SlideShare a Scribd company logo
1 of 4
Download to read offline
Cyber laws
Seminar topic Report
NAME: Anirudh.R
Roll no: 19MEL004
I year M.sc Applied Electronics
Introduction:
This Topic deals with Cyber law and its need in today’s era ,where everything has become ‘I.T’. Cyber Law is
the law governing cyberspace .Cyber space includes computers ,networks, software’s ,Data storage devices(hard disks,
USB disks etc),Internet,(Websites ,e-mails) even electronic devices such as cell phones, ATM machines etc.
Contents:
 NEED FOR CYBERLAW
 CYBER CRIMES
 INTRODUCTION TO CYBERLAW
 IT ACT -2000
 IT ACT AMENDMENT-2008
 WORLD &CYBER LAW
 IMPORTANCE OF CYBER LAW IN PRESENT ERA
Need For Cyber law:
 Internet has changed the way we think , govern ,commerce and perceive ourselves.
 Information technology is encompassing all walks of life all over the world. Cyber space creates moral ,civil and
criminal wrongs. It has now given a new way to express criminal tendencies.
 Cyberspace is open to participation by all, “IT” has brought Transition from paper to paperless world.
 The laws of real world cannot be interpreted in light of emerging cyberspace to include all aspects relating to
different activities in cyberspace.
 Internet requires an enabling and supportive legal infrastructure in tune with the times.
Cyber law Deals with:
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
What is Cyber crime?
 Any crime with the help of computer and telecommunication technology.
 Any crime with either the computer is used as an object or subject.
Categories of Cyber Crimes:
 Against a Person: Cyber stalking, Impersonation, Loss of privacy, Transmission of obscene material(Harassment
with the use of computer).
 Against a Property: Unauthorized Computer Trespassing, Computer vandalism, Transmission of harmful
programs , Siphoning of funds from financial institutions ,Stealing secret information & data, Copy Right.
 Against a Government: Hacking of government websites, Cyber Extortion, Cyber Terrorism, Computer viruses.
I.T Act-2000:
The information Technology Act ,2000(IT Act),came into force on 17October 2000.
 The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of
electronic records with Government.
 Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
I.T Act -2000 (Objectives):
 To provide legal recognition for transactions.
 To facilitate electronic filing of documents with the Government agencies.
 To amend the Indian Penal Code ,The Indian Evidence Act,1872,The Banker’s Book Evidence Act,1891 and
Reserve Bank of India Act ,1934
 Aims to provide the legal framework to all electronic records.
Snapshots of I.T Act -2000:
Offence section under IT Act
Tampering of Computer source sec.43
Documents(without permission of in charge)
Hacking with computer systems ,Data alteration sec.66
Publishing obscene information sec.67
Un-authorized access to protected system sec.70
Breach of confidentiality and privacy sec.72
Publishing false digital signature certificates sec. 73
Crimes under Indian Penal code and Special Laws:
Offence sections
Sending threatening& sec.503&409 IPC
Defamatory messages by email
Forgery of electronic records sec.463 IPC
Bogus websites , cyber frauds sec.420 IPC
E-mail spoofing &Abuse sec.463 &500 IPC
Web-jacking sec.383 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
I.T Amendment Act-2008:
 The Information Technology AmendmentAct,2008(IT Act 2008) has been passed by parliament on
23rd
December, 2008.
 It received the assent of President of India on 5th
February, 2009.
The IT Act 2008 has been notified on October 27,2009.
Salient Features:
 ITA-2008,is a new version of IT Act 2000.
 Provides additional focus on Information security.
 Added several new sections on offences including Cyber Terrorism and Data Protection.
 124 sections and 14chapters.
 Schedule I and II have been replaced &Schedule III and IV are deleted.
 Amended section 69 gives power to state.
 Section 69A and B, grant power to state to direct blocking for public access of any information through any
computer resource.
Worlds and Cyber laws:
 The Great firewall of China monitors every movement in cyberspace and protect to publish any offensive
content.
 China have a hold on every content which is harmful of dangerous for the government of china.
 Brazil is considered world’s biggest airports for Hackers.
 Iran is also a dangerous country for the Netizens. They also have a crime Police unit for crime in Cyberspace.
Importance of Cyber laws in Today’s Era:
 We are living in highly digitalized world.
 All companies depend upon their computer networks and keep their valuable data in electronic form.
 Government forms including income tax returns, company law forms etc are now filled in electronic form.
 Consumers are increasingly using debit and credit cards and other online mode for shopping.
 Most people are using email, cell phones and SMS messages for communication.
 Even in “ non-cyber crime” cases, important evidence is found in computers/cell phones e.g.
in cases of divorce, murder, kidnapping, organized crimes, terrorist operations, counterfeit currency etc.
 Since it touches all aspects of transactions and activities on and concerning the Internet, the World Wide Web
and Cyberspace therefore Cyber Law is extremely important.

More Related Content

What's hot

Information Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notesInformation Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notesayushigupta300
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Omkar Walavalkar
 
Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer indiacyberjure
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Hacking Activities in Canada
Hacking Activities in CanadaHacking Activities in Canada
Hacking Activities in CanadaIrem Kaya
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyWillislwhite12
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...FAST NUCES
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 

What's hot (20)

IT Act
IT ActIT Act
IT Act
 
Information Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notesInformation Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notes
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Hacking Activities in Canada
Hacking Activities in CanadaHacking Activities in Canada
Hacking Activities in Canada
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
 
Definition of key words
Definition of key wordsDefinition of key words
Definition of key words
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 

Similar to Cyberlaws report

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 

Similar to Cyberlaws report (20)

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
It act 2000
It act 2000It act 2000
It act 2000
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 

Recently uploaded

如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 

Recently uploaded (20)

如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 

Cyberlaws report

  • 1. Cyber laws Seminar topic Report NAME: Anirudh.R Roll no: 19MEL004 I year M.sc Applied Electronics
  • 2. Introduction: This Topic deals with Cyber law and its need in today’s era ,where everything has become ‘I.T’. Cyber Law is the law governing cyberspace .Cyber space includes computers ,networks, software’s ,Data storage devices(hard disks, USB disks etc),Internet,(Websites ,e-mails) even electronic devices such as cell phones, ATM machines etc. Contents:  NEED FOR CYBERLAW  CYBER CRIMES  INTRODUCTION TO CYBERLAW  IT ACT -2000  IT ACT AMENDMENT-2008  WORLD &CYBER LAW  IMPORTANCE OF CYBER LAW IN PRESENT ERA Need For Cyber law:  Internet has changed the way we think , govern ,commerce and perceive ourselves.  Information technology is encompassing all walks of life all over the world. Cyber space creates moral ,civil and criminal wrongs. It has now given a new way to express criminal tendencies.  Cyberspace is open to participation by all, “IT” has brought Transition from paper to paperless world.  The laws of real world cannot be interpreted in light of emerging cyberspace to include all aspects relating to different activities in cyberspace.  Internet requires an enabling and supportive legal infrastructure in tune with the times. Cyber law Deals with:  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy What is Cyber crime?  Any crime with the help of computer and telecommunication technology.  Any crime with either the computer is used as an object or subject. Categories of Cyber Crimes:  Against a Person: Cyber stalking, Impersonation, Loss of privacy, Transmission of obscene material(Harassment with the use of computer).  Against a Property: Unauthorized Computer Trespassing, Computer vandalism, Transmission of harmful programs , Siphoning of funds from financial institutions ,Stealing secret information & data, Copy Right.  Against a Government: Hacking of government websites, Cyber Extortion, Cyber Terrorism, Computer viruses.
  • 3. I.T Act-2000: The information Technology Act ,2000(IT Act),came into force on 17October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters. I.T Act -2000 (Objectives):  To provide legal recognition for transactions.  To facilitate electronic filing of documents with the Government agencies.  To amend the Indian Penal Code ,The Indian Evidence Act,1872,The Banker’s Book Evidence Act,1891 and Reserve Bank of India Act ,1934  Aims to provide the legal framework to all electronic records. Snapshots of I.T Act -2000: Offence section under IT Act Tampering of Computer source sec.43 Documents(without permission of in charge) Hacking with computer systems ,Data alteration sec.66 Publishing obscene information sec.67 Un-authorized access to protected system sec.70 Breach of confidentiality and privacy sec.72 Publishing false digital signature certificates sec. 73 Crimes under Indian Penal code and Special Laws: Offence sections Sending threatening& sec.503&409 IPC Defamatory messages by email Forgery of electronic records sec.463 IPC Bogus websites , cyber frauds sec.420 IPC E-mail spoofing &Abuse sec.463 &500 IPC Web-jacking sec.383 IPC Online sale of Drugs NDPS Act Online sale of Arms Arms Act I.T Amendment Act-2008:  The Information Technology AmendmentAct,2008(IT Act 2008) has been passed by parliament on 23rd December, 2008.  It received the assent of President of India on 5th February, 2009. The IT Act 2008 has been notified on October 27,2009.
  • 4. Salient Features:  ITA-2008,is a new version of IT Act 2000.  Provides additional focus on Information security.  Added several new sections on offences including Cyber Terrorism and Data Protection.  124 sections and 14chapters.  Schedule I and II have been replaced &Schedule III and IV are deleted.  Amended section 69 gives power to state.  Section 69A and B, grant power to state to direct blocking for public access of any information through any computer resource. Worlds and Cyber laws:  The Great firewall of China monitors every movement in cyberspace and protect to publish any offensive content.  China have a hold on every content which is harmful of dangerous for the government of china.  Brazil is considered world’s biggest airports for Hackers.  Iran is also a dangerous country for the Netizens. They also have a crime Police unit for crime in Cyberspace. Importance of Cyber laws in Today’s Era:  We are living in highly digitalized world.  All companies depend upon their computer networks and keep their valuable data in electronic form.  Government forms including income tax returns, company law forms etc are now filled in electronic form.  Consumers are increasingly using debit and credit cards and other online mode for shopping.  Most people are using email, cell phones and SMS messages for communication.  Even in “ non-cyber crime” cases, important evidence is found in computers/cell phones e.g. in cases of divorce, murder, kidnapping, organized crimes, terrorist operations, counterfeit currency etc.  Since it touches all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace therefore Cyber Law is extremely important.