SlideShare a Scribd company logo
1 of 3
Download to read offline
Cyber Law
1. Cyber Safety
2. Computer Virus
3. Computer Worm
4. Trojan Horse
5. Spam
6. Protection using Firewall
Cyber safety is the safe and responsible use of Internet and keeping information safe and
secure. It's also being responsible with that information and being respectful to other people
online.
A computer virus is an agent(some form of executable code) that can replicate and spread from
one computer to another. It can spread because its host has sent(willingly or unwillingly) it to
someone over a network or internet, or through a physical medium such as floppy disk, CD,
DVD or USB drive. Some viruses are harmful as they are programmed to harm your computer
by damaging or deleting files and programs.
A computer worm is a computer program which self-replicates itself in order to spread to
other computers. It uses the network to send copies of itself to other nodes. Unlike a virus, it
doesn't need to attach itself to an existing program.
Trojan Horse is a malicious program that looks legitimate but it can take control of the
computer. It's designed to damage, disrupt, steal or do any harm to your data or computer but
it acts like a useful or normal application.
It's the abuse of messaging systems to send unsolicited message(s) to large number of
recipients for any purpose. Most common type of spamming is email spam. It can be used for
phishing, commercial use, advertising and more negative things like proselytizing.
Security hardware & software that prevent unauthorized users from gaining access to a
computer or network is known as firewall. It provides protection against outside cyber
attackers and malicious software.
Cookies are messages that a web server transmits to a Web browser so that the web server
can keep track of the user's activity on a specific website. A small piece of information stored
on user's computer by the web browser while browsing a website. It's main purpose is to
identify users and possibly prepare customized web pages for them. It also used to remember
some information of user such as data entered into form fields, payment card numbers, items
added in a cart.
Cookies are stored on user's disk so even if server crashes they are still available.
There's a possible security threat to a user.
7. Use of Cookies
8. Cyber Law
Cyber laws cumulates a wide variety of political and legal issues related to the internet,
networks, hardware, software and other communications technology, including scam or
treachery, copyrighting issues, online insults/harassments, data protection, etc.
Cyber Law
10. Cyber Crime
It refers to any crime that involves a computer and a network, the computer may have been
used in commission of crime, or it may be the target. It may threaten a person, company or a
nation's security, etc. Various classifications are as follows :
1. Tampering with computer source documents
Concealing(hiding), destroying(demolishes or reduces), altering(change in characteristics)
any computer source code used for a computer, computer program, computer system or
computer network, when the source code is required to be kept or maintained by law is
punishable.
2. Hacking
It's usually understood to be the unauthorized access of a computer system or network.
Someone with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing in
a computer resource.
3. Publishing obscene information or material(including pornographic)
Someone who publishes or transmits or causes to be published(in electronic form) any
material which is lascivious, or if its effect is such as to tend to deprave and corrupt persons
who are likely to read, see or hear the matter contained or embodied in it, is liable to
punishment.
9. IT Act
The Act provides a legal framework for electronic governance by giving recognition to
electronic records and digital signatures. It also defines cyber crimes and prescribes penalties
for them. The Act directed the formation of a Controller of Certifying Authorities to regulate
the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve
disputes rising from this new law. The Act also amended various sections of the Indian Penal
Code, 1860, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891, and the
Reserve Bank of India Act, 1934 to make them compliant with new technologies.
4. Child Pornography
Child Pornography is a part of cyber pornography, but it is such a grave offence that it is
individually also recognized as a cyber crime.
5. Accessing protected system
Any unauthorized person who secures access or attempts to secure access to a protected
system is liable to be punished with punishment and may also be liable to fine.
6. Breach of confidentiality and privacy
Any person who secures access to any electronic record, book, register, correspondence,
information, document or other material without the consent of the person concerned or
discloses such material to any other person shall be liable to be punished under the
Information Technology Act.

More Related Content

What's hot (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 

Similar to Cyber Law .pdf

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 

Similar to Cyber Law .pdf (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Hamza
HamzaHamza
Hamza
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Cyber Law .pdf

  • 1.
  • 2. Cyber Law 1. Cyber Safety 2. Computer Virus 3. Computer Worm 4. Trojan Horse 5. Spam 6. Protection using Firewall Cyber safety is the safe and responsible use of Internet and keeping information safe and secure. It's also being responsible with that information and being respectful to other people online. A computer virus is an agent(some form of executable code) that can replicate and spread from one computer to another. It can spread because its host has sent(willingly or unwillingly) it to someone over a network or internet, or through a physical medium such as floppy disk, CD, DVD or USB drive. Some viruses are harmful as they are programmed to harm your computer by damaging or deleting files and programs. A computer worm is a computer program which self-replicates itself in order to spread to other computers. It uses the network to send copies of itself to other nodes. Unlike a virus, it doesn't need to attach itself to an existing program. Trojan Horse is a malicious program that looks legitimate but it can take control of the computer. It's designed to damage, disrupt, steal or do any harm to your data or computer but it acts like a useful or normal application. It's the abuse of messaging systems to send unsolicited message(s) to large number of recipients for any purpose. Most common type of spamming is email spam. It can be used for phishing, commercial use, advertising and more negative things like proselytizing. Security hardware & software that prevent unauthorized users from gaining access to a computer or network is known as firewall. It provides protection against outside cyber attackers and malicious software. Cookies are messages that a web server transmits to a Web browser so that the web server can keep track of the user's activity on a specific website. A small piece of information stored on user's computer by the web browser while browsing a website. It's main purpose is to identify users and possibly prepare customized web pages for them. It also used to remember some information of user such as data entered into form fields, payment card numbers, items added in a cart. Cookies are stored on user's disk so even if server crashes they are still available. There's a possible security threat to a user. 7. Use of Cookies 8. Cyber Law Cyber laws cumulates a wide variety of political and legal issues related to the internet, networks, hardware, software and other communications technology, including scam or treachery, copyrighting issues, online insults/harassments, data protection, etc.
  • 3. Cyber Law 10. Cyber Crime It refers to any crime that involves a computer and a network, the computer may have been used in commission of crime, or it may be the target. It may threaten a person, company or a nation's security, etc. Various classifications are as follows : 1. Tampering with computer source documents Concealing(hiding), destroying(demolishes or reduces), altering(change in characteristics) any computer source code used for a computer, computer program, computer system or computer network, when the source code is required to be kept or maintained by law is punishable. 2. Hacking It's usually understood to be the unauthorized access of a computer system or network. Someone with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource. 3. Publishing obscene information or material(including pornographic) Someone who publishes or transmits or causes to be published(in electronic form) any material which is lascivious, or if its effect is such as to tend to deprave and corrupt persons who are likely to read, see or hear the matter contained or embodied in it, is liable to punishment. 9. IT Act The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve disputes rising from this new law. The Act also amended various sections of the Indian Penal Code, 1860, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891, and the Reserve Bank of India Act, 1934 to make them compliant with new technologies. 4. Child Pornography Child Pornography is a part of cyber pornography, but it is such a grave offence that it is individually also recognized as a cyber crime. 5. Accessing protected system Any unauthorized person who secures access or attempts to secure access to a protected system is liable to be punished with punishment and may also be liable to fine. 6. Breach of confidentiality and privacy Any person who secures access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned or discloses such material to any other person shall be liable to be punished under the Information Technology Act.