SlideShare una empresa de Scribd logo
1 de 19
Anti-hacking legislation
 
[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],http://bit.ly/kBSHIi
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],/14
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],/14
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
amiable_indian
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
Geritt Contillo
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
Sampath
 

La actualidad más candente (20)

Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
It legislation
It legislationIt legislation
It legislation
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
It act cases
It act casesIt act cases
It act cases
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 

Destacado

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
mrmwood
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
mrmwood
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
mrmwood
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
mrmwood
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
mrmwood
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can provide
mrmwood
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
mrmwood
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
mrmwood
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
mrmwood
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
mrmwood
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
mrmwood
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
mrmwood
 

Destacado (20)

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can provide
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
 
Answering an a level exam question
Answering an a level exam questionAnswering an a level exam question
Answering an a level exam question
 

Similar a Computer misuse act new 13 12-11

[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
CODE BLUE
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
Shoaib Sheikh
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Prashant Angadi
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
Ict & Legislation
Ict & LegislationIct & Legislation
Ict & Legislation
KennyBHS
 
Life In Info Age Lesson11
Life In Info Age Lesson11Life In Info Age Lesson11
Life In Info Age Lesson11
KennyBHS
 
Crime And Prevention
Crime And PreventionCrime And Prevention
Crime And Prevention
KennyBHS
 
Ict & Legislation
Ict & LegislationIct & Legislation
Ict & Legislation
KennyBHS
 
I C T & Legislation
I C T &  LegislationI C T &  Legislation
I C T & Legislation
KennyBHS
 
Ict & Legislation
Ict & LegislationIct & Legislation
Ict & Legislation
KennyBHS
 

Similar a Computer misuse act new 13 12-11 (20)

[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Shilpa
ShilpaShilpa
Shilpa
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Ict & Legislation
Ict & LegislationIct & Legislation
Ict & Legislation
 
Life In Info Age Lesson11
Life In Info Age Lesson11Life In Info Age Lesson11
Life In Info Age Lesson11
 
Crime And Prevention
Crime And PreventionCrime And Prevention
Crime And Prevention
 
Ict & Legislation
Ict & LegislationIct & Legislation
Ict & Legislation
 
I C T & Legislation
I C T &  LegislationI C T &  Legislation
I C T & Legislation
 
Ict & Legislation
Ict & LegislationIct & Legislation
Ict & Legislation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Más de mrmwood (10)

Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
3.3 managing ict 3
3.3 managing ict 33.3 managing ict 3
3.3 managing ict 3
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
3.2 information and systems
3.2 information and systems3.2 information and systems
3.2 information and systems
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and information
 
1.10 evaluation
1.10 evaluation1.10 evaluation
1.10 evaluation
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verification
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Computer misuse act new 13 12-11