SlideShare a Scribd company logo
1 of 12
INTRODUCTION
CYBER LAWS IN INDIA
 In simple way we can say that cyber crime is
unlawful act wherein the computer is either a
tool or a target or both.
 Cyber crimes can involve criminal activities that
are traditional in nature ,such as theft ,fraud
,forgery ,defamation and mischief, all of which
are subject to the Indian penal code.
 The abuse of computers has also given birth to
a gamut of new age crimes that are addressed
by the information technology act,2000.
CATEGORISATION OF CYBER
CRIMES
 The computer as the target :-using a
computer to attack other computers e.g.
Hacking ,virus ,DOS attack.
 The computer as a weapon:-using a
computer to commit real world crimes e.g.
cyber terrorism ,IPR violations ,credit card
frauds , pornography etc .
Why cyber law in India ?
 When internet was developed , the founding
fathers of internet hardly had any inclination
that internet could transform itself into an all
pervading revolution which could be misused
for criminal activities and which required
regulation .
 Today there are many disturbing things
happening in cyberspace .
 Due to the anonymous nature of the
internet , it is possible to engage in to a
variety of criminal activities with impunity
and people with intelligence , have been
grossly misusing the aspect of the internet
to perpetuate criminal activities in cyber
space .
Importance of cyber law
 Cyber law is important because it touches almost all
aspect of transactions and activities on and concerning
the internet , the world wide web and cyberspace .
 Initially it may seem that cyber laws it is very technical
field and that it does not have any bearing to most
activities in cyberspace .
 But the actual truth is that nothing could be further than
the truth .
 Whether we realize it or not , every
action and every reaction in
cyberspace has some legal and cyber
legal perspective .
Advantages of cyber laws
 The IT Act 2000 attempts to change outdated
laws and provides ways to deal with cyber
crimes .
 We need such laws so that people can
perform purchase transaction over the net
through credit card without fear of misuse.
 The act offers the much needed legal effect ,
validity or enforceability , solely on the ground
that it is in the forum of electronic record .
 In view of the growth in transactions and
communication carried out through electronic
record , the act seeks to empower government
department to accept filing , creating and
retention of official documents in the digital
format .
 The act has also proposed a legal framework
for the authentication and origin of electronic
records/communication through digital
signature .
CONCLUSION
 Though not all people are victims to cyber
crimes , they are still at risk with the
technology increasing , criminals don’t have to
rob banks , nor do the have to be outside in
order to commit any crime.
 They have everything they need on their lap .

More Related Content

Similar to Cyber Laws in India: An Overview of Key Provisions

Similar to Cyber Laws in India: An Overview of Key Provisions (20)

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
cle ppt.pptx
cle ppt.pptxcle ppt.pptx
cle ppt.pptx
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
English in written
English in writtenEnglish in written
English in written
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The cybersecurity and ethical hacking notes
The cybersecurity and ethical hacking notesThe cybersecurity and ethical hacking notes
The cybersecurity and ethical hacking notes
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 

More from Harini Sai

intitution_support.pptx
intitution_support.pptxintitution_support.pptx
intitution_support.pptxHarini Sai
 
Partnership.pptx
Partnership.pptxPartnership.pptx
Partnership.pptxHarini Sai
 
pdf_20230206_144048_0000.pdf
pdf_20230206_144048_0000.pdfpdf_20230206_144048_0000.pdf
pdf_20230206_144048_0000.pdfHarini Sai
 
Mktg%203_07%20PPT%20STUDENTS_1.pptx
Mktg%203_07%20PPT%20STUDENTS_1.pptxMktg%203_07%20PPT%20STUDENTS_1.pptx
Mktg%203_07%20PPT%20STUDENTS_1.pptxHarini Sai
 
Unit i international trade finance
Unit i international trade financeUnit i international trade finance
Unit i international trade financeHarini Sai
 

More from Harini Sai (12)

UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
intitution_support.pptx
intitution_support.pptxintitution_support.pptx
intitution_support.pptx
 
Partnership.pptx
Partnership.pptxPartnership.pptx
Partnership.pptx
 
UNIT 2 BP.ppt
UNIT 2 BP.pptUNIT 2 BP.ppt
UNIT 2 BP.ppt
 
unit 1.pptx
unit 1.pptxunit 1.pptx
unit 1.pptx
 
unit 4.pptx
unit 4.pptxunit 4.pptx
unit 4.pptx
 
unit 4.pptx
unit 4.pptxunit 4.pptx
unit 4.pptx
 
uit 5.pptx
uit 5.pptxuit 5.pptx
uit 5.pptx
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
pdf_20230206_144048_0000.pdf
pdf_20230206_144048_0000.pdfpdf_20230206_144048_0000.pdf
pdf_20230206_144048_0000.pdf
 
Mktg%203_07%20PPT%20STUDENTS_1.pptx
Mktg%203_07%20PPT%20STUDENTS_1.pptxMktg%203_07%20PPT%20STUDENTS_1.pptx
Mktg%203_07%20PPT%20STUDENTS_1.pptx
 
Unit i international trade finance
Unit i international trade financeUnit i international trade finance
Unit i international trade finance
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

Cyber Laws in India: An Overview of Key Provisions

  • 1.
  • 3. CYBER LAWS IN INDIA  In simple way we can say that cyber crime is unlawful act wherein the computer is either a tool or a target or both.  Cyber crimes can involve criminal activities that are traditional in nature ,such as theft ,fraud ,forgery ,defamation and mischief, all of which are subject to the Indian penal code.
  • 4.  The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the information technology act,2000.
  • 5. CATEGORISATION OF CYBER CRIMES  The computer as the target :-using a computer to attack other computers e.g. Hacking ,virus ,DOS attack.  The computer as a weapon:-using a computer to commit real world crimes e.g. cyber terrorism ,IPR violations ,credit card frauds , pornography etc .
  • 6. Why cyber law in India ?  When internet was developed , the founding fathers of internet hardly had any inclination that internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation .  Today there are many disturbing things happening in cyberspace .
  • 7.  Due to the anonymous nature of the internet , it is possible to engage in to a variety of criminal activities with impunity and people with intelligence , have been grossly misusing the aspect of the internet to perpetuate criminal activities in cyber space .
  • 8. Importance of cyber law  Cyber law is important because it touches almost all aspect of transactions and activities on and concerning the internet , the world wide web and cyberspace .  Initially it may seem that cyber laws it is very technical field and that it does not have any bearing to most activities in cyberspace .  But the actual truth is that nothing could be further than the truth .
  • 9.  Whether we realize it or not , every action and every reaction in cyberspace has some legal and cyber legal perspective .
  • 10. Advantages of cyber laws  The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes .  We need such laws so that people can perform purchase transaction over the net through credit card without fear of misuse.  The act offers the much needed legal effect , validity or enforceability , solely on the ground that it is in the forum of electronic record .
  • 11.  In view of the growth in transactions and communication carried out through electronic record , the act seeks to empower government department to accept filing , creating and retention of official documents in the digital format .  The act has also proposed a legal framework for the authentication and origin of electronic records/communication through digital signature .
  • 12. CONCLUSION  Though not all people are victims to cyber crimes , they are still at risk with the technology increasing , criminals don’t have to rob banks , nor do the have to be outside in order to commit any crime.  They have everything they need on their lap .