SlideShare una empresa de Scribd logo
1 de 44
Cyber Law
What is Cybercrime?
• In general meaning , hackers vandalizing your
site, viewing confidential information, stealing
trade secrets or intellectual property with the
use of internet.
• It can also include viruses attacks preventing
regular traffic from searching a respective site.
• Cyber crimes also includes criminal activities
done with the use of computers
• which further perpetuates crimes i.e. financial
crimes, sale of illegal articles, pornography,
online gambling, intellectual property crime,
e-mail, spoofing, forgery, cyber defamation,
cyber stalking, unauthorized access to
Computer system, theft of information
contained in the electronic form, e-mail
bombing, physically damaging the computer
system etc.
Classification of cyber crimes
• Cyber Crimes against persons.
• Cyber Crimes against person’s
property.
• Cyber Crimes against Government.
• Cyber Crimes against Society at large.
Cyber crimes against persons
• Harassment via emails
• Cyber stalking
• Cracking
• Hacking
• Defamation
• Dissemination of obscene material
• SMS , email spoofing
• Assault by threat
Cyber crimes against person’s
property
• Cyber vandalism
• Intellectual property crimes
• Cyber squatting
• Hacking official computer system
• Cyber Trespass
• Transmitting viruses
• Internet thefts
Cyber Crimes against Government
• Cyber terrorism
• Distribution of pirated software
• Cyber warfare
• Possession of unauthorized information
Cyber Crimes against Society at
large
• Child pornography
• Online gambling
• Financial Crimes
• Forgery
• Online Trafficking
Need Of Cyber law
• IT has spread throughout the world ;
Computer is used in each and every Sector we
possibly know.
• As increasingly diverse range of online
interaction personally and officially expands,
there is a simultaneous expansion of cyber
crimes as well.
• For that reason; it is necessary to enact cyber
law strictly.
Introduction of cyber law
• By the time of growth and expansion, the
word ‘CYBER’ came to the knowledge of
people and became popular.
• Internationally, The world’s 1st computer
specific law was enacted in the year 1970 by
the German State of hesse in the form of ‘Data
Protection Act, 1970.
• Whereas in India , Parliament decided to pass
The Information Technology act 2002 on 17th
October to deal with cyber space wherein
internet provides equal opportunities to all the
people to access any information, storage etc.
• Copyright Law : this is in relation to
computer software, computer code, websites ,
etc.
• Trademark Law : this is in relation to
domain names, meta tags , mirroring, linking
etc.
• Semiconductor law : this relates to the
protection of semiconductor integrated
circuits design and layouts.
• Patent Law : this in relation to computer
hardware and software.
Jurisprudence of Indian Cyber Law
• The primary purpose of the Act is to provide
legal recognition to electronic commerce and
to facilitate filing of electronic records with
the Government.
• The IT Act also penalizes various cyber crimes
and provides strict punishments
(imprisonment terms upto 10 years and
compensation up to Rs 1 crore )
• An Executive Order dated 12 September 2002
contained instructions relating provisions of
the Act with regard to protected systems and
application for the issue of a Digital Signature
Certificate.
• Minor errors in the Act were rectified by the
Information Technology (Removal of
Difficulties) Order, 2002 which was passed on
19 September 2002.
• The IT Act was amended by the Negotiable
Instruments(Amendments and Miscellaneous
Provisions) Act, 2002. This introduced the
concept of electronic cheque and truncated
cheque .
• Information Technology (Use of Electronic
Records and Digital Signatures) Rules, 2004
has provided the necessary legal framework
for filing of documents with the Government
as well as issue of licenses by the
Government.
• The Cyber Regulations Appellate Tribunal
(Procedure) Rules, 2000 also came into force
on 17th October 2000.
• These rules prescribe the appointment and
working of the Cyber Regulations Appellate
Tribunal (CRAT) whose primary role is to hear
appeals against orders of the Adjudicating
Officers.
• This prescribe the salary, allowances and other
terms for the Presiding Officer of the CRAT.
• On 17th March 2003, the Information
Technology (Qualification and Experience of
Adjudicating Officers and Manner of Holding
Enquiry) Rules, 2003 were passed.
• These rules prescribe the qualifications
required for Adjudicating Officers. Their chief
responsibility under the IT Act is to adjudicate
on cases such as unauthorized access,
unauthorized copying of data, spread of
viruses, denial of service attacks, disruption of
computers, computer manipulation etc.
• Jurisdiction is an aspect of state sovereignty and it
refers to judicial, legislative and administrative
competence. Although jurisdiction is an aspect of
sovereignty, it is not coextensive with it. The laws of
a nation may have extraterritorial impact extending
the jurisdiction beyond the sovereign and territorial
limits of that nation. This is particularly problematic
as the medium of the Internet does not explicitly
recognize sovereignty and territorial limitations.
There is no uniform, international jurisdictional law
of universal application, and such questions are
generally a matter of conflict of laws, particularly
private international law.
Case study of attacks in cyber
space
• Worm attack: The Robert Tappan Morris to
well known as first hacker, son of former
national security agency scientist Robert
Morris created worm at Cornell as student
claiming that he wanted to know how large
was the internet at that time.
• This worm destroyed around 6000 computer
systems and many computers were shut down
till they were malfunctioned.
• Ultimately , he was sentenced to 3 years of
probation , 400 hours of community service
and fine of $10500.
• So, So there must be strict laws to punish the
criminals who are involved in cyber crime
activities.
• Hacker Attack: Fred Cohen, Ph.D. Student
at the University of Southern California wrote
a short program in the year 1983, as an
experiment, that could “infect” computers,
make copies of itself, and spread from one
machine to another.
• Other computer scientists had warned that
computer viruses were possible, but Cohen’s
was the first to be documented. A professor of
his suggested the name “virus”. Cohen now
runs a computer security firm
• Internet Hacker: Wang Qun, who was
known by the nickname of “playgirl”, was
arrested by chinese police in the Hubei
province first ever arrest of an internet hacker
in China.
• He was a 19 year old computing student,
arrested in connection with the alleged
posting of pornographic material on the
homepages of several government-run web
sites. Wang had also hacked over 30 other
web sites too.
Cyber crimes in India
• As per the records , it has been noted that in
last 10 years the amount of cyber crimes in
India is increasing every year and apparently
years 2011 to 2013 top the charts.
• And it has been recorded that every year new
cyber crimes are taking place all over the
country.
Cyber Crimes Survey(Information &
technology Act)
Cyber Crimes survey
(Indian penal code)
Top 10 states in India
i. Maharashtra
ii. Andhra Pradesh
iii. Karnataka
iv. Kerala
v. Uttar Pradesh
vi. Madhya Pradesh
vii. Rajasthan
viii.West Bengal
ix. Punjab
x. Delhi
The bottom 10 States
i. Nagaland
ii. Lakshadweep
iii. Manipur
iv. Daman & Diu
v. Mizoram
vi. Sikkim
vii. Dadra & Nagar Haveli
viii. Pondicherry
ix. Andaman & Nicobar Islands
x. Tripura
Role of Government
• Government has set up cyber forensic training
and investigation labs in the States of Kerala,
Assam, Mizoram, Nagaland, Arunachal
Pradesh, Tripura, Meghalaya, Manipur and
Jammu & Kashmir for training of Law
Enforcement and Judiciary in these States.
• Cyber Crime Cells have been set up in all
States and Union Territories for reporting and
investigation of Cyber Crime cases.
• Number of Cyber forensics tools for collection,
analysis, presentation of the digital evidence
have been developed and are being used by
Law Enforcement Agencies.
• RBI has issued a circular to all commercial
banks about the phishing attacks and
preventions from phishing attacks to
implement and business processes in a better
way.
Consequences for committing
a Cyber Crime
• It is new world where few laws have been made to
fight criminal activity. However, people still get
punished if they are caught for a cyber crime.
 Heavy fines
 Restitution
 Probation
 Community Service
 Possible imprisonment
Landmark cases of Cyber space
• China ‘s Online Crackdown by 900 hackers
-November , 2015
• Private reporting helpline case in New Delhi
-November , 2015
• India’s First wildlife Cyber Crime in
Maharashtra in September , 2014
• Number of cases registered in Andhra Pradesh
in Year 2013
Preventive measures for Cyber Crimes
• One should avoid disclosing any personal
information to strangers via e-mail or while
chatting.
• One must avoid sending any photograph to
strangers by online as misusing of photograph
incidents increasing day by day.
• A person should never send his credit card
number to any site that is not secured, to
guard against frauds.
• It is better to use a security programmes by
the body corporate to control information on
sites.
• Strict statutory laws need to be passed by the
Legislatures keeping in mind the interest of
netizens .
• A complete justice must be provided to the
victims of cyber crimes by way of
compensatory remedy and offenders to be
punished with highest type of punishment so
that it will anticipate the criminals of cyber
crime.
Advantages of Cyber Law
• From the perspective of e-commerce in India,
the IT Act 2000 and its provisions contain
many positive aspects. Firstly, the implications
of these provisions for the e-businesses would
be that email would now be a valid and legal
form of communication in our country that
can be duly produced and approved in a court
of law.
• Companies shall now be able to carry out
electronic commerce using the legal
infrastructure provided by the Act.
• Digital signatures have been given legal
validity and sanction in the Act.
• The Act throws open the doors for the entry of
corporate companies in the business of being
Certifying Authorities for issuing Digital
Signatures Certificates.
Disadvantages of
Cyber law
• Cyber security refers to the collection of tools,
policies, risk management approaches,
actions, training, best practices, assurance and
technologies that can be used to protect the
cyber environment and organization and
user’s assets and it proves to be expensive.
• Interception refers to listening to, recording,
monitoring or surveillance of the content of
communications, including procuring of the
content of data, either directly, through access
and use of a computer system or indirectly,
through the use of electronic eavesdropping
or tapping devices, at the same time that the
communication is occurring.
Ethics of cyber Law
• Evaluate the ethics of Cyber Law in Australia
The concept of cyber law in Australia is subject
to a wide range of controversy, due to the lack
of privacy offered to the individuals of
Australia. Policies regarding Cyber Law in
Australia are very narrow, and often do not
provide the adequate amount of privacy and
security to users in Australia, thus providing a
motive for the necessity of an alteration
of Cyber Law in Australia.
Education of Cyber Law
Courses offered in Cyber
law& Investigation
• Diploma in Cyber Law
• Diploma in Cyber Law+
• Cyber Crime Investigator+
• C5(Skills in Cyber crimes & attacks )
• Cyber career track
Cyber Law Schools in India
• Asian school of cyber Law(various colleges of
Mumbai)
• Distance Learning (E-learning)
• Indira Gandhi National open
university(IGNOU)
• Symbiosis School of law
• Other government & private school providing
certificate courses across the country
Information technology Lawyer
• An information technology attorney is a
professional who handles a variety of legal
matters related to IT. The attorney gets involved
in drafting, negotiating, and interpreting
agreements in the areas of software licensing and
maintenance, IT consulting, e-commerce, web
site hosting and development, and
telecommunications agreements, as well as
handling dispute resolution and assisting with the
client's Internet domain name portfolio.
• In India Bukh and Associates have built a track
record of success .
• Also, Prashant Mali, is a famous International Cyber
Law Expert, Privacy Law , Cyber Security & IPR
Attorney. A High Court Lawyer & Legal Counsel in
Mumbai India.
• He is country's only technology lawyer with prior
working experience in the IT Industry & then in Law
Field with Qualifications as Masters in Computer
Science (M.Sc.), Masters in Law (LLM), Certified
Computer Forensics Expert (CCFP).
conclusion
•
Since users of computer system and internet are
increasing worldwide, where it is easy to access
any information easily within a few seconds by
using internet which is the medium for huge
information and a large base of communications
around the world. Certain precautionary
measures should be taken by those who spend
most of the time online and assist in challenging
this major threat Cyber Crime.

Más contenido relacionado

La actualidad más candente

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
maruhope
 

La actualidad más candente (20)

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Destacado

Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 

Destacado (20)

Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber Law and Business Report Year in Review: 2015
Cyber Law and Business Report Year in Review: 2015Cyber Law and Business Report Year in Review: 2015
Cyber Law and Business Report Year in Review: 2015
 
Cyber law
Cyber lawCyber law
Cyber law
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
Business Law Chater 6
Business Law Chater 6Business Law Chater 6
Business Law Chater 6
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Introduction to Legal Technology, lecture 8 (2015)
Introduction to Legal Technology, lecture 8 (2015)Introduction to Legal Technology, lecture 8 (2015)
Introduction to Legal Technology, lecture 8 (2015)
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Unit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawUnit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 

Similar a Cyber law2

India cyber
India cyberIndia cyber
India cyber
sabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
cloneseeyom
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
Suryakanta Rout
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Similar a Cyber law2 (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

Último

一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
F La
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
ss
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
ss
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 

Último (20)

A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 

Cyber law2

  • 2. What is Cybercrime? • In general meaning , hackers vandalizing your site, viewing confidential information, stealing trade secrets or intellectual property with the use of internet. • It can also include viruses attacks preventing regular traffic from searching a respective site. • Cyber crimes also includes criminal activities done with the use of computers
  • 3. • which further perpetuates crimes i.e. financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail, spoofing, forgery, cyber defamation, cyber stalking, unauthorized access to Computer system, theft of information contained in the electronic form, e-mail bombing, physically damaging the computer system etc.
  • 4. Classification of cyber crimes • Cyber Crimes against persons. • Cyber Crimes against person’s property. • Cyber Crimes against Government. • Cyber Crimes against Society at large.
  • 5. Cyber crimes against persons • Harassment via emails • Cyber stalking • Cracking • Hacking • Defamation • Dissemination of obscene material • SMS , email spoofing • Assault by threat
  • 6. Cyber crimes against person’s property • Cyber vandalism • Intellectual property crimes • Cyber squatting • Hacking official computer system • Cyber Trespass • Transmitting viruses • Internet thefts
  • 7. Cyber Crimes against Government • Cyber terrorism • Distribution of pirated software • Cyber warfare • Possession of unauthorized information
  • 8. Cyber Crimes against Society at large • Child pornography • Online gambling • Financial Crimes • Forgery • Online Trafficking
  • 9. Need Of Cyber law • IT has spread throughout the world ; Computer is used in each and every Sector we possibly know. • As increasingly diverse range of online interaction personally and officially expands, there is a simultaneous expansion of cyber crimes as well. • For that reason; it is necessary to enact cyber law strictly.
  • 10. Introduction of cyber law • By the time of growth and expansion, the word ‘CYBER’ came to the knowledge of people and became popular. • Internationally, The world’s 1st computer specific law was enacted in the year 1970 by the German State of hesse in the form of ‘Data Protection Act, 1970.
  • 11. • Whereas in India , Parliament decided to pass The Information Technology act 2002 on 17th October to deal with cyber space wherein internet provides equal opportunities to all the people to access any information, storage etc.
  • 12. • Copyright Law : this is in relation to computer software, computer code, websites , etc. • Trademark Law : this is in relation to domain names, meta tags , mirroring, linking etc. • Semiconductor law : this relates to the protection of semiconductor integrated circuits design and layouts. • Patent Law : this in relation to computer hardware and software.
  • 13. Jurisprudence of Indian Cyber Law • The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. • The IT Act also penalizes various cyber crimes and provides strict punishments (imprisonment terms upto 10 years and compensation up to Rs 1 crore )
  • 14. • An Executive Order dated 12 September 2002 contained instructions relating provisions of the Act with regard to protected systems and application for the issue of a Digital Signature Certificate. • Minor errors in the Act were rectified by the Information Technology (Removal of Difficulties) Order, 2002 which was passed on 19 September 2002.
  • 15. • The IT Act was amended by the Negotiable Instruments(Amendments and Miscellaneous Provisions) Act, 2002. This introduced the concept of electronic cheque and truncated cheque . • Information Technology (Use of Electronic Records and Digital Signatures) Rules, 2004 has provided the necessary legal framework for filing of documents with the Government as well as issue of licenses by the Government.
  • 16. • The Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000 also came into force on 17th October 2000. • These rules prescribe the appointment and working of the Cyber Regulations Appellate Tribunal (CRAT) whose primary role is to hear appeals against orders of the Adjudicating Officers. • This prescribe the salary, allowances and other terms for the Presiding Officer of the CRAT.
  • 17. • On 17th March 2003, the Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003 were passed. • These rules prescribe the qualifications required for Adjudicating Officers. Their chief responsibility under the IT Act is to adjudicate on cases such as unauthorized access, unauthorized copying of data, spread of viruses, denial of service attacks, disruption of computers, computer manipulation etc.
  • 18. • Jurisdiction is an aspect of state sovereignty and it refers to judicial, legislative and administrative competence. Although jurisdiction is an aspect of sovereignty, it is not coextensive with it. The laws of a nation may have extraterritorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation. This is particularly problematic as the medium of the Internet does not explicitly recognize sovereignty and territorial limitations. There is no uniform, international jurisdictional law of universal application, and such questions are generally a matter of conflict of laws, particularly private international law.
  • 19. Case study of attacks in cyber space • Worm attack: The Robert Tappan Morris to well known as first hacker, son of former national security agency scientist Robert Morris created worm at Cornell as student claiming that he wanted to know how large was the internet at that time. • This worm destroyed around 6000 computer systems and many computers were shut down till they were malfunctioned.
  • 20. • Ultimately , he was sentenced to 3 years of probation , 400 hours of community service and fine of $10500. • So, So there must be strict laws to punish the criminals who are involved in cyber crime activities.
  • 21. • Hacker Attack: Fred Cohen, Ph.D. Student at the University of Southern California wrote a short program in the year 1983, as an experiment, that could “infect” computers, make copies of itself, and spread from one machine to another. • Other computer scientists had warned that computer viruses were possible, but Cohen’s was the first to be documented. A professor of his suggested the name “virus”. Cohen now runs a computer security firm
  • 22. • Internet Hacker: Wang Qun, who was known by the nickname of “playgirl”, was arrested by chinese police in the Hubei province first ever arrest of an internet hacker in China. • He was a 19 year old computing student, arrested in connection with the alleged posting of pornographic material on the homepages of several government-run web sites. Wang had also hacked over 30 other web sites too.
  • 23. Cyber crimes in India • As per the records , it has been noted that in last 10 years the amount of cyber crimes in India is increasing every year and apparently years 2011 to 2013 top the charts. • And it has been recorded that every year new cyber crimes are taking place all over the country.
  • 24. Cyber Crimes Survey(Information & technology Act)
  • 26. Top 10 states in India i. Maharashtra ii. Andhra Pradesh iii. Karnataka iv. Kerala v. Uttar Pradesh vi. Madhya Pradesh vii. Rajasthan viii.West Bengal ix. Punjab x. Delhi
  • 27. The bottom 10 States i. Nagaland ii. Lakshadweep iii. Manipur iv. Daman & Diu v. Mizoram vi. Sikkim vii. Dadra & Nagar Haveli viii. Pondicherry ix. Andaman & Nicobar Islands x. Tripura
  • 28. Role of Government • Government has set up cyber forensic training and investigation labs in the States of Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu & Kashmir for training of Law Enforcement and Judiciary in these States. • Cyber Crime Cells have been set up in all States and Union Territories for reporting and investigation of Cyber Crime cases.
  • 29. • Number of Cyber forensics tools for collection, analysis, presentation of the digital evidence have been developed and are being used by Law Enforcement Agencies. • RBI has issued a circular to all commercial banks about the phishing attacks and preventions from phishing attacks to implement and business processes in a better way.
  • 30. Consequences for committing a Cyber Crime • It is new world where few laws have been made to fight criminal activity. However, people still get punished if they are caught for a cyber crime.  Heavy fines  Restitution  Probation  Community Service  Possible imprisonment
  • 31. Landmark cases of Cyber space • China ‘s Online Crackdown by 900 hackers -November , 2015 • Private reporting helpline case in New Delhi -November , 2015 • India’s First wildlife Cyber Crime in Maharashtra in September , 2014 • Number of cases registered in Andhra Pradesh in Year 2013
  • 32. Preventive measures for Cyber Crimes • One should avoid disclosing any personal information to strangers via e-mail or while chatting. • One must avoid sending any photograph to strangers by online as misusing of photograph incidents increasing day by day. • A person should never send his credit card number to any site that is not secured, to guard against frauds.
  • 33. • It is better to use a security programmes by the body corporate to control information on sites. • Strict statutory laws need to be passed by the Legislatures keeping in mind the interest of netizens . • A complete justice must be provided to the victims of cyber crimes by way of compensatory remedy and offenders to be punished with highest type of punishment so that it will anticipate the criminals of cyber crime.
  • 34. Advantages of Cyber Law • From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.
  • 35. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act. • The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates.
  • 36. Disadvantages of Cyber law • Cyber security refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets and it proves to be expensive.
  • 37. • Interception refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  • 38. Ethics of cyber Law • Evaluate the ethics of Cyber Law in Australia The concept of cyber law in Australia is subject to a wide range of controversy, due to the lack of privacy offered to the individuals of Australia. Policies regarding Cyber Law in Australia are very narrow, and often do not provide the adequate amount of privacy and security to users in Australia, thus providing a motive for the necessity of an alteration of Cyber Law in Australia.
  • 39. Education of Cyber Law Courses offered in Cyber law& Investigation
  • 40. • Diploma in Cyber Law • Diploma in Cyber Law+ • Cyber Crime Investigator+ • C5(Skills in Cyber crimes & attacks ) • Cyber career track
  • 41. Cyber Law Schools in India • Asian school of cyber Law(various colleges of Mumbai) • Distance Learning (E-learning) • Indira Gandhi National open university(IGNOU) • Symbiosis School of law • Other government & private school providing certificate courses across the country
  • 42. Information technology Lawyer • An information technology attorney is a professional who handles a variety of legal matters related to IT. The attorney gets involved in drafting, negotiating, and interpreting agreements in the areas of software licensing and maintenance, IT consulting, e-commerce, web site hosting and development, and telecommunications agreements, as well as handling dispute resolution and assisting with the client's Internet domain name portfolio.
  • 43. • In India Bukh and Associates have built a track record of success . • Also, Prashant Mali, is a famous International Cyber Law Expert, Privacy Law , Cyber Security & IPR Attorney. A High Court Lawyer & Legal Counsel in Mumbai India. • He is country's only technology lawyer with prior working experience in the IT Industry & then in Law Field with Qualifications as Masters in Computer Science (M.Sc.), Masters in Law (LLM), Certified Computer Forensics Expert (CCFP).
  • 44. conclusion • Since users of computer system and internet are increasing worldwide, where it is easy to access any information easily within a few seconds by using internet which is the medium for huge information and a large base of communications around the world. Certain precautionary measures should be taken by those who spend most of the time online and assist in challenging this major threat Cyber Crime.