Your SlideShare is downloading. ×
Cyber law
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Cyber law

1,845
views

Published on

Published in: Education, Technology, Business

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,845
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
165
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Business Law
  • 2. Contents
    • Introduction
    • Digital Signatures & Electronic Signatures
    • Electronic Governance
    • Electronic Records
    • Controller & Certifying Authorities
    • Adjudication,Penalities & Compensation
    • Case Study
  • 3. Introduction
    • Electronic Commerce
    • Information Technology Act , 2000
    • as amended by
    • The Information Technology(Amendment) Act, 2008 with effect from 27/10/2009
    • Objectives of the Act
    • Provision of Act
  • 4. Digital Signatures
    • Authentication of electronic record shall be effected by the use of asymmetric crypto system and hash function which envelope and transfer the initial electronic record to another (Sec.2(1)& Sec.3(1))
    • Manners of Authentication
    • Verification of Digital signatures
    • Generation of Digital Signatures Certificate
    • Revocation of Digital Signatures Certificate
    • Suspension of Digital Signatures Certificate
  • 5. Electronic Signatures
    • Authentication of electronic record by a subscriber by means of electronic technique specified in the second schedule (sec.2(1))
    • Subscriber
    • Duties of Subscriber
            • Generating key pair
            • Acceptance of Digital Signature Certificate
            • Control of private Key
            • Extend Facilities to decrypt information
  • 6. Electronic Governance
    • Act for Legal recognition of Electronic Records
    • Electronic Form
    • Electronic Form evidence
    • Access
    • Computer & Network
    • Verification of Electronic Records
    • Authentication of Electronic Records
    • Use of Electronic Records
  • 7. Electronic Record
    • Data, Record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche(Sec.2(1))
    • Originator
    • Intermediary
    • Liability of Intermediary
    • When Intermediary not Liable?
    • Indian Computer Emergency Response Team
  • 8. Controller
    • Appointment of Controller
    • Functions of Controller
    • Powers of Controller
            • To delegate
            • To Investigate contraventions
            • To give directions
            • Access to Computers and date
  • 9. Certifying Authority
    • Definition
    • Obligations & Duties
            • Follow Procedures
            • Cross certification
            • Security guidelines
            • Compliances by employees
            • Disclosures
            • Confidential Information
            • Audit
  • 10. Adjudication, Penalties& Compensation
    • Power to Adjudicate
    • Power to Investigate Offences
    • Penalty & Compensation for damage to computer
    • Penalty for failure to furnish information, return
    • Penalty for securing access to a protected system
    • Punishment for sending offensive messages
    • Punishment for identifying theft
    • Punishment for cheating by Personation
    • Punishment for violation of privacy
    • Punishment for cyber terrorism
    • Penalty for breach of confidentiality & privacy
  • 11. Case Study
    • Parliament Attack Case
    • Analyzing & Retrieving information from laptops of terrorists
    • Laptops send to Computer forensics division
    • Contains information about terrorists motive
    • Retrieved the details
    • Suitable punishments were given according to the law
  • 12.
    • Questions