SlideShare una empresa de Scribd logo
1 de 16
Cyber Crime and its
Jurisdictional Issue
Presented by: Dhurba Mainali
Student Id: 13511
Subject: CS10
Lincoln University
https://www.youtube.com/watch?v=IMzFd0rWN0U
To combat cyber crime, your each effort is prime !
Contents Structure:
• Background
• Introduction
• History of Cyber crime
• Types of Cyber Law
• Jurisdictional Issue on Cyber Crime
• Case Reference
• Conclusion
Background:
• The regime of internet is growing rapidly.
• Became integral parts of our life (user: child-adults-old)
• It has endless benefits for the citizens
• However, its dark side can’t be avoided.
• One of the major disadvantage to be discussed is ‘Cyber crime’.
Then, what is cyber crime?
• In Narrow Sense: It is a computer crime. An illegal act that directly
attack computer system security or data processed by computer.
• In Broad Sense: It is a computer related crime in which computers or
computer networks are a tool, a target, or a place of criminal activity.
• It has a unique modus operandi and can be committed being domiciled in
any part of the world.
• Cyber crime is easy to commit, hard to detect and often hard to locate.
History of Cyber Crime
The first recorded cyber crime took place in the year 1820 .
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood were being
threatened. They committed acts of sabotage to discourage Jacquard from
further use of the new technology. This is the first recorded cyber crime.
Types of Cyber Crime
 The rate of cyber crime is increasing day by day along with rising development of science and technology.
 There are several types of cyber crime that happen in today’s world. Some of them are :
1. Hacking: 1. Personal computer is broken + sensitive information is stolen
2.Varity of software is used to get accessed in that target computer of that victim
3. Computer may be hacked or accessed from remote location
2. Identity Theft: 1.Fradulant Acquisition of personal private identifying information + for unlawful financial gain
Example: Stolen Credit Card (criminal + stole credit card + run huge bills and suffer card a large loss)
They might sell that identity to other criminal for the same fashion.
3. Cyber Stalking/Harassment: Use of the internet, e-mail, or other electronic communication devices, to harass other person . {eg:
when fake ads are posted on the Internet, providing personal information (name, address,
photos) of a victim and stating that the victim is seeking partners for sexual fantasies, such as
rape.}
4.Theft: (i.) Crime that happen when someone unlawfully downloads music, movies, games or software and violates copyright.
(ii.) Cover all crimes of illegal downloading
(iii.) Also cover plagiarism and crime against intellectual property
5. Spoofing and Phishing : (i.) action of constructing a mimic (duplicate) site which seems like original one
(ii.) technique used to gain unauthorized access to computers + sending msg to target
computer with an IP address indicating the msg coming from trusted host
(iii.) finally hacked email and password for commencing fraudulent acts.
Issue of Jurisdiction on Cyber Crime
o What is jurisdiction?
→ The power of a court to hear and determine a case.
There are two (2) types of jurisdiction in relation to cyber crime.
(i.) Subject Matter Jurisdiction
(ii.) Personal Jurisdiction
*These 2 types of jurisdiction is taken into due consideration when conflict
regarding issue of jurisdiction in relation to cyber crime arises.
* A part form this provision’s of cyber crime convention for state parties also
plays meaning stand to determine jurisdiction.
(i.) Subject Matter Jurisdiction
→competence of the court to hear and determine a particular category of cases
→check out whether a claim is actionable in the court where the case is filed
(ii.) Personal Jurisdiction
→ competence of the court to determine whether the person is subject to the court in which
case is filed or is an authority over a person, regardless of their location.
→ Every state has personal jurisdiction over persons within its territory.
→ State cannot exercise personal jurisdiction over any person who are outside the territory
and if had no any kind contact relation to state. (*unless state is party to any
international conventions which permit state to make required operation)
Case Reference of Cyber Crime Jurisdiction
• United States v. Ivanov (US District Court of Connecticut 2001)
Fact of the case:
→ Defendant Ivanov and a codefendant, John William Butenko, were convicted of
conspiring to transmit to the Soviet Union information relating to the national
defense of the United States.
→ He was indicted for conspiracy, computer fraud, extortion, and possession of illegal
access devices.
Claim of Defendant :
→ Ivanov appealed to dismiss the case, claiming that the court lacked subject-matter
jurisdiction
→he argue because he was physically located in Russia when the offenses were committed
Court Decision:
→ The court denied Ivanov's motion, on the ground because the intended and actual
detrimental effects of Ivanov's actions in Russia occurred within the United States
→ and also because each of the statutes under which Ivanov was charged with a
substantive offense was intended by Congress to apply extraterritorially.
→Therefore, was held guilty to several crimes, including computer intrusion and
computer fraud.
→ He was sentenced to 48 months in prison.
Conclusion:
 Cyber crime indeed getting the reorganization it deserve.
 Every new technology and every new application also will reversely create an
opportunity that criminals will soon seek to exploit.
 A part from that so to be safe we must need to develop strong cyber security.
 All the nation need to be a part of international momentum against cyber crime.
 The cyber law also needs to evolve with the rapidly changing technology
environment that breeds new forms of crime and criminals.
 It should be updated timely.
 Recommendation:
 Use anti-virus software and fireball and keep them up to date.
 Don’t open email and attachment from unknown sources.
 Back up your computer data or disk often.
 Don’t share access your computer with Strangers.
 Disconnect your internet when not is use.
 Use hard to guess password. Don’t make your password choose simple or that
exist in dictionary. Be aware that password cracking tool exist.
 Finally, treat your password like you treat your toothbrush. Never give it to
anyone else to use, and change it every few months.
Cyber Crime and its Jurisdictional Issue's

Más contenido relacionado

La actualidad más candente

PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )
 PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 ) PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 )
PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )cpjcollege
 
Rule against perpetuity
Rule against perpetuityRule against perpetuity
Rule against perpetuitySunit Kapoor
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Temporary injunction
Temporary injunctionTemporary injunction
Temporary injunctionMudit Jain
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspaceRistya Anditha
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Notes on Taxation law
Notes on Taxation lawNotes on Taxation law
Notes on Taxation lawAmaresh Patel
 
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil CourtSection 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil CourtJudicial Intellects Academy
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu GautamRitu Gautam
 
Interpretation of Statutes
Interpretation of StatutesInterpretation of Statutes
Interpretation of StatutesKrupaGandhi7
 

La actualidad más candente (20)

PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )
 PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 ) PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 )
PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )
 
Rule against perpetuity
Rule against perpetuityRule against perpetuity
Rule against perpetuity
 
Doctrin of Renvoi
Doctrin of RenvoiDoctrin of Renvoi
Doctrin of Renvoi
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
E commerce & contracts
E commerce & contractsE commerce & contracts
E commerce & contracts
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Temporary injunction
Temporary injunctionTemporary injunction
Temporary injunction
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Private international law
Private international  lawPrivate international  law
Private international law
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Notes on Taxation law
Notes on Taxation lawNotes on Taxation law
Notes on Taxation law
 
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil CourtSection 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
 
Interpretation of Statutes
Interpretation of StatutesInterpretation of Statutes
Interpretation of Statutes
 

Similar a Cyber Crime and its Jurisdictional Issue's

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simonudhaya jeni
 

Similar a Cyber Crime and its Jurisdictional Issue's (20)

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 

Último

citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 

Último (20)

citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 

Cyber Crime and its Jurisdictional Issue's

  • 1. Cyber Crime and its Jurisdictional Issue Presented by: Dhurba Mainali Student Id: 13511 Subject: CS10 Lincoln University https://www.youtube.com/watch?v=IMzFd0rWN0U To combat cyber crime, your each effort is prime !
  • 2.
  • 3.
  • 4. Contents Structure: • Background • Introduction • History of Cyber crime • Types of Cyber Law • Jurisdictional Issue on Cyber Crime • Case Reference • Conclusion
  • 5. Background: • The regime of internet is growing rapidly. • Became integral parts of our life (user: child-adults-old) • It has endless benefits for the citizens • However, its dark side can’t be avoided. • One of the major disadvantage to be discussed is ‘Cyber crime’.
  • 6. Then, what is cyber crime? • In Narrow Sense: It is a computer crime. An illegal act that directly attack computer system security or data processed by computer. • In Broad Sense: It is a computer related crime in which computers or computer networks are a tool, a target, or a place of criminal activity. • It has a unique modus operandi and can be committed being domiciled in any part of the world. • Cyber crime is easy to commit, hard to detect and often hard to locate.
  • 7. History of Cyber Crime The first recorded cyber crime took place in the year 1820 . In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.
  • 8. Types of Cyber Crime  The rate of cyber crime is increasing day by day along with rising development of science and technology.  There are several types of cyber crime that happen in today’s world. Some of them are : 1. Hacking: 1. Personal computer is broken + sensitive information is stolen 2.Varity of software is used to get accessed in that target computer of that victim 3. Computer may be hacked or accessed from remote location 2. Identity Theft: 1.Fradulant Acquisition of personal private identifying information + for unlawful financial gain Example: Stolen Credit Card (criminal + stole credit card + run huge bills and suffer card a large loss) They might sell that identity to other criminal for the same fashion.
  • 9. 3. Cyber Stalking/Harassment: Use of the internet, e-mail, or other electronic communication devices, to harass other person . {eg: when fake ads are posted on the Internet, providing personal information (name, address, photos) of a victim and stating that the victim is seeking partners for sexual fantasies, such as rape.} 4.Theft: (i.) Crime that happen when someone unlawfully downloads music, movies, games or software and violates copyright. (ii.) Cover all crimes of illegal downloading (iii.) Also cover plagiarism and crime against intellectual property 5. Spoofing and Phishing : (i.) action of constructing a mimic (duplicate) site which seems like original one (ii.) technique used to gain unauthorized access to computers + sending msg to target computer with an IP address indicating the msg coming from trusted host (iii.) finally hacked email and password for commencing fraudulent acts.
  • 10. Issue of Jurisdiction on Cyber Crime o What is jurisdiction? → The power of a court to hear and determine a case. There are two (2) types of jurisdiction in relation to cyber crime. (i.) Subject Matter Jurisdiction (ii.) Personal Jurisdiction *These 2 types of jurisdiction is taken into due consideration when conflict regarding issue of jurisdiction in relation to cyber crime arises. * A part form this provision’s of cyber crime convention for state parties also plays meaning stand to determine jurisdiction.
  • 11. (i.) Subject Matter Jurisdiction →competence of the court to hear and determine a particular category of cases →check out whether a claim is actionable in the court where the case is filed (ii.) Personal Jurisdiction → competence of the court to determine whether the person is subject to the court in which case is filed or is an authority over a person, regardless of their location. → Every state has personal jurisdiction over persons within its territory. → State cannot exercise personal jurisdiction over any person who are outside the territory and if had no any kind contact relation to state. (*unless state is party to any international conventions which permit state to make required operation)
  • 12. Case Reference of Cyber Crime Jurisdiction • United States v. Ivanov (US District Court of Connecticut 2001) Fact of the case: → Defendant Ivanov and a codefendant, John William Butenko, were convicted of conspiring to transmit to the Soviet Union information relating to the national defense of the United States. → He was indicted for conspiracy, computer fraud, extortion, and possession of illegal access devices. Claim of Defendant : → Ivanov appealed to dismiss the case, claiming that the court lacked subject-matter jurisdiction →he argue because he was physically located in Russia when the offenses were committed
  • 13. Court Decision: → The court denied Ivanov's motion, on the ground because the intended and actual detrimental effects of Ivanov's actions in Russia occurred within the United States → and also because each of the statutes under which Ivanov was charged with a substantive offense was intended by Congress to apply extraterritorially. →Therefore, was held guilty to several crimes, including computer intrusion and computer fraud. → He was sentenced to 48 months in prison.
  • 14. Conclusion:  Cyber crime indeed getting the reorganization it deserve.  Every new technology and every new application also will reversely create an opportunity that criminals will soon seek to exploit.  A part from that so to be safe we must need to develop strong cyber security.  All the nation need to be a part of international momentum against cyber crime.  The cyber law also needs to evolve with the rapidly changing technology environment that breeds new forms of crime and criminals.  It should be updated timely.
  • 15.  Recommendation:  Use anti-virus software and fireball and keep them up to date.  Don’t open email and attachment from unknown sources.  Back up your computer data or disk often.  Don’t share access your computer with Strangers.  Disconnect your internet when not is use.  Use hard to guess password. Don’t make your password choose simple or that exist in dictionary. Be aware that password cracking tool exist.  Finally, treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.