SlideShare a Scribd company logo
1 of 7
ICT Project
Topics: Software Piracy, Copy Right,
Cyber Law and Indian software Act.
Software Piracy
The unauthorized copying of software. Most retail programs arelicensed for use at
just one computer site or for use by only one userat any time. By buying
the software, you become a licensed userrather than an owner (see EULA). You are
allowed to make copiesof the program for backuppurposes, but it is against the law
to give copies to friends and colleagues.
Software piracy is all but impossible to stop, although software companies are
launching more and more lawsuits against major infractors. Originally, software
companies tried to stop software piracy by copy-protectingtheir software. This
strategy failed, however, because it was inconvenient for users and was not 100
percent foolproof. Most software now requires some sort of registration, which may
discourage would-be pirates, but doesn't really stop software piracy.
Some common types of software piracy include counterfeit software, OEM
unbundling, softlifting, hard disk loading, corporate software piracy, and Internet
software piracy.
Software Copyright
When someone creates an original piece of software, that person then holds the
copyright of that software
Holding the copyright of the software means that you have the protection of the law if
anyone tries to steal your software
Under copyright law :
 Copy the software for other people
 Lend the software to other people
 Rent the software to other people
 Install the software on a network so the other users can access it
If someone breaks the copyright, they can be punished by fines or by imprisonment
The reason fot this is that creating the software can involve the work of amny people
and can take 1000s of hours it is only fair that all of the effort is protected
Indian Software Act
Indian Software act
Software Patent law in India
The Indian Patent Law does not contain any specific provision regarding the
protection of computer software. There are no guidelines or office procedures
followed by the Indian patent office regarding computer software (Anna Elizabeth
Kuruvilla, 2003).
Although, computer programs are not patentable per se, however a claim to a
manner of manufacture, which results in a tangible product, which requires the
application of an algorithm or a particular computer program, may be patentable.
India has recently prepared itself for providing patent registrations on software.
Software copyright law in India
The Indian government has been an active participant in protecting the rights of
Copyright holder. Both Department of electronics and Ministry of Human resource
Development have actively helped in bringing amendments to the Indian Copyright
Act (Naavi, 2003b). Indian copyright act of 1957 is amended to extend its coverage
to computer software also. Computer programs received statutory recognition as a
`literary work' in 1984 and the definition has been amended and made more specific
and precise in the Copyright Amendment Act of 1994. India was one of the first
countries in the world to provide statutory protection to computer software and is one
of the toughest in the world. Major changes to Indian Copyright Law introduced in
June 1994 include :
 the definition of computer program,
 explains the rights of copyright holder,
 position on rentals of software,
 the rights of the user to make backup copies, and
 punishment and fines on infringement.
Data Protection Laws in India
In case of EU the data is protected for about 15 years but there is no such
specific law in India. India has no law that protect the privacy and integrity of
personal data, whereas more than 40 countries around the world have enacted,
or are preparing to enact a law on this.
In view of the terrorism, visitors to a cyber cafe are identified and monitored for
electronic transactions. Interception rights are already available to law
enforcement authorities in ITA-2000. The data protection right of an individual
may have to be balanced with the requirement of the law enforcement. It will be
difficult to pass any strict privacy laws as long as country is affected by terrorism
(Naavi, 2002).
According to Section 14 of the Copyright Act, it is illegal to make or distribute copies
of copyrighted software without proper or specific authorisation. The only exception
is provided by the act, which allows a back up copy purely as a temporary protection
against loss, distribution or damage to the original copy.
The act prohibits the sale or to give on hire, or offer for sale or hire, any copy of the
computer program without specific authorisation of the Copyright holder. In this
regard software copyright is different from copyright of literary work as they can be
resold. Software is licensed to use in a particular machine. Indian law prohibits
unauthorised duplication of software for use by different users or machines within an
organisation.
The copyright infringer may be tried under both civil and criminal law. The Act
provides for jail term of 7 days to three years and fines ranging between Rs 50,000
to Rs.2,00,000 and or both (Nasscom, 2003).
As per Indian law, it is not necessary to register with the Copyright Office to get
copyright protection. As per the Berne Convention for protection of literary and
artistic works- to which India is a signatory- copyright of any work in the member
countries is protected in all the signatory countries. Though registration of copyright
is optional, it is however, a good idea to incorporate a copyright notice, as it is helpful
in an infringement suit. Copyright protection, is automatic from the moment the work
is embodied in some medium like CDROM, magnetic tape, diskette or paper. For
registration, one has to send three complete copies of works whether published or
unpublished along with fee of Rs 10 to the Registrar of Copyrights, New Delhi.
Cyber Laws
Cyber space is theoretically subjected to jurisdiction of all of the world legal systems.
By its nature, INTERNET MAKES territorial application of national laws obsolete.
There are moves to develop a separate law for cyberspace, which will become
applicable any where with certain flexibility in terms of limits while making territorial
laws.India is one of the first few countries to enact the IT law in 2000 which is
broadly in the lines of model law on electronic commerce adopted by United nations
commission on international trade law in the year 1997. As per the law most IP items
can be used fearlessly for academic and research purposes without any commercial
intent.
Cyber Crimes
The IT Act2000 address the question of cyber crimes by defining what is a crime and
the penalties there of. Broad outline of the cyber crime as per law are (Vivekanadan,
2003b):
 Unauthorised access to information systems
 Disruption of information systems (Denial of access)
 Damage due to introduction of viruses
 Interception of communications
 Malicious misrepresentation (defamation, impersonation, cheating)
 Hacking (tampering,fraud, stalking, spam)
 Providing assistance to others for doing unlawful things
We can categorizeCybercrimes in two ways:
The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds
Cyber Crime regulated by Cyber Laws or Internet Laws.
The Technicalaspectsare :
a. Unauthorized access & Hacking
b. Trojan Attack
c. Virus and Worm attack
d. E-mail & IRC related crimes
e. Denial of Service attacks
ICT Cybe laws

More Related Content

What's hot

Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.anveshika thakur
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment9945446746
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An IntroductionMukesh Tekwani
 

What's hot (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An Introduction
 

Viewers also liked

Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (11)

Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to ICT Cybe laws

Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in Indiashamvisingh
 
India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright ProtectionGrittyCC
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studiesKirtesh Dudawat
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 

Similar to ICT Cybe laws (20)

Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Cyber law
Cyber lawCyber law
Cyber law
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
cle ppt.pptx
cle ppt.pptxcle ppt.pptx
cle ppt.pptx
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 

More from Ebin Robinson

ICT, Importance of programming and programming languages
ICT, Importance of programming and programming languagesICT, Importance of programming and programming languages
ICT, Importance of programming and programming languagesEbin Robinson
 
AS level Application of differential calculus in different fields
AS level Application of differential calculus in different fieldsAS level Application of differential calculus in different fields
AS level Application of differential calculus in different fieldsEbin Robinson
 
AS Level Physics- Electric circuits
AS Level Physics- Electric circuitsAS Level Physics- Electric circuits
AS Level Physics- Electric circuitsEbin Robinson
 
AS Levels How to write an effective advertisement
AS Levels How to write an effective advertisementAS Levels How to write an effective advertisement
AS Levels How to write an effective advertisementEbin Robinson
 
IGCSE History-vietnam
IGCSE History-vietnamIGCSE History-vietnam
IGCSE History-vietnamEbin Robinson
 
IGCSE geography-Case study-Osaka kobe
IGCSE geography-Case study-Osaka kobeIGCSE geography-Case study-Osaka kobe
IGCSE geography-Case study-Osaka kobeEbin Robinson
 
Chinese wind instruments
Chinese wind instrumentsChinese wind instruments
Chinese wind instrumentsEbin Robinson
 
igcse geography-Urban change in osaka-kobe
igcse geography-Urban change in osaka-kobeigcse geography-Urban change in osaka-kobe
igcse geography-Urban change in osaka-kobeEbin Robinson
 
Geography-Subsistence rice farming in the lower ganges valley
Geography-Subsistence rice farming in the lower ganges valleyGeography-Subsistence rice farming in the lower ganges valley
Geography-Subsistence rice farming in the lower ganges valleyEbin Robinson
 

More from Ebin Robinson (11)

Figures of speech
Figures of speechFigures of speech
Figures of speech
 
ICT, Importance of programming and programming languages
ICT, Importance of programming and programming languagesICT, Importance of programming and programming languages
ICT, Importance of programming and programming languages
 
Types of sensors
Types of sensorsTypes of sensors
Types of sensors
 
AS level Application of differential calculus in different fields
AS level Application of differential calculus in different fieldsAS level Application of differential calculus in different fields
AS level Application of differential calculus in different fields
 
AS Level Physics- Electric circuits
AS Level Physics- Electric circuitsAS Level Physics- Electric circuits
AS Level Physics- Electric circuits
 
AS Levels How to write an effective advertisement
AS Levels How to write an effective advertisementAS Levels How to write an effective advertisement
AS Levels How to write an effective advertisement
 
IGCSE History-vietnam
IGCSE History-vietnamIGCSE History-vietnam
IGCSE History-vietnam
 
IGCSE geography-Case study-Osaka kobe
IGCSE geography-Case study-Osaka kobeIGCSE geography-Case study-Osaka kobe
IGCSE geography-Case study-Osaka kobe
 
Chinese wind instruments
Chinese wind instrumentsChinese wind instruments
Chinese wind instruments
 
igcse geography-Urban change in osaka-kobe
igcse geography-Urban change in osaka-kobeigcse geography-Urban change in osaka-kobe
igcse geography-Urban change in osaka-kobe
 
Geography-Subsistence rice farming in the lower ganges valley
Geography-Subsistence rice farming in the lower ganges valleyGeography-Subsistence rice farming in the lower ganges valley
Geography-Subsistence rice farming in the lower ganges valley
 

ICT Cybe laws

  • 1. ICT Project Topics: Software Piracy, Copy Right, Cyber Law and Indian software Act.
  • 2. Software Piracy The unauthorized copying of software. Most retail programs arelicensed for use at just one computer site or for use by only one userat any time. By buying the software, you become a licensed userrather than an owner (see EULA). You are allowed to make copiesof the program for backuppurposes, but it is against the law to give copies to friends and colleagues. Software piracy is all but impossible to stop, although software companies are launching more and more lawsuits against major infractors. Originally, software companies tried to stop software piracy by copy-protectingtheir software. This strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most software now requires some sort of registration, which may discourage would-be pirates, but doesn't really stop software piracy. Some common types of software piracy include counterfeit software, OEM unbundling, softlifting, hard disk loading, corporate software piracy, and Internet software piracy. Software Copyright When someone creates an original piece of software, that person then holds the copyright of that software
  • 3. Holding the copyright of the software means that you have the protection of the law if anyone tries to steal your software Under copyright law :  Copy the software for other people  Lend the software to other people  Rent the software to other people  Install the software on a network so the other users can access it If someone breaks the copyright, they can be punished by fines or by imprisonment The reason fot this is that creating the software can involve the work of amny people and can take 1000s of hours it is only fair that all of the effort is protected Indian Software Act Indian Software act Software Patent law in India The Indian Patent Law does not contain any specific provision regarding the protection of computer software. There are no guidelines or office procedures followed by the Indian patent office regarding computer software (Anna Elizabeth Kuruvilla, 2003). Although, computer programs are not patentable per se, however a claim to a manner of manufacture, which results in a tangible product, which requires the application of an algorithm or a particular computer program, may be patentable. India has recently prepared itself for providing patent registrations on software. Software copyright law in India The Indian government has been an active participant in protecting the rights of Copyright holder. Both Department of electronics and Ministry of Human resource Development have actively helped in bringing amendments to the Indian Copyright Act (Naavi, 2003b). Indian copyright act of 1957 is amended to extend its coverage
  • 4. to computer software also. Computer programs received statutory recognition as a `literary work' in 1984 and the definition has been amended and made more specific and precise in the Copyright Amendment Act of 1994. India was one of the first countries in the world to provide statutory protection to computer software and is one of the toughest in the world. Major changes to Indian Copyright Law introduced in June 1994 include :  the definition of computer program,  explains the rights of copyright holder,  position on rentals of software,  the rights of the user to make backup copies, and  punishment and fines on infringement. Data Protection Laws in India In case of EU the data is protected for about 15 years but there is no such specific law in India. India has no law that protect the privacy and integrity of personal data, whereas more than 40 countries around the world have enacted, or are preparing to enact a law on this. In view of the terrorism, visitors to a cyber cafe are identified and monitored for electronic transactions. Interception rights are already available to law enforcement authorities in ITA-2000. The data protection right of an individual may have to be balanced with the requirement of the law enforcement. It will be difficult to pass any strict privacy laws as long as country is affected by terrorism (Naavi, 2002). According to Section 14 of the Copyright Act, it is illegal to make or distribute copies of copyrighted software without proper or specific authorisation. The only exception is provided by the act, which allows a back up copy purely as a temporary protection against loss, distribution or damage to the original copy. The act prohibits the sale or to give on hire, or offer for sale or hire, any copy of the computer program without specific authorisation of the Copyright holder. In this regard software copyright is different from copyright of literary work as they can be resold. Software is licensed to use in a particular machine. Indian law prohibits
  • 5. unauthorised duplication of software for use by different users or machines within an organisation. The copyright infringer may be tried under both civil and criminal law. The Act provides for jail term of 7 days to three years and fines ranging between Rs 50,000 to Rs.2,00,000 and or both (Nasscom, 2003). As per Indian law, it is not necessary to register with the Copyright Office to get copyright protection. As per the Berne Convention for protection of literary and artistic works- to which India is a signatory- copyright of any work in the member countries is protected in all the signatory countries. Though registration of copyright is optional, it is however, a good idea to incorporate a copyright notice, as it is helpful in an infringement suit. Copyright protection, is automatic from the moment the work is embodied in some medium like CDROM, magnetic tape, diskette or paper. For registration, one has to send three complete copies of works whether published or unpublished along with fee of Rs 10 to the Registrar of Copyrights, New Delhi. Cyber Laws Cyber space is theoretically subjected to jurisdiction of all of the world legal systems. By its nature, INTERNET MAKES territorial application of national laws obsolete. There are moves to develop a separate law for cyberspace, which will become applicable any where with certain flexibility in terms of limits while making territorial laws.India is one of the first few countries to enact the IT law in 2000 which is broadly in the lines of model law on electronic commerce adopted by United nations commission on international trade law in the year 1997. As per the law most IP items can be used fearlessly for academic and research purposes without any commercial intent. Cyber Crimes The IT Act2000 address the question of cyber crimes by defining what is a crime and the penalties there of. Broad outline of the cyber crime as per law are (Vivekanadan, 2003b):  Unauthorised access to information systems
  • 6.  Disruption of information systems (Denial of access)  Damage due to introduction of viruses  Interception of communications  Malicious misrepresentation (defamation, impersonation, cheating)  Hacking (tampering,fraud, stalking, spam)  Providing assistance to others for doing unlawful things We can categorizeCybercrimes in two ways: The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds Cyber Crime regulated by Cyber Laws or Internet Laws. The Technicalaspectsare : a. Unauthorized access & Hacking b. Trojan Attack c. Virus and Worm attack d. E-mail & IRC related crimes e. Denial of Service attacks