SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Cyber Laws
Cyber Crime
• Cyber crime is a generic term that refers to all criminal
activities done using the medium of computers, the
Internet, cyber space and the worldwide web.
• Use of online social networks.
What is Cyber Law?
• Cyber law is a term used to describe the legal
issues related to use of communications
technology, particularly “cyberspace”
i.e. the Internet.
CYBER LAWS IN INDIA
• ITACT PASSED IN
2000
• IMPLEMENTATION
OF CYBER LAW
• REASONS FOR
DELAY IN
IMPLEMENTATION
OF CYBER LAWS IN
INDIA
NEED FOR CYBER LAWS
• TACKLING CYBER
CRIMES
• INTELLECTUAL
PROPERTY RIGHTS
AND COPYRIGHTS
PROTECTION ACT
Types of Cyber crimes
• Credit card frauds
• Cyber pornography
• Sale of illegal articles-narcotics,
weapons, wildlife
• Online gambling
• Intellectual Property crimes-
software piracy, copyright
infringement, trademarks
violations, theft of computer
source code
• Email spoofing
• Forgery
• Defamation
• Cyber stalking (section 509 IPC)
• Phishing
• Cyber terrorism
Crime
against
property
Crime
against
Government
Crime
against
persons
Types of Cyber Crime
• Hacking
• Data Theft
• Spreading Virus or Worms
• Identity Theft
• E-Mail Spoofing
Indian Cyber laws
Hacking
• Hacking means unauthorized attempts to bypass
the security mechanisms of an information
system or network.
• Unauthorized access to a computer system,
programs, data and network resources. (The
term “hacker” originally meant a very gifted
programmer.
Hacking: Law & Punishment
• Under Information Technology (Amendment) Act,
2008, Section 43(a) read with section 66 is applicable
and Section 379 & 406 of Indian Penal Code, 1860 also
are applicable.
• If crime is proved under IT Act, accused shall be
punished for imprisonment, which may extend to three
years or with fine, which may extend to five lakh rupees
or both.
Data Theft
• Data Theft is a growing problem, primarily perpetrated
by office workers with access to technology such as
desktop computers and handheld devices, capable of
storing digital information such as flash drives, iPods
and even digital cameras.
• The damage caused by data theft can be considerable
with today’s ability to transmit very
large files via e-mail, web pages, USB
devices, DVD storage and other
hand-held devices.
Data Theft: Law & Punishment
• Law & Punishment: Under Information Technology
(Amendment) Act, 2008, Section 43(b) read with
Section 66 is applicable and under Section 379, 405 &
420 of Indian Penal Code, 1860 also applicable. Data
Theft offence is cognizable, bailable, compoundable
with permission of the court before which the
prosecution of such offence is pending and triable by
any magistrate.
Spreading Virus or Worms
• In most cases, viruses can do any amount of damage,
the creator intends them to do.
• They can send your data to a third party and then delete
your data from your computer.
• They can also ruin/mess up your system and render it
unusable without a re-installation of the operating
system.
• Most have not done this much damage in
the past, but could easily do this in the future.
Spreading Virus or Worms
• Usually the virus will install files on your system
and then will change your system so that virus
program is run every time you start your system.
• It will then attempt to replicate itself by sending
itself to other potential victims.
Spreading Virus or Worms:
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 43(c) & 43(e) read with
Section 66 is applicable and under Section 268
of Indian Penal Code, 1860 also applicable.
• Spreading of Virus offence is cognizable,
bailable, compoundable with permission of the
court before which the prosecution of such
offence is pending and triable by any magistrate.
Identity Theft
• It is a form of fraud or cheating of another person’s
identity in which someone pretends to be someone else
by assuming that person’s identity.
• Information Technology (Amendment) Act, 2008,
crime of identity theft under Section 66-C, whoever,
fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification
feature of any other person known as identity theft.
Identity theft is a term used to refer to fraud that
involves stealing money or getting other benefits by
pretending to be someone else.
Email spoofing
• Email spoofing is a technique used by hackers to
fraudulently send email messages in which the sender
address and other parts of the email header are altered
to appear as though the email originated from a source
other than its actual source.
• Hackers use this method to disguise the actual email
address from which phishing and spam messages are
sent and often use email spoofing in conjunction with
Web page spoofing to trick users into providing
personal and confidential information
Email spoofing:
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-D and Section417, 419 &
465of Indian Penal Code, 1860 also applicable.
Email spoofing offence is cognizable, bailable,
compoundable with permission of the court
before which the prosecution of such offence is
pending and triable by any magistrate.
IT ACT, 2000
• The IT Act is a first step taken by the
Government of India towards promoting the
growth of electronic commerce. Despite all its
failings, it is a first historical step.
• We in India also have had a vision to become
the 12th nation in the world to enact a Cyber
law. We have enacted the Information
Technology Act, 2000.
THE IT ACT, 2000 –
OBJECTIVES
• To provide legal recognition for transactions:-
Carried out by means of electronic data
interchange,
• Other means of electronic communication,
commonly referred to as "electronic commerce",
involving the use of alternatives to paper-based
methods of communication and storage of
information,
THE IT ACT, 2000 –
OBJECTIVES
• To facilitate electronic filing of documents with the
Government agencies
• To amend the Indian Penal Code, the Indian
Evidence Act, 1872, the Banker's Book Evidence
Act, 1891 and the Reserve Bank of India Act, 1934
Conclusion
• CYBER LAWS –
ESSENTIAL FEATURE IN TODAYS WORLD OF
INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY
Thank You

Más contenido relacionado

La actualidad más candente

Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 

La actualidad más candente (20)

Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 

Destacado

9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Knowsatyam mishra
 
Ppt to stop the legal terrorism
Ppt to stop the legal terrorismPpt to stop the legal terrorism
Ppt to stop the legal terrorismswarup1972
 
Punjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous electionsPunjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous electionsCentre for Public Policy Research
 
Supernova presentation
Supernova presentationSupernova presentation
Supernova presentationAkshay Mehra
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
minimum wages act 1948
minimum wages act 1948minimum wages act 1948
minimum wages act 1948shhilpa
 
PowerPoint Visual Resume
PowerPoint Visual ResumePowerPoint Visual Resume
PowerPoint Visual ResumeArtyom Shostak
 
Sample PPT from College
Sample PPT from CollegeSample PPT from College
Sample PPT from Collegemeridian2327
 
Nationalism In India
Nationalism In IndiaNationalism In India
Nationalism In IndiaCharmi Doshi
 
Amazing simple facts
Amazing simple factsAmazing simple facts
Amazing simple factsCeleb 98
 
Global financial crisis 2008
Global financial crisis 2008Global financial crisis 2008
Global financial crisis 2008valliappan1991
 
Contently Pitch Deck
Contently Pitch DeckContently Pitch Deck
Contently Pitch DeckRyan Gum
 
Pendo Series B Investor Deck External
Pendo Series B Investor Deck ExternalPendo Series B Investor Deck External
Pendo Series B Investor Deck ExternalTodd Olson
 
Tinder Pitch Deck
Tinder Pitch DeckTinder Pitch Deck
Tinder Pitch DeckRyan Gum
 
Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008Ryan Gum
 

Destacado (20)

9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know
 
Ppt to stop the legal terrorism
Ppt to stop the legal terrorismPpt to stop the legal terrorism
Ppt to stop the legal terrorism
 
Punjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous electionsPunjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous elections
 
Supernova presentation
Supernova presentationSupernova presentation
Supernova presentation
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Visual Resumes
Visual ResumesVisual Resumes
Visual Resumes
 
Ethics in media
Ethics in mediaEthics in media
Ethics in media
 
minimum wages act 1948
minimum wages act 1948minimum wages act 1948
minimum wages act 1948
 
PowerPoint Visual Resume
PowerPoint Visual ResumePowerPoint Visual Resume
PowerPoint Visual Resume
 
Sample PPT from College
Sample PPT from CollegeSample PPT from College
Sample PPT from College
 
Nationalism In India
Nationalism In IndiaNationalism In India
Nationalism In India
 
Nationalism in india.
Nationalism in india. Nationalism in india.
Nationalism in india.
 
Amazing simple facts
Amazing simple factsAmazing simple facts
Amazing simple facts
 
Global financial crisis 2008
Global financial crisis 2008Global financial crisis 2008
Global financial crisis 2008
 
BuzzFeed Pitch Deck
BuzzFeed Pitch DeckBuzzFeed Pitch Deck
BuzzFeed Pitch Deck
 
Contently Pitch Deck
Contently Pitch DeckContently Pitch Deck
Contently Pitch Deck
 
Pendo Series B Investor Deck External
Pendo Series B Investor Deck ExternalPendo Series B Investor Deck External
Pendo Series B Investor Deck External
 
Visual resume
Visual resumeVisual resume
Visual resume
 
Tinder Pitch Deck
Tinder Pitch DeckTinder Pitch Deck
Tinder Pitch Deck
 
Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008
 

Similar a Indian Cyber laws

What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 

Similar a Indian Cyber laws (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 

Último

PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 

Último (20)

Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 

Indian Cyber laws

  • 2. Cyber Crime • Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web. • Use of online social networks.
  • 3. What is Cyber Law? • Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace” i.e. the Internet.
  • 4. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. Types of Cyber crimes • Credit card frauds • Cyber pornography • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling • Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code • Email spoofing • Forgery • Defamation • Cyber stalking (section 509 IPC) • Phishing • Cyber terrorism Crime against property Crime against Government Crime against persons
  • 7. Types of Cyber Crime • Hacking • Data Theft • Spreading Virus or Worms • Identity Theft • E-Mail Spoofing
  • 9. Hacking • Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. • Unauthorized access to a computer system, programs, data and network resources. (The term “hacker” originally meant a very gifted programmer.
  • 10. Hacking: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable. • If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lakh rupees or both.
  • 11. Data Theft • Data Theft is a growing problem, primarily perpetrated by office workers with access to technology such as desktop computers and handheld devices, capable of storing digital information such as flash drives, iPods and even digital cameras. • The damage caused by data theft can be considerable with today’s ability to transmit very large files via e-mail, web pages, USB devices, DVD storage and other hand-held devices.
  • 12. Data Theft: Law & Punishment • Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable. Data Theft offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 13. Spreading Virus or Worms • In most cases, viruses can do any amount of damage, the creator intends them to do. • They can send your data to a third party and then delete your data from your computer. • They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. • Most have not done this much damage in the past, but could easily do this in the future.
  • 14. Spreading Virus or Worms • Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. • It will then attempt to replicate itself by sending itself to other potential victims.
  • 15. Spreading Virus or Worms: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable. • Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 16. Identity Theft • It is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity. • Information Technology (Amendment) Act, 2008, crime of identity theft under Section 66-C, whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as identity theft. Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else.
  • 17. Email spoofing • Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source. • Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information
  • 18. Email spoofing: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-D and Section417, 419 & 465of Indian Penal Code, 1860 also applicable. Email spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 19. IT ACT, 2000 • The IT Act is a first step taken by the Government of India towards promoting the growth of electronic commerce. Despite all its failings, it is a first historical step. • We in India also have had a vision to become the 12th nation in the world to enact a Cyber law. We have enacted the Information Technology Act, 2000.
  • 20. THE IT ACT, 2000 – OBJECTIVES • To provide legal recognition for transactions:- Carried out by means of electronic data interchange, • Other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information,
  • 21. THE IT ACT, 2000 – OBJECTIVES • To facilitate electronic filing of documents with the Government agencies • To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934
  • 22. Conclusion • CYBER LAWS – ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY