SlideShare a Scribd company logo
1 of 14
LAW
DIGITAL AGE
IN
CYBERCRIMEANDITS TYPES
• WHAT IS CYBER CRIME?
CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE
INTERNET.
• WHAT ARE THE TYPES?
1. HACKING.
2. THEFT.
3. CYBER STALKING.
4. IDENTITY THEFT.
5. MALICIOUS SOFTWARE.
6. CHILD SOLICITING AND ABUSE.
CATERGORIES
• CYBER CRIMES ARE BROADLY CATEGORIZED INTO THREE
CATEGORIES, NAMELY CRIME AGAINST -
1. INDIVIDUAL
2. PROPERTY
3. SOCIETY
4. ORGANISATION &
5. GOVERNMENT.
CAUSES
1. EASY EARNING BUSINESS.
2. ACCESS TO CONFIDENTIAL AND PRIVATE INFORMATION OF
INDIVIDUAL AND GOVERNMENT.
3. PASSION OF TEENAGERS.
4. TO TAKE REVENGE.
- LAW BREAKERS
TO BEAT A HACKER YOU HAVE TO BECOME
ONE
CYBER CRIMEININDIA
• THE MAJORITY OF THE CYBER CRIMES ARE CENTERED ON FORGERY, FRAUD AND
PHISHING.
• INDIA IS THE THIRD MOST TARGETED COUNTRY FOR CYBER ATTACKS AFTER US AND UK.
• 4 IN 5 ONLINE ADULTS HAVE BEEN A VICTIM OF CYBER CRIME
• AVERAGELY 14350 WEBSITE DEFACEMENTS ARE FOUND EVERY YEAR.
• INDIA IS THE NUMBER ONE COUNTRY IN THE WORLD FOR GENERATING SPAM.
WIKILEAKS
 INITATED IN 2006

 JULIAN ASSANGE -FOUNDER
 “WE OPEN GOVERNMENTS”
THE IT ACT
• The Information Technology Act, 2000 Is An Act Of The indian parliament Notified On 17 October 2000.
• It Is Also Known As IT ACT.
• It Can Be Against : Individual, Organisation Or Society At Large.
• Many Amendments Are Made Till Now.
CYBER SECURITY
• India Has No Dedicated Cyber Security Regulation Framed Under The Information Technology
Act 2000.
• National Cyber Security Policy Of India 2013 : Remained Ineffective And Non-implementable.
• Indian Cyber Security Policy : Failed In Protecting Civil Liberties & Privacy Rights.
• Cyber Security Of India : Grossly Weak With No Legal Obligation For Cyber Security.
CASE STUDYS
CURIOUS CASE OF JONATHAN JAMES
CASE OF KEVIN MITNICK
USE OFSOCIAL WEBSITE/APPS
• CASE RELATED TO YAKUB MENON’S ARREST
Salman had tweeted, “Get tiger, hang him. Parade him not his brother’’.
• MUMBAI GIRLS JAILED AFTER FACEBOOK POST ABOUT BAL
THACKERAY WHICH 'HURT RELIGIOUS SENTIMENTS‘.
Shaheen had reportedly written on her Facebook wall that "People like Thackeray are born and die
daily, and one should not observe a 'bandh' for that".
CONCLUSION
• PREVENTIVE MEASURES
BY INDIVIDUAL .
BY ORGANISATION
BY SOCIETY.
PRECAUTIONS
BY GOVERNMENT.
THANK YOU
-RUSHABH
BROUGHT TO YOU BY

More Related Content

What's hot

Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladeshOrko Abir
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)Craig Mullins
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in Indiashamvisingh
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Imprisonment for life
Imprisonment for lifeImprisonment for life
Imprisonment for lifekirti chauhan
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 

What's hot (20)

Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Victimology-ppt.ppt
Victimology-ppt.pptVictimology-ppt.ppt
Victimology-ppt.ppt
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
cyber crime
cyber crimecyber crime
cyber crime
 
Piracy
PiracyPiracy
Piracy
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Imprisonment for life
Imprisonment for lifeImprisonment for life
Imprisonment for life
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 

Viewers also liked

Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship12mk
 
digital law
digital lawdigital law
digital law11tsk
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointTala
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnesspakkwok
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnessPat Bruinsma
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and securitymdhague
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Anti bullying Philippines
Anti bullying Philippines Anti bullying Philippines
Anti bullying Philippines Ricky Fancubit
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (17)

Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship
 
digital law
digital lawdigital law
digital law
 
Digital law
Digital lawDigital law
Digital law
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital law
Digital lawDigital law
Digital law
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Anti bullying Philippines
Anti bullying Philippines Anti bullying Philippines
Anti bullying Philippines
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.

Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 

Similar to LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA. (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 

Recently uploaded

Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnitymahikaanand16
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainBridgeWest.eu
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 

Recently uploaded (20)

Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in Spain
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 

LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.

  • 2. CYBERCRIMEANDITS TYPES • WHAT IS CYBER CRIME? CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE INTERNET. • WHAT ARE THE TYPES? 1. HACKING. 2. THEFT. 3. CYBER STALKING. 4. IDENTITY THEFT. 5. MALICIOUS SOFTWARE. 6. CHILD SOLICITING AND ABUSE.
  • 3. CATERGORIES • CYBER CRIMES ARE BROADLY CATEGORIZED INTO THREE CATEGORIES, NAMELY CRIME AGAINST - 1. INDIVIDUAL 2. PROPERTY 3. SOCIETY 4. ORGANISATION & 5. GOVERNMENT.
  • 4. CAUSES 1. EASY EARNING BUSINESS. 2. ACCESS TO CONFIDENTIAL AND PRIVATE INFORMATION OF INDIVIDUAL AND GOVERNMENT. 3. PASSION OF TEENAGERS. 4. TO TAKE REVENGE.
  • 5. - LAW BREAKERS TO BEAT A HACKER YOU HAVE TO BECOME ONE
  • 6.
  • 7. CYBER CRIMEININDIA • THE MAJORITY OF THE CYBER CRIMES ARE CENTERED ON FORGERY, FRAUD AND PHISHING. • INDIA IS THE THIRD MOST TARGETED COUNTRY FOR CYBER ATTACKS AFTER US AND UK. • 4 IN 5 ONLINE ADULTS HAVE BEEN A VICTIM OF CYBER CRIME • AVERAGELY 14350 WEBSITE DEFACEMENTS ARE FOUND EVERY YEAR. • INDIA IS THE NUMBER ONE COUNTRY IN THE WORLD FOR GENERATING SPAM.
  • 8. WIKILEAKS  INITATED IN 2006   JULIAN ASSANGE -FOUNDER  “WE OPEN GOVERNMENTS”
  • 9. THE IT ACT • The Information Technology Act, 2000 Is An Act Of The indian parliament Notified On 17 October 2000. • It Is Also Known As IT ACT. • It Can Be Against : Individual, Organisation Or Society At Large. • Many Amendments Are Made Till Now.
  • 10. CYBER SECURITY • India Has No Dedicated Cyber Security Regulation Framed Under The Information Technology Act 2000. • National Cyber Security Policy Of India 2013 : Remained Ineffective And Non-implementable. • Indian Cyber Security Policy : Failed In Protecting Civil Liberties & Privacy Rights. • Cyber Security Of India : Grossly Weak With No Legal Obligation For Cyber Security.
  • 11. CASE STUDYS CURIOUS CASE OF JONATHAN JAMES CASE OF KEVIN MITNICK
  • 12. USE OFSOCIAL WEBSITE/APPS • CASE RELATED TO YAKUB MENON’S ARREST Salman had tweeted, “Get tiger, hang him. Parade him not his brother’’. • MUMBAI GIRLS JAILED AFTER FACEBOOK POST ABOUT BAL THACKERAY WHICH 'HURT RELIGIOUS SENTIMENTS‘. Shaheen had reportedly written on her Facebook wall that "People like Thackeray are born and die daily, and one should not observe a 'bandh' for that".
  • 13. CONCLUSION • PREVENTIVE MEASURES BY INDIVIDUAL . BY ORGANISATION BY SOCIETY. PRECAUTIONS BY GOVERNMENT.