Web - Amazon

We provide Linux to the World


We support WINRAR [What is this] - [Download .exe file(s) for Windows]

CLASSICISTRANIERI HOME PAGE - YOUTUBE CHANNEL
SITEMAP
Audiobooks by Valerio Di Stefano: Single Download - Complete Download [TAR] [WIM] [ZIP] [RAR] - Alphabetical Download  [TAR] [WIM] [ZIP] [RAR] - Download Instructions

Make a donation: IBAN: IT36M0708677020000000008016 - BIC/SWIFT:  ICRAITRRU60 - VALERIO DI STEFANO or
Privacy Policy Cookie Policy Terms and Conditions
Information technology law - Wikipedia, the free encyclopedia

Information technology law

From Wikipedia, the free encyclopedia

Information technology law (or IT law) is a set of recent legal enactments, currently in existence in several countries, which governs the process and dissemination of information digitally. These legal enactments cover a broad gambit of different aspects relating to computer software, protection of computer software, access and control of digital information, privacy, security, internet access and usage, and electronic commerce.Chandler These laws have been described as "paper laws" for "paperless environment".

Contents

[edit] Background

Development of sophistication in information technology, and expansion of usage of information technology, has also given rise to a new set of crimes and criminal behavior. In order to combat such crimes, including criminal behavior, a number of countries across the globe, have reviewed and upgraded their existing criminal laws, and have also framed new set of laws to deal with such crimes, and criminal behavior. Some of such countries are Australia, Austria, Canada, Denmark, France, Germany, Greece, Finland, India, Italy, Japan, Malaysia, Portugal, Singapore, Spain, Sweden, Switzerland, United Kingdom, and the United States.

Such crimes and criminal behavior may be directed by the offender against an individual person or a group of individuals, and / or against an organization or the society at large.

[edit] Legal enactments - examples

The Computer Misuse Act 1990 [1], enacted by Great Britain on 29 June 1990, and which came into force on 29 August 1990, is an example of one of the earliest of such legal enactments. This Act was enacted with an express purpose of making "provision for securing computer material against unauthorised access or modification." Certain major provisions of the Computer Misuse Act 1990 relate to:

  • "unauthorised access to computer materials",
  • "unauthorised access with intent to commit or facilitate the commission of further offences", and
  • "unauthorised modification of computer material."

A recent example of Information Technology Law is India's Information Technology Act 2000, which became effective from 17 October 2000. This Act applies to whole of India, and its provisions also apply to any offence or contravention, committed even outside the territorial jurisdiction of Republic of India, by any person irrespective of his nationality. In order to attract provisions of this Act, such an offence or contravention should involve a computer, computer system, or computer network located in India. The IT Act, 2000 provides an extra-territorial applicability to its provisions by virtue of section 1(2) read with section 75.

India's Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to Information Technology) enacted earlier in several other countries, as also various guidelines pertaining to Information Technology Law. The government of India appointed an Expert Committee to suggest suitable amendments into the existing IT Act, 2000. The amendments suggested by the Committee were severely criticised on various grounds. The chief among them was the dilution of criminal sanctions under the proposed amendments. These amendments, perhaps with some modifications, have been approved by the Cabinet in India on 16th October, 2006 and very soon the amendments will be laid down before the Indian Parliament for suitable legislation.

The IT Act, 2000 needs an overall haul keeping in mind the contemporary standards and requirements and the Indian law in this regard is lagging far behind. In the absence of proper law in place, the only recourse is to rely upon the traditional criminal law of India, i.e. Indian Penal Code, 1860 (IPC)[1]that is highly insufficient for cyber crimes in India. Alternatively, a purposive, updating and organic interpretation of the existing provisions of the IT Act, 2000 and IPC by the judiciary must be tried.

The IT Act, 2000 requires a purposive and updating amendment initiative as many contemporary crimes and contraventions are missing from it. Besides, there is an emergent need of introducing the concept of cyber forensics in India.

[edit] Electronic Signature Laws

[edit] Information Technology Law

  1. Florida Electronic Security Act
  2. Illinois Electronic Commerce Security Act
  3. Texas Penal Code - Computer Crimes Statute
  4. Maine Criminal Code - Computer Crimes
  5. Singapore Electronic Transactions Act
  6. Malaysia Computer Crimes Act
  7. Malaysia Digital Signature Act
  8. UNCITRAL Model Law on Electronic Commerce
  9. Information Technology Act 2000 of India

[edit] Information Technology Guidelines

  1. ABA Digital Signature Guidelines
  2. United States Office of Management and Budget

[edit] Enforcement agencies

The Information Technology Laws of various countries, and / or their criminal laws generally stipulate enforcement agencies, entrusted with the task of enforcing the legal provisions and requirements.

[edit] India

A live example of such an enforcement agency is Cyber Crime Police Station, Bangalore[2], India's first exclusive Cyber Crime enforcement agency.

[edit] United States Federal Agencies

Many United States federal agencies oversee the use of information technology. Their regulations are promulgated in the Code of Federal Regulations of the United States.

Over 25 U.S. federal agencies have regulations concerning the use of digital and electronic signatures. [1]

[edit] See also

[edit] References

  1. ^ Federal Agency Digital and Electronic Signature Regulations

[edit] External links

Our "Network":

Project Gutenberg
https://gutenberg.classicistranieri.com

Encyclopaedia Britannica 1911
https://encyclopaediabritannica.classicistranieri.com

Librivox Audiobooks
https://librivox.classicistranieri.com

Linux Distributions
https://old.classicistranieri.com

Magnatune (MP3 Music)
https://magnatune.classicistranieri.com

Static Wikipedia (June 2008)
https://wikipedia.classicistranieri.com

Static Wikipedia (March 2008)
https://wikipedia2007.classicistranieri.com/mar2008/

Static Wikipedia (2007)
https://wikipedia2007.classicistranieri.com

Static Wikipedia (2006)
https://wikipedia2006.classicistranieri.com

Liber Liber
https://liberliber.classicistranieri.com

ZIM Files for Kiwix
https://zim.classicistranieri.com


Other Websites:

Bach - Goldberg Variations
https://www.goldbergvariations.org

Lazarillo de Tormes
https://www.lazarillodetormes.org

Madame Bovary
https://www.madamebovary.org

Il Fu Mattia Pascal
https://www.mattiapascal.it

The Voice in the Desert
https://www.thevoiceinthedesert.org

Confessione d'un amore fascista
https://www.amorefascista.it

Malinverno
https://www.malinverno.org

Debito formativo
https://www.debitoformativo.it

Adina Spire
https://www.adinaspire.com