Your SlideShare is downloading. ×
0
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali   [BSc.(Phy.),...
INTRODUCTION  <ul><li>Computer Crime ,  E-Crime ,  Hi-Tech Crime  or  Electronic Crime  is where a computer is the target ...
DIFFERENT TYPES OF CYBERCRIMES <ul><li>Data Theft  </li></ul><ul><li>Source Code Theft (Stealing Computer Programs) </li><...
E-MAIL RELATED CRIMES <ul><li>Some of the major email related crimes are: </li></ul><ul><li>1. Email Lottery Scam(Nigerian...
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing ema...
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status T...
2. Sending Malicious Codes through email  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment ...
3.  Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber  jams your inbox conti...
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b)  If any person...
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 1...
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section  66-A   ...
6. Emails containing sexually explicit act etc w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL <ul><li>Se...
Section 66 and 43(d)  :  DATA DIDDLING <ul><li>Section 66 and 43(d) of the I.T. Act covers Data DiDDling  </li></ul><ul><l...
7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F...
Section 66C:  IDENTITY THEFT <ul><li>Whoever, fraudulently or dishonestly make use of the electronic signature, password o...
Section 66C: IDENTITY THEFT- CASE STUDY <ul><li>Pranab Mitra , former executive of Gujarat Ambuja Cement posed as a woman,...
Section(66) : CREDIT CARD FRAUD <ul><li>Penalty  :  Imprisonment upto 3yrs    And OR </li></ul><ul><li>Fine up to 5 Lakhs ...
Section(66) :  PHISHING  <ul><li>  </li></ul><ul><li>Phishing  is the process by which someone obtains private information...
Section(66) :  PHISHING Case Study <ul><li>  April 13,2010 </li></ul><ul><li>In the verdict in the first case filed under ...
EMAIL  DEFAMATION CASE  <ul><li>SMC Pneumatics (India) Pvt. Ltd. v. Jogesh Kwatra : </li></ul><ul><li>No. 1279/2001 Delhi ...
Tata Sons v. Greenpeace International  Delhi HC  IA 9089/2010 in CS (OS) 1407/2010 <ul><li>[Cyber defamation Injunction no...
QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You   Contact: prashant . [email_address]...
Upcoming SlideShare
Loading in...5
×

Email crimes and IT Law-Nasscom cyber safe 2010

1,661

Published on

Email crimes and IT Law,Email crimes and cyber law

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,661
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
76
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Email crimes and IT Law-Nasscom cyber safe 2010"

  1. 1. Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law & IPR Expert Email Crimes & Indian Cyber Law
  2. 2. INTRODUCTION <ul><li>Computer Crime , E-Crime , Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. </li></ul><ul><li>Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  3. 3. DIFFERENT TYPES OF CYBERCRIMES <ul><li>Data Theft </li></ul><ul><li>Source Code Theft (Stealing Computer Programs) </li></ul><ul><li>Hacking </li></ul><ul><li>Denial of Service </li></ul><ul><li>Spreading Virus & Malicious Codes </li></ul><ul><li>Defamation & Social Networking Abuse(eg. FACEBOOK etc) </li></ul><ul><li>Cyber pornography , Child Pornography </li></ul><ul><li>Email related crimes </li></ul><ul><li>Cyber Stalking </li></ul><ul><li>Phishing </li></ul><ul><li>Cyber terrorism </li></ul><ul><li>Intellectual Property crimes- software piracy, copyright infringement, trademarks violations. </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  4. 4. E-MAIL RELATED CRIMES <ul><li>Some of the major email related crimes are: </li></ul><ul><li>1. Email Lottery Scam(Nigerian 419 Scam) </li></ul><ul><li>2. Sending malicious codes through email </li></ul><ul><li>3. Email bombing </li></ul><ul><li>4. Illegal Email Forwarding </li></ul><ul><li>5. Sending threatening emails </li></ul><ul><li>6. Emails containing sexually explicit act etc </li></ul><ul><li>7. Communal Disharmony thru emails </li></ul><ul><li>8. Email Spoofing (identity theft) </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  5. 5. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount of $8000000 USD
  6. 6. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  7. 7. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  8. 8. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  9. 9. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  10. 10. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable Section 415,416, 417 420 of IPC  
  11. 11. 2. Sending Malicious Codes through email w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
  12. 12. 3. Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber jams your inbox continuously with same emails
  13. 13. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  14. 14. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  15. 15. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  16. 16. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b) If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability : Compensation to be paid Section(66) : Imprisonment upto 3yrs OR Fine up to 5 Lakhs OR Both Also Applicable Section 379,405,420 of IPC
  17. 17. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist Javed Akhtar has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
  18. 18. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-A   Punishment for sending offensive messages through communication service, etc.     Any person who sends, by means of a computer resource or a communication device,- a) any  information that is grossly offensive or has menacing character; or b) any  information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with imprisonment for a term which may extend to two three years and with fine.
  19. 19. 6. Emails containing sexually explicit act etc w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL <ul><li>Section 67- A </li></ul><ul><li>  Punishment for publishing or transmitting of material containing sexually explicit act, </li></ul><ul><li>etc. in electronic form (Inserted vide ITAA 2008) </li></ul><ul><li>  </li></ul><ul><li>  Whoever publishes or transmits or causes to be published or transmitted in the </li></ul><ul><li>Electronic form any material which contains sexually explicit act or conduct  shall be </li></ul><ul><li>punished on first conviction  with imprisonment of either description for a term which </li></ul><ul><li>may extend to five years and with fine which may extend to ten lakh   rupees and in the </li></ul><ul><li>event of second or subsequent conviction with imprisonment of either description for </li></ul><ul><li>a term which may extend to seven years and also with fine </li></ul><ul><li>which may extend to ten lakh rupees . </li></ul><ul><li>Exception: This section and section 67 does not extend to any book, pamphlet, paper, </li></ul><ul><li>writing, drawing, painting, representation or figure in electronic form- </li></ul><ul><li>the publication of which is proved to be justified as being for the public good on the </li></ul><ul><li>ground that such book, pamphlet, paper, writing, drawing, painting, representation </li></ul><ul><li>or figure is in the interest of science,literature,art,or learning or other objects of </li></ul><ul><li>general concern; or </li></ul><ul><li>(ii) which is kept or used  bona fide  for religious purposes </li></ul>
  20. 20. Section 66 and 43(d) : DATA DIDDLING <ul><li>Section 66 and 43(d) of the I.T. Act covers Data DiDDling </li></ul><ul><li>(CHANGING DATA BEFORE ENTERING INTO COMPUTER) </li></ul><ul><li>Civil Liability : Compensation to be paid </li></ul><ul><li>Section(66) : Imprisonment upto 3yrs OR </li></ul><ul><li> Fine up to 5 Lakhs OR Both </li></ul><ul><li>Case in point : </li></ul><ul><li>NDMC Electricity Billing Fraud Case : </li></ul><ul><li>A private contractor who was to deal with receipt and accounting of electricity bills by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance. </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  21. 21. 7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines Cyber Terrorism and Section 66-F(2) Specifies Punishment of imprisonment which may extend to imprisonment for life
  22. 22. Section 66C: IDENTITY THEFT <ul><li>Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, </li></ul><ul><li>Penalty : up to three years and shall also be liable to fine which may extend to rupees one lakh. </li></ul><ul><li>Section 419 of IPC also applicable </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  23. 23. Section 66C: IDENTITY THEFT- CASE STUDY <ul><li>Pranab Mitra , former executive of Gujarat Ambuja Cement posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen . </li></ul><ul><li>After long cyber relationship and emotional massages Mitra sent an e-mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend Ruchira Sengupta’s’’ e-mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case. </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  24. 24. Section(66) : CREDIT CARD FRAUD <ul><li>Penalty : Imprisonment upto 3yrs And OR </li></ul><ul><li>Fine up to 5 Lakhs </li></ul><ul><li>Section 120(B), 420, 467, 468, 471 of IPC. </li></ul>
  25. 25. Section(66) : PHISHING <ul><li>  </li></ul><ul><li>Phishing is the process by which someone obtains private information through deceptive or illicit means in order to falsely assume another person’s identity. The Phisher will use spoofed emails to lead the recipient to counterfeit websites. Once here, the victim is tricked into divulging credit card information, account usernames and passwords, social security numbers, etc.           </li></ul><ul><li>Sec 419, 420, 465, 468, 471 of  I.P.C r/w Sections 51, 63 and 65 of Copyright Act, 1957 which attract the punishment of 3 years imprisonment and fine up to 2 lakhs rupees which accused never thought of . </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  26. 26. Section(66) : PHISHING Case Study <ul><li>  April 13,2010 </li></ul><ul><li>In the verdict in the first case filed under the Information Technology Act in the country, Tamil Nadu IT secretary and adjudicator for the state, P W C Davidar on Monday directed ICICI Bank to pay Rs. 12.85 lakh as compensation </li></ul><ul><li>to an NRI customer, who complained he lost money from his account due to phishing in 2007 in Chennai. </li></ul><ul><li>          </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  27. 27. EMAIL DEFAMATION CASE <ul><li>SMC Pneumatics (India) Pvt. Ltd. v. Jogesh Kwatra : </li></ul><ul><li>No. 1279/2001 Delhi HC </li></ul><ul><li>India’s first case of cyber defamation was reported when a company’s employee (defendant) started sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the plaintiff company. </li></ul><ul><li>The plaintiff was able to identify the defendant with the help of a private computer expert and moved the Delhi High Court. The court granted an ad-interim injunction and restrained the employee from sending, publishing and transmitting e-mails, which are defamatory or derogatory to the plaintiffs. </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  28. 28. Tata Sons v. Greenpeace International Delhi HC IA 9089/2010 in CS (OS) 1407/2010 <ul><li>[Cyber defamation Injunction not granted] </li></ul><ul><li>Justice S. Ravindra Bhat, authoring the judgment noted that, though the internet has a wider reach and potential for injury, traditional standards for the grant of injunctions in cases of libel will be applicable. The court reasoned that these traditional standards are well developed and there is no constitutional mandate which allows the court to create a differentiation. If this reasoning is strictly applied it would mean that the conventional rules of defamation will be applied in cases of internet defamation. If applied liberally, courts may in cases of a legislative vacuum, apply other developed legal principles without differentiation. </li></ul>w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  29. 29. QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell: 9821763157
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×