SlideShare una empresa de Scribd logo
1 de 16
PRESENTATION ON
   CYBER LAWS
BIBLIOGRAPHY
• LAWS RELATING TO
  COMPUTER,INTERNET AND E-
  COMMERCE.
• BY:NANDAN KAMATH
• LEGAL ASPECTS OF BUSINESS
•   BY:AKHILESHWAR PATHAK

• COMPANY LAW
•   BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA


•   www.google.com
•   www.altavista.com
CONTENTS
• INTRODUCTION
• NEED FOR CYBER LAWS
• CYBER LAWS IN INDIA
• CYBER CRIMES
• OFFENCES AND LAWS IN CYBER
  SPACE
• CYBER LAWS AMENDMENTS
• CONCLUSION
INTRODUCTION
• GROWTH OF
  CYBER SPACE

• ONSET OF
  INTERNET

• CYBER LAW OR
  LAW OF
  INTERNET
NEED FOR CYBER LAWS

• TACKLING CYBER
  CRIMES

• INTELLECTUAL
  PROPERTY RIGHTS
  AND COPYRIGHTS
  PROTECTION ACT
CYBER LAWS IN INDIA
• ITACT PASSED IN
  2000
• INTERNET IN
  INDIA
• IMPLEMENTATION
  OF CYBER LAW
• REASONS FOR
  DELAY IN
  IMPLEMENTATION
  OF CYBER LAWS IN
  INDIA
IT ACT PROVISIONS
• email would now be a valid and legal form of
  communication in our country that can be duly
  produced and approved in a court of law.

• Companies shall now be able to carry out
  electronic commerce using the legal infrastructure
  provided by the Act.

• Digital signatures have been given legal validity
  and sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
  notification on the web thus heralding e-
  governance

• statutory remedy in case if anyone breaks
  into companies computer systems or
  network and causes damages or copies data
CYBER CRIMES
• CYBER CRIMES AGAINST
  PERSONS
  eg ‘melissa’and ‘lovebug’ virus
• CYBER CRIMES AGAINST
  PROPERTY
  eg computer vandalism
• CYBER CRIMES AGAINST
  GOVERNMENT
• eg ‘Al-Qaeda’
CYBER CRIMES
CRIME THROUGH ORKUT
• Koushambi ,24-year
  old software
  professional
  working for TCS
  was brutally killed
  by Manish Thakur,
  in a hotel room at
  Andheri.
INTERNET AND ITS EFFECT
• 20% - 30% of Internet
  pornography consumption is by
  children of ages 12 - 17.

• MySpace is being used by
  predators to meet and entice
  kids online.

• Specific marketing strategies
  are being used to attract
  children to porn sites.
OFFENCES AND LAWS IN
       CYBER SPACE
• TAMPERING WITH
  COMPUTER
  DOCUMENTS
• HACKING WITH
  COMPUTER SYSTEM
• PUBLISHING OBSCENE
  MATERIAL ON
  INTERNET
• BREACHING OF
  CONFIDENTIALITY
  AND PRIVACY
CYBER LAWS AMENDMENTS
• INDIAN PENAL CODE,1860

• INDIAN EVIDENCE ACT,1872

• BANKER’S BOOK EVIDENCE ACT,1891

• GENERAL CLAUSES ACT,1897
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
  IN TODAYS WORLD OF INTERNET



• ACHIEVING GLOBAL PEACE AND
  HARMONY
THANK YOU

•   QUERIES WELCOMED

Más contenido relacionado

La actualidad más candente

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 

La actualidad más candente (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 

Destacado (13)

Cyber security
Cyber securityCyber security
Cyber security
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Similar a Cyber laws

Similar a Cyber laws (20)

cyber-laws (1).ppt
cyber-laws (1).pptcyber-laws (1).ppt
cyber-laws (1).ppt
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Akhila
AkhilaAkhila
Akhila
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Cyber laws

  • 1. PRESENTATION ON CYBER LAWS
  • 2. BIBLIOGRAPHY • LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE. • BY:NANDAN KAMATH • LEGAL ASPECTS OF BUSINESS • BY:AKHILESHWAR PATHAK • COMPANY LAW • BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA • www.google.com • www.altavista.com
  • 3. CONTENTS • INTRODUCTION • NEED FOR CYBER LAWS • CYBER LAWS IN INDIA • CYBER CRIMES • OFFENCES AND LAWS IN CYBER SPACE • CYBER LAWS AMENDMENTS • CONCLUSION
  • 4. INTRODUCTION • GROWTH OF CYBER SPACE • ONSET OF INTERNET • CYBER LAW OR LAW OF INTERNET
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • INTERNET IN INDIA • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 7. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 8. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 9. CYBER CRIMES • CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus • CYBER CRIMES AGAINST PROPERTY eg computer vandalism • CYBER CRIMES AGAINST GOVERNMENT • eg ‘Al-Qaeda’
  • 11. CRIME THROUGH ORKUT • Koushambi ,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.
  • 12. INTERNET AND ITS EFFECT • 20% - 30% of Internet pornography consumption is by children of ages 12 - 17. • MySpace is being used by predators to meet and entice kids online. • Specific marketing strategies are being used to attract children to porn sites.
  • 13. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 14. CYBER LAWS AMENDMENTS • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872 • BANKER’S BOOK EVIDENCE ACT,1891 • GENERAL CLAUSES ACT,1897
  • 15. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY
  • 16. THANK YOU • QUERIES WELCOMED