SlideShare a Scribd company logo
1 of 29
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali   [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law  &  IPR Expert Email Crimes & Indian Cyber Law
INTRODUCTION  ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
DIFFERENT TYPES OF CYBERCRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
E-MAIL RELATED CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount  of  $8000000 USD
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable  Section 415,416, 417 420 of IPC  
2. Sending Malicious Codes through email  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
3.  Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber  jams your inbox continuously with same emails
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b)  If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability :  Compensation to be paid Section(66)  :  Imprisonment upto 3yrs  OR   Fine up to 5 Lakhs OR Both Also Applicable  Section 379,405,420 of IPC
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist  Javed Akhtar  has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section  66-A   Punishment for sending offensive messages through  communication service, etc.      Any person who sends, by means of a computer resource or a communication device,- a) any   information  that is grossly offensive or has menacing character; or b) any   information  which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred,  or ill will, persistently makes  by making  use of such computer resource or a  communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with  imprisonment for a term which may extend to two three years  and with fine.
6. Emails containing sexually explicit act etc w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 66 and 43(d)  :  DATA DIDDLING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines  Cyber Terrorism and  Section 66-F(2) Specifies Punishment of imprisonment  which may extend to imprisonment for life
Section 66C:  IDENTITY THEFT ,[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section 66C: IDENTITY THEFT- CASE STUDY ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section(66) : CREDIT CARD FRAUD ,[object Object],[object Object],[object Object]
Section(66) :  PHISHING  ,[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section(66) :  PHISHING Case Study ,[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
EMAIL  DEFAMATION CASE  ,[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Tata Sons v. Greenpeace International  Delhi HC  IA 9089/2010 in CS (OS) 1407/2010 ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You   Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell:  9821763157

More Related Content

What's hot

Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
Prakash Masagi
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
vishalhp123
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
Adam Varn
 

What's hot (16)

Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
It act
It actIt act
It act
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber
CyberCyber
Cyber
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases.
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 

Similar to Email crimes and IT Law-Nasscom cyber safe 2010

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 

Similar to Email crimes and IT Law-Nasscom cyber safe 2010 (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Shilpa
ShilpaShilpa
Shilpa
 
Hacking laws in india
Hacking laws in indiaHacking laws in india
Hacking laws in india
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 

More from Adv Prashant Mali

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Adv Prashant Mali
 

More from Adv Prashant Mali (15)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

Recently uploaded

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Email crimes and IT Law-Nasscom cyber safe 2010

  • 1. Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law & IPR Expert Email Crimes & Indian Cyber Law
  • 2.
  • 3.
  • 4.
  • 5. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount of $8000000 USD
  • 6. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 7. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 8. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 9. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 10. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable Section 415,416, 417 420 of IPC  
  • 11. 2. Sending Malicious Codes through email w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
  • 12. 3. Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber jams your inbox continuously with same emails
  • 13. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 14. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 15. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 16. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b) If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability : Compensation to be paid Section(66) : Imprisonment upto 3yrs OR Fine up to 5 Lakhs OR Both Also Applicable Section 379,405,420 of IPC
  • 17. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist Javed Akhtar has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
  • 18. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-A   Punishment for sending offensive messages through communication service, etc.     Any person who sends, by means of a computer resource or a communication device,- a) any  information that is grossly offensive or has menacing character; or b) any  information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with imprisonment for a term which may extend to two three years and with fine.
  • 19.
  • 20.
  • 21. 7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines Cyber Terrorism and Section 66-F(2) Specifies Punishment of imprisonment which may extend to imprisonment for life
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell: 9821763157