SlideShare a Scribd company logo
1 of 9
Legal Structure for
CYBER GOVERNANCE
 Laws in general (such as constitutional,
administrative, contract and criminal laws)
are applicable
 Specific Laws –
IP Law, Computer Crime Law and Electronic
Transactions Law etc.
IP Act No: 36 of 2003
Electronic Transactions Act. No: 19 0f 2006
Computer Crime Act No: 24 of 2007
(Information and Communication Technology
Act No: 27 of 2003 -policy and Evidence
(Special Provisions) Act No: 14 of 1995 -
computer evidence).
 Computer : an electronic or similar device
having information processing capabilities
(IP Act and ET Act)
 Computer program: A set of
instructions expressed in words, codes,
schemes or in any other form which is
capable, when incorporated in a medium
that the computer can read, of causing a
computer to perform or achieve a
particular task or result.
(IP Act and Computer Crime Act)
 Computer programs : Copyright Law
 Protected as a literary work
(source code & object code)
 Protected rights – moral & economic
 Owner of rights: author, employer &
person who commissioned
 Duration – Life time & 70 years
 Acquisition – purchase/license
 Databases – Copyright Law
 Infringement : acts that violate protected
rights
 Civil/criminal liability
Hardware
- Patent law (inventions)
- Trademark law ( Business)
- Layout designs
- Information
Undisclosed information (secret, kept
secret & financial value), Law of
contracts
 Electronic documents, e-records data messages and other e-
communication are legally valid (offer & acceptance)
 Requirement in writing & e-documents, etc., (electronic form)
valid if the contained information is accessible so as to be
usable for subsequent reference.
 Original forms of information in writing – can be in e-form (
reliability of the integrity of information and availability of
information for subsequent reference)
 Information retention e-form
 Electronic signatures
 E-records/signatures in govt. forms, licences, permits, receipts
( as may be specified by the relevant govt. agency)
 Regulations
 E-contracts – valid unless otherwise agreed (formation,
originator, time, etc.,)
 Unauthorized & intentional access to a computer – (computer/information held in
computer) (hacking)
 An act done in order to secure access to computer /information held in computer
(turning on of a computer) (cracking)
 Unauthorized & intentional act of causing a computer to perform any function that
will result in unauthorized modification or damage or potential damage to a
computer, computer system or computer program (eg. deleting information)
 Intentionally causing a computer to perform a function adversely affecting national
security, national economy or public order.
 Obtaining (unauthorized & intentional) information from a computer or a storage
medium of a computer – buys. receives, sells or (deals with) ,offers for sale,
downloads, uploads, copies, acquires, etc.,
 Intercepting data or communication to, from or within a computer or
electromagnetic emissions from a computer carrying information
 Illegal devices (for committing an offence) produces, sells, imports, procures, etc.,
 Unauthorized disclosure of information (entrusted) which enables access to any
service provided by means of a computer
 Attempt, abetment & conspiring
 Survives
only adoptable, not strongest

More Related Content

Similar to Legal Structure for Cyber Governance.ppt

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
Wulax37
 
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 

Similar to Legal Structure for Cyber Governance.ppt (20)

The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
 
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmmMidwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPIntellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
 
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
 
It legislation
It legislationIt legislation
It legislation
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

More from JOHN BABATUNDE LEE

More from JOHN BABATUNDE LEE (14)

PRAYER AS OF OLD - End of The Year Chain Prayer
PRAYER AS OF OLD - End of The Year Chain PrayerPRAYER AS OF OLD - End of The Year Chain Prayer
PRAYER AS OF OLD - End of The Year Chain Prayer
 
The scheme of prayers for all who want to pray to God
The scheme of prayers for all who want to pray to GodThe scheme of prayers for all who want to pray to God
The scheme of prayers for all who want to pray to God
 
Revelation of King ELBA about the Abode of God and deep things you can never ...
Revelation of King ELBA about the Abode of God and deep things you can never ...Revelation of King ELBA about the Abode of God and deep things you can never ...
Revelation of King ELBA about the Abode of God and deep things you can never ...
 
The Angel Among us : Gracious man with God's mantle
The Angel Among us : Gracious man with God's mantleThe Angel Among us : Gracious man with God's mantle
The Angel Among us : Gracious man with God's mantle
 
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdfCORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
 
Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
 
Educational Philosophy in Prison / Correctional Facilities
Educational Philosophy in Prison / Correctional FacilitiesEducational Philosophy in Prison / Correctional Facilities
Educational Philosophy in Prison / Correctional Facilities
 
Strategies for Leading and Communicating Effective Across Diverse Cultures
Strategies for Leading and Communicating Effective  Across  Diverse CulturesStrategies for Leading and Communicating Effective  Across  Diverse Cultures
Strategies for Leading and Communicating Effective Across Diverse Cultures
 
Intro To Church History and Manpower Management
Intro To Church History and Manpower ManagementIntro To Church History and Manpower Management
Intro To Church History and Manpower Management
 
Go, preach, teach and disciple the nations!
Go, preach, teach and disciple the nations!Go, preach, teach and disciple the nations!
Go, preach, teach and disciple the nations!
 
American People and their Culture : 2009
American People and their Culture : 2009American People and their Culture : 2009
American People and their Culture : 2009
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.ppt
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.pptE-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
 

Recently uploaded

一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样
doypbe
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
BrV
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
acyefsa
 
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
mefyqyn
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
ZurliaSoop
 
官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样
官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样
官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样
acyefsa
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
afukemk
 

Recently uploaded (20)

Dabholkar-matter-Judgement-1.pdfrefp;sdPp;
Dabholkar-matter-Judgement-1.pdfrefp;sdPp;Dabholkar-matter-Judgement-1.pdfrefp;sdPp;
Dabholkar-matter-Judgement-1.pdfrefp;sdPp;
 
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证原件一模一样
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
 
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
December 8 2020 Hearing Transcript from Bankruptcy Adversary Proceeding
December 8 2020 Hearing Transcript from Bankruptcy Adversary ProceedingDecember 8 2020 Hearing Transcript from Bankruptcy Adversary Proceeding
December 8 2020 Hearing Transcript from Bankruptcy Adversary Proceeding
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying law
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
 
官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样
官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样
官方认证新加坡国立大学毕业证(nus毕业证)成绩单电子版原版一模一样
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpEmbed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
 
Trial by media Do media trials serve aby purpose
Trial by media Do media trials serve aby purposeTrial by media Do media trials serve aby purpose
Trial by media Do media trials serve aby purpose
 
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 

Legal Structure for Cyber Governance.ppt

  • 2.  Laws in general (such as constitutional, administrative, contract and criminal laws) are applicable  Specific Laws – IP Law, Computer Crime Law and Electronic Transactions Law etc.
  • 3. IP Act No: 36 of 2003 Electronic Transactions Act. No: 19 0f 2006 Computer Crime Act No: 24 of 2007 (Information and Communication Technology Act No: 27 of 2003 -policy and Evidence (Special Provisions) Act No: 14 of 1995 - computer evidence).
  • 4.  Computer : an electronic or similar device having information processing capabilities (IP Act and ET Act)  Computer program: A set of instructions expressed in words, codes, schemes or in any other form which is capable, when incorporated in a medium that the computer can read, of causing a computer to perform or achieve a particular task or result. (IP Act and Computer Crime Act)
  • 5.  Computer programs : Copyright Law  Protected as a literary work (source code & object code)  Protected rights – moral & economic  Owner of rights: author, employer & person who commissioned  Duration – Life time & 70 years  Acquisition – purchase/license  Databases – Copyright Law
  • 6.  Infringement : acts that violate protected rights  Civil/criminal liability Hardware - Patent law (inventions) - Trademark law ( Business) - Layout designs - Information Undisclosed information (secret, kept secret & financial value), Law of contracts
  • 7.  Electronic documents, e-records data messages and other e- communication are legally valid (offer & acceptance)  Requirement in writing & e-documents, etc., (electronic form) valid if the contained information is accessible so as to be usable for subsequent reference.  Original forms of information in writing – can be in e-form ( reliability of the integrity of information and availability of information for subsequent reference)  Information retention e-form  Electronic signatures  E-records/signatures in govt. forms, licences, permits, receipts ( as may be specified by the relevant govt. agency)  Regulations  E-contracts – valid unless otherwise agreed (formation, originator, time, etc.,)
  • 8.  Unauthorized & intentional access to a computer – (computer/information held in computer) (hacking)  An act done in order to secure access to computer /information held in computer (turning on of a computer) (cracking)  Unauthorized & intentional act of causing a computer to perform any function that will result in unauthorized modification or damage or potential damage to a computer, computer system or computer program (eg. deleting information)  Intentionally causing a computer to perform a function adversely affecting national security, national economy or public order.  Obtaining (unauthorized & intentional) information from a computer or a storage medium of a computer – buys. receives, sells or (deals with) ,offers for sale, downloads, uploads, copies, acquires, etc.,  Intercepting data or communication to, from or within a computer or electromagnetic emissions from a computer carrying information  Illegal devices (for committing an offence) produces, sells, imports, procures, etc.,  Unauthorized disclosure of information (entrusted) which enables access to any service provided by means of a computer  Attempt, abetment & conspiring