SlideShare una empresa de Scribd logo
1 de 31
CYBERLAW (ICT LAW) FRANCIS CRONJÉ SANDTON
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
Francis Cronjé
Francis Cronjé
[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé
[object Object],[object Object],[object Object],[object Object],Francis Cronjé

Más contenido relacionado

La actualidad más candente

Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 

La actualidad más candente (20)

computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdf
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
User authentication
User authenticationUser authentication
User authentication
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
it act 2000
it act 2000it act 2000
it act 2000
 
It legislation
It legislationIt legislation
It legislation
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Scope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptxScope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptx
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Cyber law
Cyber lawCyber law
Cyber law
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Frame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison UniversityFrame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison University
 

Destacado

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
Allana Delgado
 

Destacado (12)

Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 
Legal education
Legal educationLegal education
Legal education
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Uses of computer in various fields of life
Uses of computer in various fields of lifeUses of computer in various fields of life
Uses of computer in various fields of life
 
Computer Uses in different areas
Computer Uses in different areasComputer Uses in different areas
Computer Uses in different areas
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
 

Similar a ICT / IT Law (Cyberlaw)

Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
Rahul Gurnani
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Ben Allen
 

Similar a ICT / IT Law (Cyberlaw) (20)

Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
Professional issues in IT
Professional issues in IT Professional issues in IT
Professional issues in IT
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
 
Internet Law: An Expedition
Internet Law: An ExpeditionInternet Law: An Expedition
Internet Law: An Expedition
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protection
 
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
 
E contract
E  contractE  contract
E contract
 
E contract
E contractE contract
E contract
 
e_contracting_pptx.pptx
e_contracting_pptx.pptxe_contracting_pptx.pptx
e_contracting_pptx.pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industry
 
LiveOffice Email Archiving & Compliance 101
LiveOffice Email Archiving & Compliance 101LiveOffice Email Archiving & Compliance 101
LiveOffice Email Archiving & Compliance 101
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Ethics of Online Forms and E-Signatures for Attorneys
Ethics of Online Forms and E-Signatures for AttorneysEthics of Online Forms and E-Signatures for Attorneys
Ethics of Online Forms and E-Signatures for Attorneys
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
 

Último

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Último (20)

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

ICT / IT Law (Cyberlaw)