An Introduction to Cyber Law - I.T. Act 2000 (India)


Published on

An Introduction to Cyber Law - Chetan Bharadwaj

The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.

Published in: Technology
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

An Introduction to Cyber Law - I.T. Act 2000 (India)

  1. 1.
  2. 2. An Introduction to Cyber Law<br />by<br />Chetan Bharadwaj<br />
  3. 3. “ The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb ”<br />– National Research Council, U S A "Computers at Risk” (1991)<br />
  4. 4. What is Cyber Law ?<br />Cyber Law is the law governing cyber space.<br /><ul><li>Cyber spaceis a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.</li></li></ul><li> Cyber law of India encompasses laws relating to<br />Cyber Crimes<br />Electronic and Digital Signatures<br />Intellectual Property<br />Data Protection and Privacy<br />
  5. 5. What is Cyber Crime?<br />Cyber crime is the latest and perhaps the most complicated problem in the cyber world. <br /><ul><li>Cyber crimes are unlawful acts where computer is used either as a tool; or a target; or both.
  6. 6. The enormous growth in electronic commerce (e-commerce) and online share trading has led to a phenomenal spurt in incidents of cyber crime.</li></li></ul><li> Cybercrimes can be basically divided into three major categories:<br />Cybercrimes against personsCybercrimes against propertyCybercrimes against government<br />
  7. 7. Cyber crime against persons<br />Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. <br /><ul><li>The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, is one of the most important Cybercrimes known today in genre.</li></li></ul><li>Cyber crime against property<br />These crimes include:<br /><ul><li>Computer vandalism (destruction of others' property);
  8. 8. Transmission of harmful programmes;
  9. 9. Siphoning of funds from financial institutions;
  10. 10. Stealing secret information & data.</li></li></ul><li>Cybercrime against government<br /><ul><li>Cyber terrorism is one distinct kind of crime in this category.
  11. 11. The medium of Cyberspace is used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  12. 12. This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.</li></li></ul><li>Electronic Signature<br />Electronic Signatures are used to authenticate electronic records. Digital Signatures are one type of electronic signatures. <br />Digital Signatures satisfy three major legal requirements: <br /><ul><li>Signer authentication;
  13. 13. Message authentication; and
  14. 14. Message integrity. </li></ul>The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures. <br />
  15. 15. Intellectual Property<br />Intellectual property refers to creations of the human mind e.g., a story, a song, a painting, a design & etc. <br /><ul><li>The facets of intellectual property that relate to cyber space are covered by Cyber law.</li></li></ul><li>Facets of Intellectual Property<br /><ul><li>Copyright law in relation to computer software, source code, websites, cell phone content etc.
  16. 16. Licensing in terms of software and source code.
  17. 17. Trademark law with relation to domain names, meta tags, mirroring, framing, linking etc.
  18. 18. Semiconductor law which relates to the protection of semiconductor integrated circuits design and layouts.
  19. 19. Patent law in relation to computer hardware and software.</li></li></ul><li>Data Protection & Privacy<br /><ul><li>Data Protection and Privacy Laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc.
  20. 20. These laws seek to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies.</li></li></ul><li>IT Act of India, 2000<br />The primary source of cyber law in India is the Information Technology Act , 2000 (IT Act).<br />The main purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.<br /><ul><li>Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
  21. 21. Four schedules form part of the Act.</li></li></ul><li>IT Amendment Act, 2008<br />ITA 2008, as the new version of Information Technology Act 2000 is often referred, has provided additional focus on Information Security. It has added several new sections on offences including Cyber Terrorism and Data Protection.<br /><ul><li>The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008 and came into force from October 27, 2009 onwards.</li></li></ul><li>Thank You<br />For more updates, stay tuned to the FOURDY wlog []<br />