SlideShare una empresa de Scribd logo
1 de 20
A 
Presentation 
On 
“Cyber Crime Laws and 
Cases related to it in India.” 
Presented By: 
RAHUL VAGHELA 
ARPAN SHAH
What is Cyber crime??? 
• Cyber crime is simply defined as crimes that are 
directly related to computers and using 
computers. 
• An increasing number of domestic and 
international criminal activities are using the 
Internet. Computers and other electronic 
devices can be tools to commit crime or are 
targeted by criminals. A personal computer 
connected to the Internet without protection 
may be infected with malicious software in 
under a minute.
• Cybercrime has been used to describe 
a wide range of offences, including 
offences against computer data and 
systems (such as “hacking”), computer-related 
forgery and fraud (such as 
“phishing”), content offences and 
copyright offences (such as the 
dissemination of pirated content). 
 Cybercrime is one of the fastest-growing 
criminal activities on the 
planet. It covers a huge range of 
illegal activity including financial 
scams, computer hacking, virus 
attacks, stalking by e-mail and 
creating websites that promote 
racial hatred.
Denial of 
service 
Malware 
Computer 
Viruses 
Transmission 
of indecent 
material 
Harassment 
(sexual, 
racial, 
religious etc.) 
Computer 
Vandalism 
Transmission 
of harmful 
programs 
Terrorize 
international 
Govt. 
Cracking into 
military 
maintained 
website 
4
WHO ARE CYBER CRIMINALS? 
 Kids (age group 9-16 etc.) 
 Organized hack activists 
 Disgruntled employees 
 Professional hackers (corporate espionage)
Cyber Crime In India 
 The majority of cybercrimes are centered on fraud and Phishing, 
 India is the third-most targeted country for Phishing attacks after the 
US and the UK, 
 Social networks as well as ecommerce sites are major targets, 
 6.9 million bot-infected systems in 2010, 
 14,348 website defacements in 2010, 
 6,850 .in and 4,150 .com domains were defaced during 2011, 
 15,000 sites hacked in 2011, 
 India is the number 1 country in the world for generating spam.
Why India? 
A rapidly growing online user 
base 
 121 Million Internet Users 
 65 Million Active Internet 
Users, up by 28% from 51 
million. 
 50 Million users shop online 
on Ecommerce and Online 
Shopping Sites 
 46+ Million Social Network 
Users 
 346 million mobile users had 
subscribed to Data Packages.
Cyber Laws in India 
Under The Information 
Technology Act, 2000 
CHAPTER XI – OFFENCES – 66. Hacking with 
computer system. 
(1) Whoever with the Intent to cause or knowing 
that he is likely to cause Wrongful Loss or 
Damage to the public or any person Destroys or 
Deletes or Alters any Information Residing in a 
Computer Resource or diminishes its value or 
utility or affects it injuriously by any means, 
commits hack. 
(2) Whoever commits hacking shall be punished with imprisonment up to three years, 
or with fine which may extend up to two lakh rupees, or with both.
Cyber Laws 
Cyber Law is the law governing cyber space. 
Cyber space is a very wide term and includes 
computers, networks, software, data storage 
devices (such as hard disks, USB disks etc), 
the Internet, websites, emails and even 
electronic devices such as cell phones, ATM 
machines etc. 
 Needs for Cyber Law 
 TACKLING CYBER CRIMES 
 Laws are necessary in all segments of society, and e-commerce. 
 All Internet users, including minors, need to be assured of their privacy and 
the safety of their personal information online.
Case 1: 
ONLINE CREDIT CARD FRAUD ON E-BAY 
 e-bay.in is the most popular online shopping mall providing free online auctions for 
products like mobiles/cell phones, cameras, computers, etc. 
 Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 
12.5 lakh. 
 Two persons, including alleged mastermind Debasis Pandit, a BCA student, were 
arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela 
the other arrested person is Rabi Narayan Sahu. 
 A case has been registered against the accused under Sections 420 and 34 of the 
Indian Penal Code and Section 66 of the IT Act and further investigation is on, he 
said.
 Pandit allegedly hacked into the eBay India site and gathered the details of around 
700 credit cardholders. He then made purchases by using their passwords. 
 The fraud came to the notice of eBay officials when it was detected that 
several purchases were made from Rourkela while the customers were based in 
cities such as Bangalore, Baroda and Jaipur and even London. 
 The company brought the matter to the notice of Rourkela police after 
some customers lodged complaints 
 Pandit used the address of Sahu for delivery of the purchased goods 
 The gang was involved in train, flight and hotel reservations.
Case 2: 
ACCUSESD IN RS 400 MILLION SMS SCAM 
ARRESTED IN MUMBAI 
 Jayanand Nadar, 30, and Ramesh Gala, 26, were arrested late on 
Monday from a hotel in Mira Road in the western suburbs. Nadar, a 
first year college dropout, along with his brother Jayaraj had allegedly 
duped at least 50,000 people of Rs.400 million, said officials in the 
city police's Economic Offences Wing (EOW). 
 The two brothers along with Gala allegedly took help of SMS 
technology and launched the first-of-its-kind SMS fraud in India. 
 As part of the attractive scheme, the Nadar brothers messaged 
random numbers, asking people interested in 'earning Rs.10,000 per 
month' to contact them.
 "Interested 'subscribers' were asked to deposit Rs.500 each. The 
conmen duo claimed to be working with a US-based company named 
Aropis Advertising Company, which wanted to market its client's 
products through SMS'," senior inspector A Thakur said. 
 The brothers are said to have told the subscribers that their American 
clients wanted to conduct a study about local response to their 
advertisement and were using SMS as it was the latest medium of 
communication. 
 "The brothers led an extravagant life. They would stay in top five star 
hotels, throw massive parties for investors and were also known faces 
in the city's Page-3 circuit," Thakur revealed. 
 Gala, who is believed to have looked after the accounts, and Jayanand 
have been remanded to police custody till March 5."
Case 3: 
SONY.SAMBANDH.COM CASE 
 Sony India Private Ltd, which runs a website called www.sony-sambandh. 
com, targeting Non Resident Indians. The website enables NRIs 
to send Sony products to their friends and relatives in India after they pay 
for it online. 
 The company undertakes to deliver the products to the concerned 
recipients. In May 2002, someone logged onto the website under the 
identity of Barbara Campa and ordered a Sony Colour Television set and a 
cordless head phone. 
 At the time of delivery, the company took digital photographs showing the 
delivery being accepted by Arif Azim. The transaction closed at that, but 
after one and a half months the credit card agency informed the company 
that this was an unauthorized transaction as the real owner had denied 
having made the purchase.
 The court, however, felt that as the accused was a young boy of 24 
years and a first-time convict, a lenient view needed to be taken. The 
court therefore released the accused on probation for one year. 
 The judgment is of immense significance for the entire nation. 
Besides being the first conviction in a cybercrime matter, it has 
shown that the the Indian Penal Code can be effectively applied to 
certain categories of cyber crimes which are not covered under the 
Information Technology Act 2000. Secondly, a judgment of this sort 
sends out a clear message to all that the law cannot be taken for a 
ride.
Case 4: 
Pune Citibank MphasiS Call Centre Fraud 
 The crime was obviously committed using "Unauthorized Access" to the 
"Electronic Account Space" of the customers. It is therefore firmly within the 
domain of "Cyber Crimes". 
 ITA-2000 is versatile enough to accommodate the aspects of crime not 
covered by ITA-2000 but covered by other statutes since any IPC offence 
committed with the use of "Electronic Documents" can be considered as a 
crime with the use of a "Written Documents". "Cheating", "Conspiracy", 
"Breach of Trust" etc are therefore applicable in the above case in addition 
to section in ITA-2000. 
 Under ITA-2000 the offence is recognized both under Section 66 and Section 
43. Accordingly, the persons involved are liable for imprisonment and fine as 
well as a liability to pay damage to the victims to the maximum extent of Rs 
1 crore per victim for which the "Adjudication Process" can be invoked.
Case 5: 
India's First ATM Card Fraud 
 The Chennai City Police have busted an international gang involved in cyber 
crime, with the arrest of Deepak PremManwani (22), who was caught red-handed 
while breaking into an ATM in the city in June last, it is reliably 
learnt. 
 At the time of his detention, he had with him Rs 7.5 lakh knocked off from 
two ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had 
walked away with Rs 50,000 from an ATM in Mumbai. 
 Manwani is an MBA drop-out from a Pune college and served as a marketing 
executive in a Chennai-based firm for some time. Interestingly, his 
audacious crime career started in an Internet cafe. While browsing the Net 
one day, he got attracted to a site which offered him assistance in breaking 
into the ATMs.
 Believing that it was a genuine offer from the telecom company in 
question, several lakh subscribers logged on to the site to get back 
that little money, but in the process parted with their PINs. 
 Meanwhile, Manwani also managed to generate 30 plastic cards that 
contained necessary data to enable him to break into ATMS. He was 
so enterprising that he was able to sell away a few such cards to his 
contacts in Mumbai. The police are on the lookout for those persons 
too. 
 On receipt of large-scale complaints from the billed credit card users 
and banks in the United States, the FBI started an investigation into 
the affair and also alerted the CBI in New Delhi that the international 
gang had developed some links in India too. 
 Manwani has since been enlarged on bail after interrogation by the 
CBI. But the city police believe that this is the beginning of the end of 
a major cyber crime.
CONCLUSION 
 “As internet technology advances so does the threat of cyber crime. In 
times like these we must protect ourselves from cyber crime. Anti-virus 
software, firewalls and security patches are just the beginning. 
Never open suspicious e-mails and only navigate to trusted sites. 
 Cyber laws essential feature in today’s world of internet 
 To reduce the damage to critical infrastructures 
 To protect the internet from being abused 
 Achieving global peace and harmony
Cyber Crime Laws in India: Cases and Acts

Más contenido relacionado

La actualidad más candente

Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliAhtasham Ali
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

La actualidad más candente (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Destacado

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governmentsCraig Thomler
 
In the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social MediaIn the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social Mediaandreamstewart
 
Public/Private Social Media
Public/Private Social Media Public/Private Social Media
Public/Private Social Media For3, LLC
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09Dr D.C. Misra
 

Destacado (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
 
In the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social MediaIn the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social Media
 
Frauds in banking
Frauds in banking Frauds in banking
Frauds in banking
 
Public/Private Social Media
Public/Private Social Media Public/Private Social Media
Public/Private Social Media
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
 

Similar a Cyber Crime Laws in India: Cases and Acts

cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codesRakesh Otari
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentVarsha Mali
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)santoshdkamat
 
Cyber assignment
Cyber assignmentCyber assignment
Cyber assignmentsparun
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)Pruthvi Prince
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)Pruthvi Prince
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)Pruthvi Prince
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sectionsvijayjituri
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 

Similar a Cyber Crime Laws in India: Cases and Acts (20)

cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber law11
Cyber law11Cyber law11
Cyber law11
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Anil final
Anil finalAnil final
Anil final
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
 
Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Pre itact
Pre itactPre itact
Pre itact
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Cyber Crime Laws in India: Cases and Acts

  • 1. A Presentation On “Cyber Crime Laws and Cases related to it in India.” Presented By: RAHUL VAGHELA ARPAN SHAH
  • 2. What is Cyber crime??? • Cyber crime is simply defined as crimes that are directly related to computers and using computers. • An increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
  • 3. • Cybercrime has been used to describe a wide range of offences, including offences against computer data and systems (such as “hacking”), computer-related forgery and fraud (such as “phishing”), content offences and copyright offences (such as the dissemination of pirated content).  Cybercrime is one of the fastest-growing criminal activities on the planet. It covers a huge range of illegal activity including financial scams, computer hacking, virus attacks, stalking by e-mail and creating websites that promote racial hatred.
  • 4. Denial of service Malware Computer Viruses Transmission of indecent material Harassment (sexual, racial, religious etc.) Computer Vandalism Transmission of harmful programs Terrorize international Govt. Cracking into military maintained website 4
  • 5. WHO ARE CYBER CRIMINALS?  Kids (age group 9-16 etc.)  Organized hack activists  Disgruntled employees  Professional hackers (corporate espionage)
  • 6. Cyber Crime In India  The majority of cybercrimes are centered on fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 7. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million.  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages.
  • 8. Cyber Laws in India Under The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 9. Cyber Laws Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.  Needs for Cyber Law  TACKLING CYBER CRIMES  Laws are necessary in all segments of society, and e-commerce.  All Internet users, including minors, need to be assured of their privacy and the safety of their personal information online.
  • 10. Case 1: ONLINE CREDIT CARD FRAUD ON E-BAY  e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc.  Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh.  Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela the other arrested person is Rabi Narayan Sahu.  A case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said.
  • 11.  Pandit allegedly hacked into the eBay India site and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords.  The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London.  The company brought the matter to the notice of Rourkela police after some customers lodged complaints  Pandit used the address of Sahu for delivery of the purchased goods  The gang was involved in train, flight and hotel reservations.
  • 12. Case 2: ACCUSESD IN RS 400 MILLION SMS SCAM ARRESTED IN MUMBAI  Jayanand Nadar, 30, and Ramesh Gala, 26, were arrested late on Monday from a hotel in Mira Road in the western suburbs. Nadar, a first year college dropout, along with his brother Jayaraj had allegedly duped at least 50,000 people of Rs.400 million, said officials in the city police's Economic Offences Wing (EOW).  The two brothers along with Gala allegedly took help of SMS technology and launched the first-of-its-kind SMS fraud in India.  As part of the attractive scheme, the Nadar brothers messaged random numbers, asking people interested in 'earning Rs.10,000 per month' to contact them.
  • 13.  "Interested 'subscribers' were asked to deposit Rs.500 each. The conmen duo claimed to be working with a US-based company named Aropis Advertising Company, which wanted to market its client's products through SMS'," senior inspector A Thakur said.  The brothers are said to have told the subscribers that their American clients wanted to conduct a study about local response to their advertisement and were using SMS as it was the latest medium of communication.  "The brothers led an extravagant life. They would stay in top five star hotels, throw massive parties for investors and were also known faces in the city's Page-3 circuit," Thakur revealed.  Gala, who is believed to have looked after the accounts, and Jayanand have been remanded to police custody till March 5."
  • 14. Case 3: SONY.SAMBANDH.COM CASE  Sony India Private Ltd, which runs a website called www.sony-sambandh. com, targeting Non Resident Indians. The website enables NRIs to send Sony products to their friends and relatives in India after they pay for it online.  The company undertakes to deliver the products to the concerned recipients. In May 2002, someone logged onto the website under the identity of Barbara Campa and ordered a Sony Colour Television set and a cordless head phone.  At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif Azim. The transaction closed at that, but after one and a half months the credit card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase.
  • 15.  The court, however, felt that as the accused was a young boy of 24 years and a first-time convict, a lenient view needed to be taken. The court therefore released the accused on probation for one year.  The judgment is of immense significance for the entire nation. Besides being the first conviction in a cybercrime matter, it has shown that the the Indian Penal Code can be effectively applied to certain categories of cyber crimes which are not covered under the Information Technology Act 2000. Secondly, a judgment of this sort sends out a clear message to all that the law cannot be taken for a ride.
  • 16. Case 4: Pune Citibank MphasiS Call Centre Fraud  The crime was obviously committed using "Unauthorized Access" to the "Electronic Account Space" of the customers. It is therefore firmly within the domain of "Cyber Crimes".  ITA-2000 is versatile enough to accommodate the aspects of crime not covered by ITA-2000 but covered by other statutes since any IPC offence committed with the use of "Electronic Documents" can be considered as a crime with the use of a "Written Documents". "Cheating", "Conspiracy", "Breach of Trust" etc are therefore applicable in the above case in addition to section in ITA-2000.  Under ITA-2000 the offence is recognized both under Section 66 and Section 43. Accordingly, the persons involved are liable for imprisonment and fine as well as a liability to pay damage to the victims to the maximum extent of Rs 1 crore per victim for which the "Adjudication Process" can be invoked.
  • 17. Case 5: India's First ATM Card Fraud  The Chennai City Police have busted an international gang involved in cyber crime, with the arrest of Deepak PremManwani (22), who was caught red-handed while breaking into an ATM in the city in June last, it is reliably learnt.  At the time of his detention, he had with him Rs 7.5 lakh knocked off from two ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had walked away with Rs 50,000 from an ATM in Mumbai.  Manwani is an MBA drop-out from a Pune college and served as a marketing executive in a Chennai-based firm for some time. Interestingly, his audacious crime career started in an Internet cafe. While browsing the Net one day, he got attracted to a site which offered him assistance in breaking into the ATMs.
  • 18.  Believing that it was a genuine offer from the telecom company in question, several lakh subscribers logged on to the site to get back that little money, but in the process parted with their PINs.  Meanwhile, Manwani also managed to generate 30 plastic cards that contained necessary data to enable him to break into ATMS. He was so enterprising that he was able to sell away a few such cards to his contacts in Mumbai. The police are on the lookout for those persons too.  On receipt of large-scale complaints from the billed credit card users and banks in the United States, the FBI started an investigation into the affair and also alerted the CBI in New Delhi that the international gang had developed some links in India too.  Manwani has since been enlarged on bail after interrogation by the CBI. But the city police believe that this is the beginning of the end of a major cyber crime.
  • 19. CONCLUSION  “As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.  Cyber laws essential feature in today’s world of internet  To reduce the damage to critical infrastructures  To protect the internet from being abused  Achieving global peace and harmony