aims to prevent the distribution of which types of content? |
Obscene material such as pornographic content |
|
Punishment for publishing or transmitting obscene material in electronic form shall be punished on first conviction under Section 67 |
with imprisonment of either description for a term which may extend to three years and with fine which may extend to five lakh rupees |
|
Punishment for publishing or transmitting obscene material in electronic form shall be punished in the event of second or subsequent conviction under Section 67 |
with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees. |
|
Section 67A of the IT Act, 2000, applies to the transmission or publication of material in: |
Electronic form |
|
Under Section 67A of the IT Act, 2000, sexually explicit material is defined as: |
Material that depicts sexual acts or behaviors, Material intended to promote or depict sexual activity in a vulgar manner, Material that is offensive and causes harm to the public moral order |
|
What is the primary purpose of Section 67A of the IT Act, 2000? |
To prevent the transmission of sexually explicit content in electronic form |
|
Which types of content is punishable under Section 67A of the IT Act, 2000? |
Pornographic images shared without consent, Explicit videos uploaded to websites, Text messages containing sexually explicit language |
|
Section 67A of the IT Act, 2000, applies to all forms of electronic transmission including: |
Email, social media, Websites |
|
Under Section 67A of the IT Act, 2000, which materials could potentially be classified as sexually explicit content? |
Videos depicting sexual acts, Pictures containing nudity intended to stimulate sexual desire, Audio content with explicit sexual language |
|
Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form Under Section 67A shall be punished on first conviction |
with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees |
|
Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form Under Section 67A shall be punished in the event of second or subsequent conviction |
with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees. |
|
Section 67B of the Information Technology Act, 2000, deals with the punishment for: |
Publishing or transmitting material depicting children in sexually explicit acts |
|
Section 67B of the IT Act, 2000, specifically targets the publication or transmission of material that depicts: |
Children in sexually explicit acts |
|
Section 67B of the IT Act, 2000, applies to the publication or transmission of material that: |
Depicts children engaged in sexually explicit activities |
|
Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form shall be punished on first conviction |
imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees |
|
Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form shall be punished in the event of second or subsequent conviction |
with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees |
|
Children under Section 67B means a person who has not completed |
the age of 18 years |
|
Section 67C of the Information Technology Act, 2000, requires intermediaries to preserve and retain information for: |
As prescribed by the central Government |
|
Under Section 67C of the IT Act, 2000, intermediaries must retain information to assist authorities in cases of: |
Cybercrimes and illegal activities |
|
The period for which intermediaries are required to preserve information under Section 67C of the IT Act, 2000, depends on: |
Government regulations and instructions |
|
Section 67C of the IT Act, 2000, applies to: |
All intermediaries handling electronic records |
|
Which is an obligation of intermediaries under Section 67C of the IT Act, 2000? |
They must preserve and retain data for a prescribed period |
|
any intermediary who intentionally or knowingly contravenes the provisions of not to preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe under sec 67C |
Shall be liable to penalty extend to twenty-five lakhs |
|
Section 68 of the Information Technology Act, 2000, grants power to the Controller to: |
Issue directions to regulate electronic records |
|
Which entities can receive directions from the Controller under Section 68 of the IT Act, 2000? |
Certifying Authorities, Intermediaries providing online services, Service providers of electronic records |
|
The Controller, under Section 68, may give directions to ensure the protection of: |
Information security and compliance |
|
Any person who intentionally or knowingly fails to comply with any order to take such measures or cease carrying on such activities as specified in the order under sec 68 |
shall be liable to penalty which extend to twenty-five lakhs |
|
Under Section 69 of the Information Technology Act, 2000, the government has the power to issue directions for the interception or monitoring of: |
Any information through computer resources |
|
Which authority is empowered under Section 69 of the IT Act, 2000, to issue directions for interception or decryption of information? |
Central Government or any authorized agency |
|
According to Section 69 of the IT Act, 2000, the directions for interception, monitoring, or decryption can be given for which type of information? |
Any information transmitted through computers, computer systems, or networks |
|
The primary purpose of Section 69 of the IT Act, 2000, is to allow the government to issue directions related to: |
National security, public order, or investigation of offenses |
|
The subscriber or intermediary or any person who fails to assist the agency under sec 69 |
shall be punished with imprisonment for a term which may extend to seven years and shall also be liable to fine. |
|
Section 69A of the Information Technology Act, 2000, empowers the government to issue directions to block public access to any information that is: |
Related to national security, public order, or sovereignty of India |
|
Under Section 69A of the IT Act, 2000, the government has the authority to block access to information on: |
Any computer resource |
|
As per Section 69A of the IT Act, 2000, the blocking order can be issued to: |
Websites, web pages, or information on any computer resource that poses a threat to national security |
|
The intermediary who fails to comply with the direction to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource shall be punished with under sec 69A |
an imprisonment for a term which may extend to seven years and also be liable to fine. |
|
Section 69B of the Information Technology Act, 2000, grants the government the power to: |
Authorize monitoring and collection of traffic data for the purpose of cybersecurity |
|
Under Section 69B of the IT Act, who can authorize the monitoring and collection of traffic data or information through computer resources for the purpose of cybersecurity? |
The Central Government or an authorized officer |
|
The purpose of monitoring and collecting traffic data under Section 69B of the IT Act is to ensure: |
National security and prevention of cyber threats |
|
The power to monitor and collect traffic data for cybersecurity purposes under Section 69B can be exercised by: |
Authorized officers of the government designated for cybersecurity |
|
According to Section 69B, the monitoring and collection of traffic data is authorized for the purpose of: |
Protecting against cyber threats and ensuring cybersecurity |
|
Under Section 69B, the government can authorize the monitoring of traffic data from: |
Any computer resource, including the internet and communication networks |
|
Any intermediary who intentionally or knowingly contravenes the provisions provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating, transmitting, receiving or storing such traffic data or information shall be punished under sec 69B |
an imprisonment for a term which any extend to one year or fine extend to one crore or both |
|
The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure: |
a protected system under sec.70 |
|
The Central Government may, by notification published in the Official Gazette, designate any organisation of the Government as |
National nodal agency under sec.70A |
|
The Central Government shall, by notification in the Official Gazette, appoint an agency of the Government to be called |
Indian Computer Emergency Response Team under sec.70B |
|
Whoever makes any misrepresentation to, or suppresses any material fact from the Controller or the Certifying Authority for obtaining any licence or electronic signature Certificate, as the case may be, shall be punished under sec 71 |
imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both |
|
If any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished under sec 72 |
Liable to penalty which extend to 5 lakhs |
|
Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person, shall be punished |
Liable to penalty which extend to TWENTY-FIVE lakhs |
|
Penalty for publishing electronic signature Certificate false in certain particulars under section 73 |
with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both |
|
Whoever knowingly creates, publishes or otherwise makes available a electronic signature Certificate for any fraudulent or unlawful purpose shall be punished under section 74 |
imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. |
|
Whether the provision of Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India. |
Yes (sec.75) |
|
Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, in respect of which any provision of this Act, rules, orders or regulations made thereunder has been or is being contravened |
shall be liable to confiscation under sec 76 |
|
Which provision deal with Compensation, penalties or confiscation not to interfere with other punishment? |
Sec.77 |
|
Which offences can be compounded under Section 77A of the Information Technology Act, 2000? |
Offences punishable with imprisonment for a term not exceeding three years |
|
Under Section 77A, a court may not compound an offence if: |
The accused has a previous conviction leading to enhanced punishment, The offence affects the socio-economic conditions of the country, The offence has been committed against a child below the age of 18 years or a woman |
|
According to Section 77A, who may file an application for compounding an offence? |
The accused |
|
Which sections of the Code of Criminal Procedure, 1973, apply to the compounding process under Section 77A? |
Sections 265B and 265C |
|
Under Section 77A, can an offence affecting the socio-economic conditions of the country be compounded? |
No, it cannot be compounded |
|
An offence under the IT Act punishable with imprisonment of 3 years and above treated as |
cognizable |
|
What is the main objective of introducing Section 77B in the Information Technology Act, 2000? |
To clarify which offences are bailable |
|
Which is a non-bailable offence under the IT Act as per Section 77B? |
Section 66F – Cyber terrorism |
|
What is the effect of Section 77B on judicial interpretation regarding bailability? |
It provides guidance for uniform classification |
|
What type of offence is considered bailable according to Section 77B? |
Those punishable with imprisonment for three years or less |
|
Does Section 77B make a distinction between first-time offenders and repeat offenders? |
No |
|
CHAPTER XII |
|
|
INTERMEDIARIES NOT TO BE LIABLE IN CERTAIN CASES |
|
|
Which provision deal with Exemption from liability of intermediary in certain cases? |
Sec.79 |
|
Whether an intermediary liable for any third party information, data, or communication link made available or hosted by him? |
No |
|
When an intermediary shall not be liable for any third party information, data, or communication link made available or hosted by him? |
the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted |
|
When an intermediary shall be liable for any third party information, data, or communication link made available or hosted by him? |
the intermediary has conspired or abetted or aided or induced or upon receiving actual knowledge and used to commit the unlawful act. |
|
CHAPTER XIIA |
|
|
EXAMINER OF ELECTRONIC EVIDENCE |
|
|
Which provision deal with Central Government to notify Examiner of Electronic Evidence? |
Sec.79A |
|
CHAPTER XIII |
|
|
MISCELLANEOUS |
|
|
Under Section 80 of the Information Technology Act, 2000, who is authorized to enter, search, and arrest without a warrant? |
Police officer not below the rank of Inspector |
|
Which is considered a "public place" under Section 80 of the Information Technology Act, 2000? |
Public conveyance |
|
What is the primary condition for a police officer to exercise powers under Section 80 of the Information Technology Act, 2000? |
The officer must be reasonably suspicious of an offence under the Act |
|
Under Section 80, what must an officer do if they arrest a person other than a police officer? |
Take the person before a magistrate or officer-in-charge of a police station without unnecessary delay |
|
What does the term "public place" include under Section 80 of the Information Technology Act, 2000? |
Any place intended for use by, or accessible to, the public |
|
Which is NOT included in the definition of "public place" under Section 80? |
Private residence |
|
Which provision deal with Application of the Act to electronic cheque and truncated cheque? |
Sec.81A |
|
Who shall be deemed to be public servants under section 82 of the Information Technology Act, 2000?? |
Controller, Deputy Controller and Assistant Controller |
|
Which provision deal with “No suit, prosecution or other legal proceeding shall lie against the Central Government, the State Government, the Controller or any person acting on behalf of him, and adjudicating officers for anything which is in good faith done”? |
Sec.84 |
|
Who prescribe the Modes or methods for encryption under section 84A? |
The Central Government |
|
Under Section 84B of the Information Technology Act, 2000, who is liable for punishment if they abet an offence under this Act? |
Both the abettor and the person committing the offence |
|
Section 84B specifies that the punishment for abetment is: |
Equal to the punishment prescribed for the primary offence |
|
Who is considered to have abetted an offence under the Information Technology Act, 2000, as per Section 84B? |
Any person who aids or encourages the commission of an offence under the Act |
|
In case of abetment, which applies as per Section 84B? |
The abettor shall receive the same punishment as the person committing the offence |
|
Which offences can be subject to abetment under Section 84B of the Information Technology Act, 2000? |
Sending offensive messages through communication service, etc., Publishing obscene material online, Hacking a computer system |
|
Under Section 84C of the Information Technology Act, 2000, what happens if a person attempts to commit an offence under this Act? |
They will be punished as if they committed the offence |
|
If a person is caught attempting to hack into a computer system under Section 84C, what will the court do? |
Punish the person as if the hacking was successfully completed |
|
What is the key point about the punishment for attempting to commit an offence under the Information Technology Act, 2000, as outlined in Section 84C? |
imprisonment of any description provided for the offence, for a term which may extend to one-half of the longest term of imprisonment provided for that offence, or with such fine as is provided for the offence, or with both |
|
Which offences can be subject to punishment under Section 84C of the IT Act if attempted? |
Hacking, Identity theft, Publishing obscene material |