• Like
  • Save
An Introduction to Cyber Law - I.T. Act 2000 (India)
Upcoming SlideShare
Loading in...5
×
 

An Introduction to Cyber Law - I.T. Act 2000 (India)

on

  • 23,540 views

An Introduction to Cyber Law - Chetan Bharadwaj...

An Introduction to Cyber Law - Chetan Bharadwaj

The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.

Statistics

Views

Total Views
23,540
Views on SlideShare
22,793
Embed Views
747

Actions

Likes
29
Downloads
0
Comments
8

13 Embeds 747

http://103.15.61.65 430
http://wlog.thefourdy.com 181
http://currentaffairsme.blogspot.in 55
https://tasks.crowdflower.com 36
http://keralapsctrainer.blogspot.in 22
http://keralapsctrainer.blogspot.com 11
http://currentaffairsme.blogspot.com 4
http://www.keralapsctrainer.blogspot.in 3
http://www.docshut.com 1
http://www.slashdocs.com 1
https://www.google.com 1
http://keralapsc-gk.blogspot.in 1
http://keralapsc-gk.blogspot.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

18 of 8 Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • can you please send this ppt to me on kritishah2997@gmail.com
    Are you sure you want to
    Your message goes here
    Processing…
  • HELO FRND, YOUR PRESENTATION IS WONDERFUL SO CAN PLEASE SEND TO ME ON CA_SUNIL89@YAHOO.COM
    Are you sure you want to
    Your message goes here
    Processing…
  • Hi is there any agency who can detect the cyber crime and investigate it further. For Ex: if someone is miss using the social media tool or sending random email to hit the reputation.

    Please suggest
    Are you sure you want to
    Your message goes here
    Processing…
  • The PPT is very simple to follow and self-explanatory. May I request you to share it with me at cybermum.india@gmail.com? Will help in me in my work of helping parents & teachers in India become cyber aware. Thanks,
    Are you sure you want to
    Your message goes here
    Processing…
  • can you please send me this ppt. Its really good and useful. my id is:
    shweta.agarwal2308@gmail.com
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    An Introduction to Cyber Law - I.T. Act 2000 (India) An Introduction to Cyber Law - I.T. Act 2000 (India) Presentation Transcript

    • An Introduction to Cyber Law
      by
      Chetan Bharadwaj
    • “ The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb ”
      – National Research Council, U S A "Computers at Risk” (1991)
    • What is Cyber Law ?
      Cyber Law is the law governing cyber space.
      • Cyber spaceis a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
    • Cyber law of India encompasses laws relating to
      Cyber Crimes
      Electronic and Digital Signatures
      Intellectual Property
      Data Protection and Privacy
    • What is Cyber Crime?
      Cyber crime is the latest and perhaps the most complicated problem in the cyber world.
      • Cyber crimes are unlawful acts where computer is used either as a tool; or a target; or both.
      • The enormous growth in electronic commerce (e-commerce) and online share trading has led to a phenomenal spurt in incidents of cyber crime.
    • Cybercrimes can be basically divided into three major categories:
      Cybercrimes against personsCybercrimes against propertyCybercrimes against government
    • Cyber crime against persons
      Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.
      • The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, is one of the most important Cybercrimes known today in genre.
    • Cyber crime against property
      These crimes include:
      • Computer vandalism (destruction of others' property);
      • Transmission of harmful programmes;
      • Siphoning of funds from financial institutions;
      • Stealing secret information & data.
    • Cybercrime against government
      • Cyber terrorism is one distinct kind of crime in this category.
      • The medium of Cyberspace is used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
      • This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.
    • Electronic Signature
      Electronic Signatures are used to authenticate electronic records. Digital Signatures are one type of electronic signatures.
      Digital Signatures satisfy three major legal requirements:
      • Signer authentication;
      • Message authentication; and
      • Message integrity.
      The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures.
    • Intellectual Property
      Intellectual property refers to creations of the human mind e.g., a story, a song, a painting, a design & etc.
      • The facets of intellectual property that relate to cyber space are covered by Cyber law.
    • Facets of Intellectual Property
      • Copyright law in relation to computer software, source code, websites, cell phone content etc.
      • Licensing in terms of software and source code.
      • Trademark law with relation to domain names, meta tags, mirroring, framing, linking etc.
      • Semiconductor law which relates to the protection of semiconductor integrated circuits design and layouts.
      • Patent law in relation to computer hardware and software.
    • Data Protection & Privacy
      • Data Protection and Privacy Laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc.
      • These laws seek to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies.
    • IT Act of India, 2000
      The primary source of cyber law in India is the Information Technology Act , 2000 (IT Act).
      The main purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.
      • Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
      • Four schedules form part of the Act.
    • IT Amendment Act, 2008
      ITA 2008, as the new version of Information Technology Act 2000 is often referred, has provided additional focus on Information Security. It has added several new sections on offences including Cyber Terrorism and Data Protection.
      • The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008 and came into force from October 27, 2009 onwards.
    • Thank You
      For more updates, stay tuned to the FOURDY wlog [wlog.thefourdy.com]