SlideShare a Scribd company logo
1 of 13
Dept. of Law & Justice
               LLB(Hons)- Program
Course Title: Media Information and Technology Law
             Course Code: LLBH 4213




          Date of Submission: 23-04-2012
Sayef Amin
+8801924122222




   Assignment On
    Cyber Law




                 2
Introduction to Cyber Law:

Cyber law is a term that encapsulates the legal issues related to use of
communicative transactional and distributive aspects of networked information
devices and technologies. It is the law governing cyber space. Cyber space is a
very wide term and includes computers, networks, software, data storage
devices (such as hard disks, USB disks etc), the Internet, websites, emails and
even electronic devices such as cell phones, ATM machines etc.

Cyber space:
1.The term "cyberspace" stands for the global network of interdependent
information technology infrastructures, telecommunications networks and
computer processing systems. As a social experience, individuals can interact,
exchange ideas, share information, provide social support, conduct business,
direct actions, create artistic media, play games, engage in political discussion,
and so on, using this global network. Cyberspace is the electronic medium of
computer networks, in which online communication takes place.

"Cyberspace is the `place` where a telephone conversation appears to occur.
Not inside your actual phone, the plastic device on your desk. Not inside the
other person's phone, in some other city. The place between the phones, the
indefinite place out there, where the two of you, human beings, actually meet
and communicate."

The word "cyberspace" was coined by the science fiction author, William
Gibson 1984, when he sought a name to describe his vision of a global
computer network, linking all people, machines and sources of information in
the world, and through which one could move or "navigate" as through a virtual
space.

Cyber law is the governing cyber space. Cyber space is a very wide term and
includes computers, networks, software, data storage devices (such as hard
disks, USB disks etc), the internet websites, emails and even electronic devices
such as cell phone, ATM machines etc.




                                        3
Electronic signature & Digital signature:
2."Electronic signature" means an electronic or digital method of
identification that is executed or adopted by a person with the intent to be bound
by or to authenticate a record.

"Digital signature" means a type of electronic signature that transforms a
message through the use of an asymmetric cryptosystem.

Account to Section 2(1) of the Information & Communication Technology
Act, 2006. : "digital signature" means data in an electronic form, which--
(a) is related with any other electronic data directly or logically; and
(b) is able to satisfy the following conditions for validating the digital signature-
-
(i) affixing with the signatory uniquely;
(ii) capable to identify the signatory;
(iii) created in safe manner or using a means under the sole control of the
signatory; and
(iv) related with the attached data in such a manner that is capable to identify
any alteration made in the data thereafter.

“A digital signature” (not to be confused with a digital certificate) is an
electronic signature that can be used to authenticate the identity of the sender
of a message or the signer of a document, and possibly to ensure that the
original content of the message or document that has been sent is unchanged.
Digital signatures are easily transportable, cannot be imitated by someone else,
and can be automatically time-stamped. The ability to ensure that the original
signed message arrived means that the sender cannot easily repudiate it later.

Electronic signature: Identification data in electronic form which is attached to
or logically associated with other electronic data to serve as a method of
authentication.

Information Technology is encapsulating all the aspects of life across the world.
It has brought transition from paper to the paperless world. With the increasing
usage of internet in the world, the criminals are also increasing in the field of
information technology. The cyber criminals are able to use the software by
creating it themselves and manipulating it for their own benefits. It is happening
only because of the simplicity of crimes.



                                          4
In order to maintain harmony and co-existence of people in the cyberspace,
there is a need for a legal program called as – Cyber Laws. Cyber laws are
basic laws of a society and therefore, have implications on each aspect of cyber
society such as business, governance, entertainment, crimes, education,
information delivery, etc. The cyber crime is no longer limited to time, space or
a group of people. Hence, there is a need of cyber laws.

Cyberspace is an intangible dimension and therefore, it is impossible to
regulate and govern it using conventional law. As the internet is worldwide, it
goes across borders and is not visible. In cyberspace, there are many cases
where so called conventional crimes are done using the computers or the
internet such as criminal threats delivered through e-mail, spreading of
pornographic material, websites that defame someone, etc. In these types of
cases, the computer is merely a tool used to commit the crime.

Cyberspace has complete disrespect for jurisdictional boundaries. A person
in Bangladesh could break into a bank’s electronic vault hosted on a
computer in USA and transfer millions of Dollars to another bank in
Switzerland, all within minutes. All he would need is a laptop computer, a cell
phone and some talent.

Cyberspace is absolutely open to participation by all. A ten-year-old in
Bhutan can have a live chat session with an eight-year-old in Bali without any
regard for the distance or the anonymity between them.

Definition of 'Economic Efficiency'
A broad term that implies an economic state in which every resource is
optimally allocated to serve each person in the best way while minimizing waste
and inefficiency. When an economy is economically efficient, any changes
made to assist one person would harm another. In terms of production, goods
are produced at their lowest possible cost, as are the variable inputs of
production. Some terms that encompass phases of economic efficiency include
allocation efficiency, production efficiency and Pareto efficiency.

Explains 'Economic Efficiency'
3.“Economic efficiency” is a term typically used in microeconomics when
discussing product. Production of a unit of good is considered to be
economically efficient when that unit of good is produced at the lowest possible


                                        5
cost. Economics by Park in and Bade give a useful introduction to the difference
between economic efficiency and technological efficiency

A state of economic efficiency is essentially just a theoretical one; a limit that
can be approached but never reached. Instead, economists look at the amount of
waste (or loss) between pure efficiency and reality to see how efficiently an
economy is functioning. Measuring economic efficiency is often subjective,
relying on assumptions about the social good created and how well that serves
consumers. Basic market forces like the level of prices, employment rates and
interest rates can be analyzed to determine the relative improvements made
toward economic efficiency from one point in time to another.


Need for Cyber Law:
    Cyberspace is an intangible dimension that is impossible to govern and
     regulate using conventional law.
    Cyberspace has complete disrespect for jurisdictional boundaries.
    Cyberspace handles gigantic traffic volumes every second.
    Cyberspace is absolutely open to participation by all.
    Cyberspace offers enormous potential for anonymity to its members.
    Cyberspace offers never-seen-before economic efficiency.
    Electronic information has become the main object of cyber crime. It is
     characterized by extreme mobility, which exceeds by far the mobility of
     persons, goods or other services.
    A software source code worth cores of rupees or a movie can be pirated
     across the globe within hours of their release.
    Theft of corporeal information (e.g. Books, papers, CD, ROMs, floppy
     disks) is easily covered by traditional penal provisions.

4. “CD-ROMs” (Compact Disc, read-only-memory) is an adaptation of the
CD that is designed to store computer data in the form of text and graphics, as
well as hi-fi stereo sound. The original data format standard was defined by
Philips and Sony in the 1983 Yellow Book.

What is hacking?

5. Hacking is the practice of modifying the features of a system, in order to
accomplish a goal outside of the creator's original purpose. The person who is
consistently engaging in hacking activities, and has accepted hacking as a
lifestyle and philosophy of their choice, is called a hacker. Computer hacking is
the most popular form of hacking nowadays, especially in the field of computer



                                        6
security, but hacking exists in many other forms, such as phone hacking, brain
hacking, etc. and it's not limited to either of them.

Due to the mass attention given to black hat hackers from the media, the whole
hacking term is often mistaken for any security related cyber crime. This
damages the reputation of all hackers, and is very cruel and unfair to the law
abiding ones of them, from who the term itself originated. The goal of this
website is to introduce people the true philosophy and ethics of hackers,
hopefully clearing their name and giving them the social status they deserve.




5. Computer crime:

Cyberspace also brings together every service and facility imaginable to
expedite money laundering. One can purchase anonymous credit cards, bank
accounts, encrypted global mobile telephones, and false passports. From there
one can pay professional advisors to set up IBCs (International Business
Corporations, or corporations with anonymous ownership) or similar structures
in OFCs (Offshore Financial Centers). Such advisors are loath to ask any
penetrating questions about the wealth and activities of their clients, since the
average fees criminals pay them to launder their money can be as much as 20
percent.

6. Virus Introduction:
In computers, a virus is a program or programming code that replicates by
being copied or initiating its copying to another program, computer boot sector
or document. Viruses can be transmitted as attachments to an e-mail note or in a
downloaded file, or be present on a diskette or CD. The immediate source of the
e-mail note, downloaded file, or diskette you've received is usually unaware that
it contains a virus. Some viruses wreak their effect as soon as their code is
executed; other viruses lie dormant until circumstances cause their code to be
executed by the computer. Some viruses are benign or playful in intent and
effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data
or causing your hard disk to require reformatting. A virus that replicates itself



                                        7
by resending itself as an e-mail attachment or as part of a network message is
known as a worm.

Cyberspace handles gigantic traffic volumes every second. Billions of emails
are crisscrossing the globe even as we read this, millions of websites are being
accessed every minute and billions of dollars are electronically transferred
around the world by banks every day.
7. Electronic records:
Electronic, or machine-readable records, are records on electronic storage media
Electronic record, as defined regulations means any information that is recorded
in a form that only a computer can process and that satisfies the definition of a
Federal record per the Federal Records Act definition supplied above. Federal
electronic records are not necessarily kept in a "recordkeeping system" but may
reside in a generic electronic information system or are produced by an
application such as word processing or electronic mail.
2(7) of ICT Act 2006 "electronic record" means data, record or data
generated, image or sound stored, received or sent in an electronic form or
microfilm or computer generated microfiche;


8. Electronic Filing:
In its simplest form, electronic filing is the substitution of an electronic
document for a traditional paper document. With the evolution of Internet
technology, electronic filing has become a highly secure and reliable method for
sending, receiving, and managing legal documents and case information.


9. IP (Internet Protocol) is the primary network protocol used on the Internet,
developed in the 1970s. On the Internet and many other networks, IP is often
used together with the Transport Control Protocol (TCP) and referred to
interchangeably as TCP/IP. IP supports unique addressing for computers on a
network. Most networks use the Internet Protocol version 4 (IPv4) standards
that features IP addresses four bytes (32 bits) in length. The newer Internet
Protocol version 6 (IPv6) standard features addresses 16 bytes (128 bits) in
length.

Data on an Internet Protocol network is organized into packets. Each IP packet
includes both a header (that specifies source, destination, and other information
about the data) and the message data itself.

10. Www: The term WWW refers to the World Wide Web or simply the
Web. The World Wide Web consists of all the public Web sites connected to


                                        8
the Internet worldwide, including the client devices (such as computers and cell
phones) that access Web content. The WWW is just one of many applications
of the Internet and computer networks.

11. Definition of HTTP: The Hyper Text Transfer Protocol provides a
standard for Web browsers and servers to communicate. The definition of
HTTP is a technical specification of a network protocol that software must
implement. HTTP is an application layer network protocol built on top of TCP.
HTTP clients (such as Web browsers) and servers communicate via HTTP
request and response messages. The three main HTTP message types are GET,
POST, and HEAD. HTTP utilizes TCP port 80 by default, though other ports
such as 8080 can alternatively be used.

12.Web Page:
A web page or webpage is a document or information resource that is suitable
for the World Wide Web and can be accessed through a web browser and
displayed on a monitor or mobile device. This information is usually in HTML
or XHTML format, and may provide navigation to other web pages via
hypertext links. Web pages frequently subsume other resources such as style
sheets, scripts and images into their final presentation.

Web pages may be retrieved from a local computer or from a remote web
server. The web server may restrict access only to a private network, e.g. a
corporate intranet, or it may publish pages on the World Wide Web. Web pages
are requested and served from web servers using Hypertext Transfer Protocol
(HTTP).


13. Electronic Transaction:
An electronic transaction is the sale or purchase of goods or services whether
between business, households, individuals, governments and other public or
private organizations conducted over computer mediated networks. The goods
and services are ordered over those networks, but the payment and the ultimate
delivery of goods or service may be conducted on or off-line.

14. An electronic certificate:
An electronic certificate satisfies the ―accompany‖ requirement if the certificate
is identified by a unique identifier and can be accessed via a World Wide Web
URL or other electronic means, provided the URL or other electronic means and
the unique identifier are created in advance and are available, along with access



                                        9
to the electronic certificate itself, to the Commission or to the Customs
authorities as soon as the product or shipment itself is available for inspection.


Section 36 of ICT Act 2006 : Issue of certificate.—The Certifying Authority
may issue a certificate to a prospective subscriber only after the Certifying
Authority—
(a) has received an application in the prescribed form requesting for issuance of
a certificate from the prospective subscriber;
(b) if it has a certification practice statement, complied with all of the practices
and procedures set forth in such certification practice
(c) if the prospective subscriber is the person to be listed in the certificate to be
issued;
(d) if all information in the certificate to be issued is correct; and
(e) Whether the prospective subscriber paid such fees as may be prescribed for
issuance of certificate.


15. Electronic commerce or e-commerce:
Electronic commerce or e-commerce refers to a wide range of online business
activities for products and services. It also pertains to ―any form of business
transaction in which the parties interact electronically rather than by physical
exchanges or direct physical contact.‖

Electronic commerce, commonly known as e-commerce or e-comm., refers to
the buying and selling of products or services over electronic systems such as
the Internet and other computer networks. Electronic commerce draws on such
technologies as electronic funds transfer, supply chain management, Internet
marketing, online transaction processing, electronic data interchange (EDI),
inventory management systems, and automated data collection systems. Modern
electronic commerce typically uses the World Wide Web at least at one point in
the transaction's life-cycle, although it may encompass a wider range of
technologies such as e-mail, mobile devices and telephones as well.

      Electronic commerce is generally considered to be the sales aspect of e-
      business. It also consists of the exchange of data to facilitate the financing
      and payment aspects of business transactions.

E-commerce can be divided into:

      E-tailing or "virtual storefronts" on Web sites with online catalogs,
      sometimes gathered into a "virtual mall"



                                         10
The gathering and use of demographic data through Web contacts
      Electronic Data Interchange (EDI), the business-to-business exchange of
      data
      E-mail and fax and their use as media for reaching prospects and
      established customers (for example, with newsletters)
      Business-to-business buying and selling
      The security of business transactions

16. An e-form (electronic form) is a computer program version of a paper
form. Aside from eliminating the cost of printing, storing, and distributing pre-
printed forms, and the wastage of obsolete forms, e-forms can be filled out
faster because the programming associated with them can automatically format,
calculate, look up, and validate information for the user. With digital signatures
and routing via e-mail, approval cycle times can be significantly reduced. With
electronic submission of completed forms, you can eliminate the cost of
rekeying data and the associated errors.
2(5) of ICT, 2006 "electronic form" with reference to information means any
information generated, sent, received or stored in media, magnetic, optical,
computer memory, microfilm, computer generated microfiche or similar device
or technology;

Forgery is the process of making, adapting, or imitating objects, statistics, or
documents with the intent to deceive. Copies, studio replicas, and reproductions
are not considered forgeries, though they may later become forgeries through
knowing and willful misrepresentations. Forging money or currency is more
often called counterfeiting. But consumer goods may also be counterfeits if they
are not manufactured or produced by the designated manufacture or producer
given on the label or flagged by the trademark symbol. When the object forged
is a record or document it is often called a false document.

This usage of "forgery" does not derive from metalwork done at a forge, but it
has a parallel history. A sense of "to counterfeit" is already in the Anglo-French
verb forger, meaning "falsify."

A forgery is essentially concerned with a produced or altered object. Where the
prime concern of a forgery is less focused on the object itself – what it is worth
or what it "proves" – than on a tacit statement of criticism that is revealed by the
reactions the object provokes in others, then the larger process is a hoax. In a
hoax, a rumor or a genuine object planted in a concocted situation, may
substitute for a forged physical object. The similar crime of fraud is the crime of
deceiving another, including through the use of objects obtained through
forgery. Forgery is one of the techniques of fraud, including identity theft.
Forgery is one of the threats addressed by security engineering.



                                        11
17. Internet:

The internet in simple terms is a network of the interlinked computer
networking worldwide, which is accessible to the general public. These
interconnected computers work by transmitting data through a special type of
packet switching which is known as the IP or the internet protocol.

Internet is such a huge network of several different interlinked networks relating
to the business, government, academic, and even smaller domestic networks,
therefore internet is known as the network of all the other networks. These
networks enable the internet to be used for various important functions which
include the several means of communications like the file transfer, the online
chat and even the sharing of the documents and web sites on the WWW, or the
World Wide Web.

It is always mistaken said that the internet and the World Wide Web are both
the same terms, or are synonymous. Actually there is a very significant
difference between the two which has to be clear to understand both the terms.
The internet and World Wide Web are both the networks yet; the internet is the
network of the several different computers which are connected through the
linkage of the accessories like the copper wires, the fiber optics and even the
latest wireless connections. However, the World Wide Web consists of the
interlinked collection of the information and documents which are taken as the
resource by the general public. These are then linked by the website URLs and
the hyperlinks. Therefore World Wide Web is one of the services offered by the
whole complicated and huge network of the internet.

The use of IP in the Internet is the integral part of the network, as they provide
the services of the internet, through different layers organization through the IP
data packets. There are other protocols that are the sub-classes of the IP itself,
like the TCP, and the HTTP.

18. Stalking is a crime. Under the Crime (Domestic and Personal Violence)
Act 2007, stalking includes the following of a person about or the watching or
frequenting of the vicinity of, or an approach to a person’s place of residence,
business or work or any place that a person frequents for the purposes of any
activity

Stalking involves a persistent course of conduct or actions by a person which
are intended to maintain contact with, or exercise power and control over
another person. These actions cause distress, loss of control, fear or harassment
to another person and occur more than once.




                                       12
Stalking can involve threats or sexual innuendo and the stalker generally tries to
intimidate or induce fear in the person they are stalking. The person being
stalked may only realize they are being stalked once they identify a pattern of
strange or suspicious incidents occurring, such as:

      phone calls
      text messages
      messages left on social networking sites (My Space, Face book)
      notes left on their car
      flowers left at their home
      an awareness that they are being followed
      being continually stared at by another person.

The person being stalked often develops a sense of loss of control over their
lives and is forced into changing their life routine and behaviors’.

Stalking is committed when a person:

      Intentionally and persistently
      Without legitimate reason
      Engages in a course of conduct directed at another specific person
      Against their will
      This causes the other person to develop fear, or to believe that harm
      would come to them

Paper:
A substance in the form of thin sheets or leaves intended to be written or printed
on, or to be used in wrapping. It is made of rags, straw, bark, wood, or other
fibrous material, which is first reduced to pulp, then molded, pressed, and dried.

A book is a set of written, printed, illustrated, or blank sheets, made of ink,
paper, parchment, or other materials, usually fastened together to hinge at one
side. A single sheet within a book is called a leaf, and each side of a leaf is
called a page. A book produced in electronic format is known as an electronic
book (e-book).

Books may also refer to works of literature, or a main division of such a work.
In library and information science, a book is called a monograph, to distinguish
it from serial periodicals such as magazines, journals or newspapers. The body
of all written works including books is literature.




                                        13

More Related Content

What's hot

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Judicial review
Judicial reviewJudicial review
Judicial reviewtaratoot
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crimeManish Singh
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Historical school of jurisprudence
Historical school of jurisprudenceHistorical school of jurisprudence
Historical school of jurisprudenceanjalidixit21
 
Christian law in bangladesh
Christian law in bangladeshChristian law in bangladesh
Christian law in bangladeshShahjada Zihad
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Classes of Criminal Courts in Bangladesh
Classes of Criminal Courts in BangladeshClasses of Criminal Courts in Bangladesh
Classes of Criminal Courts in BangladeshA K DAS's | Law
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 

What's hot (20)

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Judicial review
Judicial reviewJudicial review
Judicial review
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Historical school of jurisprudence
Historical school of jurisprudenceHistorical school of jurisprudence
Historical school of jurisprudence
 
Christian law in bangladesh
Christian law in bangladeshChristian law in bangladesh
Christian law in bangladesh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
General ex
General exGeneral ex
General ex
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Classes of Criminal Courts in Bangladesh
Classes of Criminal Courts in BangladeshClasses of Criminal Courts in Bangladesh
Classes of Criminal Courts in Bangladesh
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Bail
Bail Bail
Bail
 
Right to fair trial
Right to fair trialRight to fair trial
Right to fair trial
 

Similar to Cyber law

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Responseijtsrd
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
system security and cyber law and cyber crime
system security and cyber law and cyber crimesystem security and cyber law and cyber crime
system security and cyber law and cyber crimeaashikalamichhane
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global ProblemChristina Bauer
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 

Similar to Cyber law (19)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
system security and cyber law and cyber crime
system security and cyber law and cyber crimesystem security and cyber law and cyber crime
system security and cyber law and cyber crime
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 

More from Asian Paint Bangladesh Ltd

Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...Asian Paint Bangladesh Ltd
 
Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Asian Paint Bangladesh Ltd
 
Energy policy in china by Sayef Amin +8801924122222
Energy policy in china by Sayef Amin +8801924122222Energy policy in china by Sayef Amin +8801924122222
Energy policy in china by Sayef Amin +8801924122222Asian Paint Bangladesh Ltd
 
Performance of grameenphone in telecommunication sector of bangladesh a compa...
Performance of grameenphone in telecommunication sector of bangladesh a compa...Performance of grameenphone in telecommunication sector of bangladesh a compa...
Performance of grameenphone in telecommunication sector of bangladesh a compa...Asian Paint Bangladesh Ltd
 
Environment pollution of bangladesh – it’s effect and control +8801924122222
Environment pollution of bangladesh – it’s effect and control +8801924122222Environment pollution of bangladesh – it’s effect and control +8801924122222
Environment pollution of bangladesh – it’s effect and control +8801924122222Asian Paint Bangladesh Ltd
 
New microsoft power point presentation (sayef amin)
New microsoft power point presentation (sayef amin)New microsoft power point presentation (sayef amin)
New microsoft power point presentation (sayef amin)Asian Paint Bangladesh Ltd
 
Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...
Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...
Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...Asian Paint Bangladesh Ltd
 
Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)
Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)
Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)Asian Paint Bangladesh Ltd
 
Customer service of airtel telecom bangladesh limited by sayef amin 019241222...
Customer service of airtel telecom bangladesh limited by sayef amin 019241222...Customer service of airtel telecom bangladesh limited by sayef amin 019241222...
Customer service of airtel telecom bangladesh limited by sayef amin 019241222...Asian Paint Bangladesh Ltd
 
Telecommunication law for Telecommunication Union 01924122222
Telecommunication law for Telecommunication Union 01924122222Telecommunication law for Telecommunication Union 01924122222
Telecommunication law for Telecommunication Union 01924122222Asian Paint Bangladesh Ltd
 
Sayef amin (telecommunication law)power point presentation
Sayef amin (telecommunication law)power point presentationSayef amin (telecommunication law)power point presentation
Sayef amin (telecommunication law)power point presentationAsian Paint Bangladesh Ltd
 
Researchon Monograph: "Traffic Jam in Dhaka City"
Researchon Monograph: "Traffic Jam in Dhaka City"Researchon Monograph: "Traffic Jam in Dhaka City"
Researchon Monograph: "Traffic Jam in Dhaka City"Asian Paint Bangladesh Ltd
 
Assignment On: “Ensuring Safe Drinking Water in Bangladesh”
Assignment On: “Ensuring Safe Drinking Water in Bangladesh”Assignment On: “Ensuring Safe Drinking Water in Bangladesh”
Assignment On: “Ensuring Safe Drinking Water in Bangladesh”Asian Paint Bangladesh Ltd
 
Montreal Convention (Convention for the Unification of Certain Rules for Inte...
Montreal Convention (Convention for the Unification of Certain Rules for Inte...Montreal Convention (Convention for the Unification of Certain Rules for Inte...
Montreal Convention (Convention for the Unification of Certain Rules for Inte...Asian Paint Bangladesh Ltd
 
Assignment On: Government of the People’s Republic of Bangladesh National Po...
Assignment On:  Government of the People’s Republic of Bangladesh National Po...Assignment On:  Government of the People’s Republic of Bangladesh National Po...
Assignment On: Government of the People’s Republic of Bangladesh National Po...Asian Paint Bangladesh Ltd
 
National policy for safe water supply & sanitation 1998
National policy for safe water supply & sanitation 1998National policy for safe water supply & sanitation 1998
National policy for safe water supply & sanitation 1998Asian Paint Bangladesh Ltd
 
Assignment On: “Water Resources Management in the Remediation of Ground Water...
Assignment On: “Water Resources Management in the Remediation of Ground Water...Assignment On: “Water Resources Management in the Remediation of Ground Water...
Assignment On: “Water Resources Management in the Remediation of Ground Water...Asian Paint Bangladesh Ltd
 

More from Asian Paint Bangladesh Ltd (20)

Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...
 
Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222
 
Energy policy in china by Sayef Amin +8801924122222
Energy policy in china by Sayef Amin +8801924122222Energy policy in china by Sayef Amin +8801924122222
Energy policy in china by Sayef Amin +8801924122222
 
Performance of grameenphone in telecommunication sector of bangladesh a compa...
Performance of grameenphone in telecommunication sector of bangladesh a compa...Performance of grameenphone in telecommunication sector of bangladesh a compa...
Performance of grameenphone in telecommunication sector of bangladesh a compa...
 
Environment pollution of bangladesh – it’s effect and control +8801924122222
Environment pollution of bangladesh – it’s effect and control +8801924122222Environment pollution of bangladesh – it’s effect and control +8801924122222
Environment pollution of bangladesh – it’s effect and control +8801924122222
 
New microsoft power point presentation (sayef amin)
New microsoft power point presentation (sayef amin)New microsoft power point presentation (sayef amin)
New microsoft power point presentation (sayef amin)
 
Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...
Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...
Assignment on Interpretation of Statutes in Common Law and Civil Law System 0...
 
Pacific bangladesh telecom limited
Pacific bangladesh telecom limited Pacific bangladesh telecom limited
Pacific bangladesh telecom limited
 
Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)
Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)
Solar energy presentation(sayef amin 01924122222/01614122222/04475122222)
 
Customer service of airtel telecom bangladesh limited by sayef amin 019241222...
Customer service of airtel telecom bangladesh limited by sayef amin 019241222...Customer service of airtel telecom bangladesh limited by sayef amin 019241222...
Customer service of airtel telecom bangladesh limited by sayef amin 019241222...
 
Telecommunication law for Telecommunication Union 01924122222
Telecommunication law for Telecommunication Union 01924122222Telecommunication law for Telecommunication Union 01924122222
Telecommunication law for Telecommunication Union 01924122222
 
Sayef amin (telecommunication law)power point presentation
Sayef amin (telecommunication law)power point presentationSayef amin (telecommunication law)power point presentation
Sayef amin (telecommunication law)power point presentation
 
Researchon Monograph: "Traffic Jam in Dhaka City"
Researchon Monograph: "Traffic Jam in Dhaka City"Researchon Monograph: "Traffic Jam in Dhaka City"
Researchon Monograph: "Traffic Jam in Dhaka City"
 
Assignment On: “Ensuring Safe Drinking Water in Bangladesh”
Assignment On: “Ensuring Safe Drinking Water in Bangladesh”Assignment On: “Ensuring Safe Drinking Water in Bangladesh”
Assignment On: “Ensuring Safe Drinking Water in Bangladesh”
 
Montreal Convention (Convention for the Unification of Certain Rules for Inte...
Montreal Convention (Convention for the Unification of Certain Rules for Inte...Montreal Convention (Convention for the Unification of Certain Rules for Inte...
Montreal Convention (Convention for the Unification of Certain Rules for Inte...
 
Assignment on: Hague Convention, 1970
Assignment on: Hague Convention, 1970Assignment on: Hague Convention, 1970
Assignment on: Hague Convention, 1970
 
Assignment On: Government of the People’s Republic of Bangladesh National Po...
Assignment On:  Government of the People’s Republic of Bangladesh National Po...Assignment On:  Government of the People’s Republic of Bangladesh National Po...
Assignment On: Government of the People’s Republic of Bangladesh National Po...
 
National policy for safe water supply & sanitation 1998
National policy for safe water supply & sanitation 1998National policy for safe water supply & sanitation 1998
National policy for safe water supply & sanitation 1998
 
Assignment On: “Water Resources Management in the Remediation of Ground Water...
Assignment On: “Water Resources Management in the Remediation of Ground Water...Assignment On: “Water Resources Management in the Remediation of Ground Water...
Assignment On: “Water Resources Management in the Remediation of Ground Water...
 
Water act 2013 Bangladesh
Water act 2013 BangladeshWater act 2013 Bangladesh
Water act 2013 Bangladesh
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Cyber law

  • 1. Dept. of Law & Justice LLB(Hons)- Program Course Title: Media Information and Technology Law Course Code: LLBH 4213 Date of Submission: 23-04-2012
  • 2. Sayef Amin +8801924122222 Assignment On Cyber Law 2
  • 3. Introduction to Cyber Law: Cyber law is a term that encapsulates the legal issues related to use of communicative transactional and distributive aspects of networked information devices and technologies. It is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Cyber space: 1.The term "cyberspace" stands for the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems. As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network. Cyberspace is the electronic medium of computer networks, in which online communication takes place. "Cyberspace is the `place` where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk. Not inside the other person's phone, in some other city. The place between the phones, the indefinite place out there, where the two of you, human beings, actually meet and communicate." The word "cyberspace" was coined by the science fiction author, William Gibson 1984, when he sought a name to describe his vision of a global computer network, linking all people, machines and sources of information in the world, and through which one could move or "navigate" as through a virtual space. Cyber law is the governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the internet websites, emails and even electronic devices such as cell phone, ATM machines etc. 3
  • 4. Electronic signature & Digital signature: 2."Electronic signature" means an electronic or digital method of identification that is executed or adopted by a person with the intent to be bound by or to authenticate a record. "Digital signature" means a type of electronic signature that transforms a message through the use of an asymmetric cryptosystem. Account to Section 2(1) of the Information & Communication Technology Act, 2006. : "digital signature" means data in an electronic form, which-- (a) is related with any other electronic data directly or logically; and (b) is able to satisfy the following conditions for validating the digital signature- - (i) affixing with the signatory uniquely; (ii) capable to identify the signatory; (iii) created in safe manner or using a means under the sole control of the signatory; and (iv) related with the attached data in such a manner that is capable to identify any alteration made in the data thereafter. “A digital signature” (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. Electronic signature: Identification data in electronic form which is attached to or logically associated with other electronic data to serve as a method of authentication. Information Technology is encapsulating all the aspects of life across the world. It has brought transition from paper to the paperless world. With the increasing usage of internet in the world, the criminals are also increasing in the field of information technology. The cyber criminals are able to use the software by creating it themselves and manipulating it for their own benefits. It is happening only because of the simplicity of crimes. 4
  • 5. In order to maintain harmony and co-existence of people in the cyberspace, there is a need for a legal program called as – Cyber Laws. Cyber laws are basic laws of a society and therefore, have implications on each aspect of cyber society such as business, governance, entertainment, crimes, education, information delivery, etc. The cyber crime is no longer limited to time, space or a group of people. Hence, there is a need of cyber laws. Cyberspace is an intangible dimension and therefore, it is impossible to regulate and govern it using conventional law. As the internet is worldwide, it goes across borders and is not visible. In cyberspace, there are many cases where so called conventional crimes are done using the computers or the internet such as criminal threats delivered through e-mail, spreading of pornographic material, websites that defame someone, etc. In these types of cases, the computer is merely a tool used to commit the crime. Cyberspace has complete disrespect for jurisdictional boundaries. A person in Bangladesh could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Dollars to another bank in Switzerland, all within minutes. All he would need is a laptop computer, a cell phone and some talent. Cyberspace is absolutely open to participation by all. A ten-year-old in Bhutan can have a live chat session with an eight-year-old in Bali without any regard for the distance or the anonymity between them. Definition of 'Economic Efficiency' A broad term that implies an economic state in which every resource is optimally allocated to serve each person in the best way while minimizing waste and inefficiency. When an economy is economically efficient, any changes made to assist one person would harm another. In terms of production, goods are produced at their lowest possible cost, as are the variable inputs of production. Some terms that encompass phases of economic efficiency include allocation efficiency, production efficiency and Pareto efficiency. Explains 'Economic Efficiency' 3.“Economic efficiency” is a term typically used in microeconomics when discussing product. Production of a unit of good is considered to be economically efficient when that unit of good is produced at the lowest possible 5
  • 6. cost. Economics by Park in and Bade give a useful introduction to the difference between economic efficiency and technological efficiency A state of economic efficiency is essentially just a theoretical one; a limit that can be approached but never reached. Instead, economists look at the amount of waste (or loss) between pure efficiency and reality to see how efficiently an economy is functioning. Measuring economic efficiency is often subjective, relying on assumptions about the social good created and how well that serves consumers. Basic market forces like the level of prices, employment rates and interest rates can be analyzed to determine the relative improvements made toward economic efficiency from one point in time to another. Need for Cyber Law:  Cyberspace is an intangible dimension that is impossible to govern and regulate using conventional law.  Cyberspace has complete disrespect for jurisdictional boundaries.  Cyberspace handles gigantic traffic volumes every second.  Cyberspace is absolutely open to participation by all.  Cyberspace offers enormous potential for anonymity to its members.  Cyberspace offers never-seen-before economic efficiency.  Electronic information has become the main object of cyber crime. It is characterized by extreme mobility, which exceeds by far the mobility of persons, goods or other services.  A software source code worth cores of rupees or a movie can be pirated across the globe within hours of their release.  Theft of corporeal information (e.g. Books, papers, CD, ROMs, floppy disks) is easily covered by traditional penal provisions. 4. “CD-ROMs” (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound. The original data format standard was defined by Philips and Sony in the 1983 Yellow Book. What is hacking? 5. Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker. Computer hacking is the most popular form of hacking nowadays, especially in the field of computer 6
  • 7. security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them. Due to the mass attention given to black hat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve. 5. Computer crime: Cyberspace also brings together every service and facility imaginable to expedite money laundering. One can purchase anonymous credit cards, bank accounts, encrypted global mobile telephones, and false passports. From there one can pay professional advisors to set up IBCs (International Business Corporations, or corporations with anonymous ownership) or similar structures in OFCs (Offshore Financial Centers). Such advisors are loath to ask any penetrating questions about the wealth and activities of their clients, since the average fees criminals pay them to launder their money can be as much as 20 percent. 6. Virus Introduction: In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself 7
  • 8. by resending itself as an e-mail attachment or as part of a network message is known as a worm. Cyberspace handles gigantic traffic volumes every second. Billions of emails are crisscrossing the globe even as we read this, millions of websites are being accessed every minute and billions of dollars are electronically transferred around the world by banks every day. 7. Electronic records: Electronic, or machine-readable records, are records on electronic storage media Electronic record, as defined regulations means any information that is recorded in a form that only a computer can process and that satisfies the definition of a Federal record per the Federal Records Act definition supplied above. Federal electronic records are not necessarily kept in a "recordkeeping system" but may reside in a generic electronic information system or are produced by an application such as word processing or electronic mail. 2(7) of ICT Act 2006 "electronic record" means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated microfiche; 8. Electronic Filing: In its simplest form, electronic filing is the substitution of an electronic document for a traditional paper document. With the evolution of Internet technology, electronic filing has become a highly secure and reliable method for sending, receiving, and managing legal documents and case information. 9. IP (Internet Protocol) is the primary network protocol used on the Internet, developed in the 1970s. On the Internet and many other networks, IP is often used together with the Transport Control Protocol (TCP) and referred to interchangeably as TCP/IP. IP supports unique addressing for computers on a network. Most networks use the Internet Protocol version 4 (IPv4) standards that features IP addresses four bytes (32 bits) in length. The newer Internet Protocol version 6 (IPv6) standard features addresses 16 bytes (128 bits) in length. Data on an Internet Protocol network is organized into packets. Each IP packet includes both a header (that specifies source, destination, and other information about the data) and the message data itself. 10. Www: The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to 8
  • 9. the Internet worldwide, including the client devices (such as computers and cell phones) that access Web content. The WWW is just one of many applications of the Internet and computer networks. 11. Definition of HTTP: The Hyper Text Transfer Protocol provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical specification of a network protocol that software must implement. HTTP is an application layer network protocol built on top of TCP. HTTP clients (such as Web browsers) and servers communicate via HTTP request and response messages. The three main HTTP message types are GET, POST, and HEAD. HTTP utilizes TCP port 80 by default, though other ports such as 8080 can alternatively be used. 12.Web Page: A web page or webpage is a document or information resource that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device. This information is usually in HTML or XHTML format, and may provide navigation to other web pages via hypertext links. Web pages frequently subsume other resources such as style sheets, scripts and images into their final presentation. Web pages may be retrieved from a local computer or from a remote web server. The web server may restrict access only to a private network, e.g. a corporate intranet, or it may publish pages on the World Wide Web. Web pages are requested and served from web servers using Hypertext Transfer Protocol (HTTP). 13. Electronic Transaction: An electronic transaction is the sale or purchase of goods or services whether between business, households, individuals, governments and other public or private organizations conducted over computer mediated networks. The goods and services are ordered over those networks, but the payment and the ultimate delivery of goods or service may be conducted on or off-line. 14. An electronic certificate: An electronic certificate satisfies the ―accompany‖ requirement if the certificate is identified by a unique identifier and can be accessed via a World Wide Web URL or other electronic means, provided the URL or other electronic means and the unique identifier are created in advance and are available, along with access 9
  • 10. to the electronic certificate itself, to the Commission or to the Customs authorities as soon as the product or shipment itself is available for inspection. Section 36 of ICT Act 2006 : Issue of certificate.—The Certifying Authority may issue a certificate to a prospective subscriber only after the Certifying Authority— (a) has received an application in the prescribed form requesting for issuance of a certificate from the prospective subscriber; (b) if it has a certification practice statement, complied with all of the practices and procedures set forth in such certification practice (c) if the prospective subscriber is the person to be listed in the certificate to be issued; (d) if all information in the certificate to be issued is correct; and (e) Whether the prospective subscriber paid such fees as may be prescribed for issuance of certificate. 15. Electronic commerce or e-commerce: Electronic commerce or e-commerce refers to a wide range of online business activities for products and services. It also pertains to ―any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact.‖ Electronic commerce, commonly known as e-commerce or e-comm., refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices and telephones as well. Electronic commerce is generally considered to be the sales aspect of e- business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. E-commerce can be divided into: E-tailing or "virtual storefronts" on Web sites with online catalogs, sometimes gathered into a "virtual mall" 10
  • 11. The gathering and use of demographic data through Web contacts Electronic Data Interchange (EDI), the business-to-business exchange of data E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) Business-to-business buying and selling The security of business transactions 16. An e-form (electronic form) is a computer program version of a paper form. Aside from eliminating the cost of printing, storing, and distributing pre- printed forms, and the wastage of obsolete forms, e-forms can be filled out faster because the programming associated with them can automatically format, calculate, look up, and validate information for the user. With digital signatures and routing via e-mail, approval cycle times can be significantly reduced. With electronic submission of completed forms, you can eliminate the cost of rekeying data and the associated errors. 2(5) of ICT, 2006 "electronic form" with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated microfiche or similar device or technology; Forgery is the process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive. Copies, studio replicas, and reproductions are not considered forgeries, though they may later become forgeries through knowing and willful misrepresentations. Forging money or currency is more often called counterfeiting. But consumer goods may also be counterfeits if they are not manufactured or produced by the designated manufacture or producer given on the label or flagged by the trademark symbol. When the object forged is a record or document it is often called a false document. This usage of "forgery" does not derive from metalwork done at a forge, but it has a parallel history. A sense of "to counterfeit" is already in the Anglo-French verb forger, meaning "falsify." A forgery is essentially concerned with a produced or altered object. Where the prime concern of a forgery is less focused on the object itself – what it is worth or what it "proves" – than on a tacit statement of criticism that is revealed by the reactions the object provokes in others, then the larger process is a hoax. In a hoax, a rumor or a genuine object planted in a concocted situation, may substitute for a forged physical object. The similar crime of fraud is the crime of deceiving another, including through the use of objects obtained through forgery. Forgery is one of the techniques of fraud, including identity theft. Forgery is one of the threats addressed by security engineering. 11
  • 12. 17. Internet: The internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol. Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other networks. These networks enable the internet to be used for various important functions which include the several means of communications like the file transfer, the online chat and even the sharing of the documents and web sites on the WWW, or the World Wide Web. It is always mistaken said that the internet and the World Wide Web are both the same terms, or are synonymous. Actually there is a very significant difference between the two which has to be clear to understand both the terms. The internet and World Wide Web are both the networks yet; the internet is the network of the several different computers which are connected through the linkage of the accessories like the copper wires, the fiber optics and even the latest wireless connections. However, the World Wide Web consists of the interlinked collection of the information and documents which are taken as the resource by the general public. These are then linked by the website URLs and the hyperlinks. Therefore World Wide Web is one of the services offered by the whole complicated and huge network of the internet. The use of IP in the Internet is the integral part of the network, as they provide the services of the internet, through different layers organization through the IP data packets. There are other protocols that are the sub-classes of the IP itself, like the TCP, and the HTTP. 18. Stalking is a crime. Under the Crime (Domestic and Personal Violence) Act 2007, stalking includes the following of a person about or the watching or frequenting of the vicinity of, or an approach to a person’s place of residence, business or work or any place that a person frequents for the purposes of any activity Stalking involves a persistent course of conduct or actions by a person which are intended to maintain contact with, or exercise power and control over another person. These actions cause distress, loss of control, fear or harassment to another person and occur more than once. 12
  • 13. Stalking can involve threats or sexual innuendo and the stalker generally tries to intimidate or induce fear in the person they are stalking. The person being stalked may only realize they are being stalked once they identify a pattern of strange or suspicious incidents occurring, such as: phone calls text messages messages left on social networking sites (My Space, Face book) notes left on their car flowers left at their home an awareness that they are being followed being continually stared at by another person. The person being stalked often develops a sense of loss of control over their lives and is forced into changing their life routine and behaviors’. Stalking is committed when a person: Intentionally and persistently Without legitimate reason Engages in a course of conduct directed at another specific person Against their will This causes the other person to develop fear, or to believe that harm would come to them Paper: A substance in the form of thin sheets or leaves intended to be written or printed on, or to be used in wrapping. It is made of rags, straw, bark, wood, or other fibrous material, which is first reduced to pulp, then molded, pressed, and dried. A book is a set of written, printed, illustrated, or blank sheets, made of ink, paper, parchment, or other materials, usually fastened together to hinge at one side. A single sheet within a book is called a leaf, and each side of a leaf is called a page. A book produced in electronic format is known as an electronic book (e-book). Books may also refer to works of literature, or a main division of such a work. In library and information science, a book is called a monograph, to distinguish it from serial periodicals such as magazines, journals or newspapers. The body of all written works including books is literature. 13