Bare Act Search Results
Home Bare Acts Phrase: torrens system Year: 2000 Page 1 of about 53 results (0.006 seconds)Sign-up to get more results
Unlock complete result pages and premium legal research features.
Start Free TrialInformation Technology Act, 2000 Section 43
Title: Penalty and Compensation for Damage to Computer, Computer System, Etc
State: Central
Year: 2000
.....normal operation of the computer, computer system, or computer network; (ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. (v) "computer source code" means the listing of programme, computer commands, design and lay out and programme analysis of computer resource in any form." 1[(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 70
Title: Protected System
State: Central
Year: 2000
.....system. Explanation.-- For the purposes of this section, "Critical Information Infrastructure" means the computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.] (2) The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems notified under sub-section (1). (3) Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine. 1[(4) The Central Government shall prescribe the information security practices and procedures for such protected system.] _____________________ 1. Substituted vide Information Technology (Amendment) Act, 2008 Prior to substitution text read as under :- (1) The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Complete Act
State: Central
Year: 2000
.....record is retained intact or has been altered since such electronic record was so affixed with the digital signature. (2) Any reference in this Act to any enactment or any provision thereof shall, in relation to an area in which such enactment or such provision is not in force, be construed as a reference to the corresponding law or the relevant provision of the corresponding law, if any, in force in that area. SECTION 03: AUTHENTICATION OF ELECTRONIC RECORDS (1) Subject to the provisions of this section any subscriber may authenticate an electronic record by affixing his digital signature. (2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. Explanation."For the purposes of this sub-section, "hash function" means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "hash result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible" (a).....
List Judgments citing this sectionChemical Weapons Convention Act, 2000 Schedule I
Title: Schedule
State: Central
Year: 2000
.....Not permit in any place under its control any activity prohibited to a State Party under this Convention; and (c) Extend its penal legislation enacted under sub-paragraph (a) to any activity prohibited to a State Party under this Convention undertaken anywhere by natural persons, possessing its nationality, in conformity with international law. 2. Each State Party shall cooperate with other States Parties and afford the appropriate form of legal assistance to facilitate the implementation of the obligations under paragraph 1. 3. Each State Party, during the implemenation of its obligations under this Convention, shall assign the highest priority to ensuring the safety of people and to protecting the environment, and shall cooperate as appropriate with other States Parties in this regard Relations between the State Party and the Organization 4. In order to fulfill its obligation under this Convention, each State Party shall designate or establish a National Authority to serve as the national focal point for effective liaison with the Organization and other States Parties. Each State Party shall notify the Organization of its National Authority at the time that this.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Chapter IX
Title: Penalties, Compensation and Adjudication
State: Central
Year: 2000
.....normal operation of the computer, computer system, or computer network; (ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. (v) "computer source code" means the listing of programme, computer commands, design and lay out and programme analysis of computer resource in any form." 1[(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Chapter XI
Title: Offences
State: Central
Year: 2000
.....- Punishment for disclosure of information in breach of lawful contract 1[72A. Punishment for disclosure of information in breach of lawful contract.-- Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person, shall be punished with imprisonment for a term which may extend to three years, or with fine which may extend to five lakh rupees, or with both.] _________________ 1. Inserted vide Information Technology (Amendment) Act, 2008. Section 73 - Penalty for publishing Electronic Signature Certificate false in certain particulars (1) No person shall publish a 1[Electronic] Signature Certificate or otherwise make it available to any other person with the knowledge that (a) the Certifying Authority listed in the certificate has not.....
View Complete Act List Judgments citing this sectionThe Delhi Electricity Reform Act, 2000 Complete Act
State: Delhi
Year: 2000
THE DELHI ELECTRICITY REFORM ACT, 2000 THE DELHI ELECTRICITY REFORM ACT, 2000 (DELHI ACT NO. 2 of 2001) GOVERNMENT OF NATIONAL CAPITAL TERRITORY OF DELHI (DEPARTMENT OF LAW, JUSTICE& LEGISLATIVE ASSEMBLY AFFAIRS) 5, SHAM NATH MARG, DELHI- 110 054 Dated: 8/3/2001 NOTIFICATION No. F "(27)/LA/2000 - The following Act of Legislative Assembly received the assent of the President of India on 6th March 2001 is hereby published for general information:- THE DELHI ELECTRICITY REFORM ACT, 2000 (DELHI ACT NO. 2 of 2001) (As passed by the Legislative Assembly of the National Capital Territory of Delhi on 23-11-2000) An Act To provide for the constitution of an Electricity Regulatory Commission, restructuring of the electricity industry (rationalisation of generation, transmission, distribution and supply of electricity), increasing avenues for participation of private sector in the electricity industry and generally for taking measures conducive to the development and management of the electricity industry in an efficient, commercial, economic and competitive manner in the National Capital Territory of Delhi and for matters connected therewith or incidental.....
List Judgments citing this sectionInformation Technology Act, 2000 Chapter I
Title: Preliminary
State: Central
Year: 2000
.....defined in section 13 of the Negotiable Instruments Act, 1881 (26 of 1881);" (w.e.f. 6-2-2003). 3. Substituted by Information Technology Amendment Act, 2008 Act No. 10 of 2009. Prior to substitution text read as under :- "(4) Nothing in this Act shall apply to-- 2 [(a) a negotiable instrument (other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881 (26 of 1881);]. (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882 (7 of 1882); (c) a trust as defined in section 3 of the Indian Trusts Act, 1882 (2 of 1882); (d) a will as defined in clause (h) of section (2) of the Indian Succession Act, 1925 (39 of 1925), including any other testamentary disposition by whatever name called; (e) any contract for the sale or conveyance of immovable property or any interest in such property; (f) any such class of documents or transactions as may be notified by the Central Government in the Official Gazette." Section 2 - Definitions (1) In this Act, unless the context otherwise requires,-- (a) "access", with its grammatical variations and cognate expressions, means gaining entry into, instructing.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 2
Title: Definitions
State: Central
Year: 2000
.....from unauthorised access, use, disclosure, disruption, modification or destruction".] (o) "data" means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer; (p) "digital signature" means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3; (q) "Digital Signature Certificate" means a Digital Signature Certificate issued under sub-section (4) of section 35; (r) "electronic form", with reference to information, means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device; (s) "Electronic Gazette" means the Official Gazette published in the electronic form; (t) "electronic record" means data, record or.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Schedule III
Title: The Third Schedule (Omitted)
State: Central
Year: 2000
.....the system to removable media like floppies, discs, tapes or other electro-magnetic data storage devices; (E) the mode of verification in order to ensure that data has been accurately transferred to such removable media; (F) the mode of identification of such data storage devices; (G) the arrangements for the storage and custody of such storage devices; (H) the safeguards to prevent and detect any tampering with the system; and (I) any other factor which will vouch for the integrity and accuracy of the system. (c) a further certificate from the person in-charge of the computer system to the effect that to the best of his knowledge and belief, such computer system operated properly at the material time, he was provided with all the relevant data and the printout in question represents correctly, or is appropriately derived from, the relevant data.".
View Complete Act List Judgments citing this section- << Prev.
- Next >>
Sign-up to get more results
Unlock complete result pages and premium legal research features.
Start Free Trial