SlideShare a Scribd company logo
1 of 36
By Neeraj Aarora
Advocate-on-Record, Supreme Court
CISSP, FCMA, CISA, CEH, CFCE
 DDOs Attacks against Estonian Websites.
 First Accessed other People's Computers
through Zombie Applications.
 Estonian Attack relied on vast Botnets to
send Coordinated Crash-inducing Data to
Web Servers.
 Freezed complete infrastructure.
2N e e r a j A a r o r a3/28/2016
Whoever ,
(1) with the intent to threaten the unity,
integrity, security or sovereignty of India or to strike terror in
any section of the people.
 one who causes denial of access to computer resources,
 or has unauthorized access to a computer resource,
 or introduces a virus, or containment
 Effect to cause death, injury to person or damage/destruction of
property, disruption of essential supplies.
(2)unauthorized access to information, data restricted for security
of State.
3N e e r a j A a r o r a3/28/2016
 Very Effective, Size: 500 KiloByte.
 Attacked in Three Phases.
 it targets Microsoft Windows Machines and Networks.
 Sought Out Siemens Step7 software (Windows-based used to
Program Industrial Control Systems that Operate Equipment, such
as Centrifuges).
 Compromised Programmable Logic Controllers.
 Spy on Industrial Systems and even Cause Fast-Spinning
Centrifuges to Tear themselves apart.
 Can Spread Stealthily Between Computers running Windows.
 Can Spread through USB thumb Drive.
4N e e r a j A a r o r a3/28/2016
Cyber
Contravention
Cyber Offences
+
43, 43A
Sec. 65 –
67, 72,
72A
Sec 43
Adjudicating
Officer
Police/Court
Sec 66
5N e e r a j A a r o r a3/28/2016
 Unauthorized access –
 If any person without permission of the owner or any other
person who is the in charge of a computer, computer systems or
computer network commits any violation in Section 43 (a) – (j).
 Penalty and compensation –
 Liable to pay damages by way of compensation to the tune of Rs.
5 Crores.
6N e e r a j A a r o r a3/28/2016
 “If any person, dishonestly, or fraudulently, does any act referred
to in section 43, he shall be punishable with imprisonment for a
term which may extend to three years or with fine which may
extend to five lakh rupees or with both.”
 Dishonestly or fraudulently as defined u/s 24/25 IPC
 Cognizable & Bailable.
7N e e r a j A a r o r a3/28/2016
Sec. 43(a) Unauthorized Access
Sec. 43(b) downloads, copies or extracts any data
Sec. 43 (c) introduces or causes to be introduced any
computer contaminant or computer virus
Sec. 43(d) damages or causes to be damaged any computer
resource
Sec. 43(e) disrupts or causes disruption of any computer,
computer system or computer network
8N e e r a j A a r o r a3/28/2016
 Mails along with pdf are being sent.
 Virus, Cryptowall encrypts the hard drive.
 Also encrypt the external or shared drives.
 Hackers demand money.
 Difficult to decrypt the data.
9N e e r a j A a r o r a3/28/2016
 Russian hackers attacked the U.S. financial system in mid-
August, infiltrating and stealing data from JP Morgan Chase &
Co.
 Theft of sensitive data belonging to customer of JP Morgan.
 Attack was done using a malware.
 Misappropriate money converted to legal through layering.
10N e e r a j A a r o r a3/28/2016
Employee Computer Desktop Wiper Malware…
11N e e r a j A a r o r a3/28/2016
Sec. 43(f) denies or causes the denial of access to any person
authorized to access any computer
Sec. 43(g) provides any assistance to any person in any
unauthorized access
Sec. 43(h) charges the services availed of by a person to the
account of another person
Sec. 43(i) destroys, deletes or alters any information residing
in a computer resource
Sec. 43(j) steals, conceals, destroys or alters any computer
source code
12N e e r a j A a r o r a3/28/2016
Sec.66B
“Punishment for dishonestly receiving stolen computer
resource or communication device-
 whoever dishonestly received or
 retains any stolen computer resource or
 communication device knowing or having
reason to believe the same to be stolen
 computer resource or
 communication device,
Sec. 65 conceals, destroys or alters any computer
source code used when the computer source
code is required to be kept by law
13N e e r a j A a r o r a3/28/2016
Section 66C– Punishment for Identity Theft
“Whoever,
 fraudulently or dishonestly make use of
 the electronic signature, password or any
other unique identification feature of any other person,
Section 66D – Punishment for Cheating by Personation by Using
Computer Resource ; “Whoever,
 by means of any communication device or computer resource
 cheats by personation,
14N e e r a j A a r o r a3/28/2016
 captures, publishes or transmits
 the image of a private area of any
person without his or her consent,
 under circumstances violating the privacy
 “Private Areas” means the naked or undergarment clad
genitals, pubic area, buttocks or female breast”
 “Under circumstances violating privacy”
 One could disrobe in privacy
 One’s private area would not be visible to the public
15N e e r a j A a r o r a3/28/2016
 Team of doctors took photographs of the 20-year-old woman
undergoing Caesarian Operation.
 Through mobile phone and shared the pictures on WhatsApp.
 On complaint case, a case u/s Section 354 IPC, Section 66E &
Section 67 of IT Act.
 Three doctors and four paramedical staff in Kerala arrested.
16N e e r a j A a r o r a3/28/2016
 “Whoever publishes or transmits or causes to be
published or transmitted in the electronic form”
 any material which is lascivious or appeals to the prurient
interest or
 if its effect is such as to tend to deprave and corrupt persons
 who are likely, having regard to all relevant circumstances,
 to read, see or hear the matter contained or embodied in it
 Punishment for 3 yrs on first conviction and
subsequent 5 yrs.
18N e e r a j A a r o r a3/28/2016
 Accused married with the daughter of the complainant against
his will.
 Complainant took away his daughter who then was staying with
her father.
 Accused sent obscene SMS on the mobile used by his wife.
 Petition u/s 482 Cr.P.C. was filed.
 Contention of accused was, the SMS were sent to the wife and
not to the complainant.
 Mobile phone used by the daughter.
 Exchange of communication between the husband and wife and
therefore of a confidential nature.
19N e e r a j A a r o r a3/28/2016
 Bombay High Court held that Section 67 prohibits publishing of
information which is obscene in electronic form.
 Section even prohibits transmission of such information if it is
likely to be read by others. The court held that the SMSs were
obscene per se and some of them referred to the complainant.
20N e e r a j A a r o r a3/28/2016
Whoever –
 publishes or transmits or causes to be published or transmitted
in the electronic form any material.
 which contains sexually explicit act or conduct.
 shall be punished on first conviction with imprisonment upto 5
yrs & fine upto 10 lac and subsequent conviction upto 7 yrs &
fine upto 10 lac.”
 This Section covers "Sexually Explicit Content” transmitted
in electronic form.
21N e e r a j A a r o r a3/28/2016
 67B. Punishment for publishing or transmitting child
Pornography in electronic form- Whoever—
 publishes or transmits material depicting children engaged in
sexually explicit act
 creates text or digital images, collects, seeks, browses,
downloads, distributes material in any electronic form
depicting children in obscene or indecent or sexually explicit
manner; or
 cultivates, entices or induces children to online relationship on
sexually explicit act
 facilitates abusing children online, or records in any electronic
form pertaining to sexually explicit act with children,
22N e e r a j A a r o r a3/28/2016
Lt. Colonel arrested for surfing Child Pornography
 A serving Indian Army officer of the rank of Lt. Colonel has been
nabbed by the Mumbai Police .
 He was allegedly uploading, possessing & disseminating obscene
pictures of foreign children between the ages of 3 & 10 on the Internet.
 The German Federal Bureau spotted the photos on a child
pornography site and traced the pictures to India.
 The German agency alerted the Interpol which in turn passed the
information to CBI which in turned tipped the Mumbai Police.
 The Mumbai police has taken two hard drives from the Lt. Colonel’s
house as evidence against him.
23N e e r a j A a r o r a3/28/2016
Citibank Mphasis Call Center Fraud
 US $3,50,000 were embezzled from the
account for US customers.
 Data was managed by the Call Center Mphasis, Pune.
 Employee of the BPO misuse the information.
 The provision of the liability of the body corporate was
introduced.
24N e e r a j A a r o r a3/28/2016
 Section 43A –
 Where a body corporate possessing, dealing and handling any
sensitive personal data.
 Which it owns, control or operates
 Is negligent in implementing and maintaining reasonable security
practices and procedures
 Such a body corporate shall be liable to pay compensation.
 The Information Technology (Reasonable Security Practices &
Procedures & Sensitive Personal Data or Information), Rules 2011.
A body corporate means any company includes a firm, sole
proprietorship or other association of individual engages in
professional and commercial practices.
25N e e r a j A a r o r a3/28/2016
 WhatsApp
 Facebook
 Truecaller
 WeChat
26N e e r a j A a r o r a3/28/2016
Amar Singh Arun Jaitley
Sec. 72A  A person including an intermediary is held liable if
he discloses “personal information” which he
accessed while providing services under a
contract.
27N e e r a j A a r o r a3/28/2016
 Where the Central Government or a State Government or any of
its officer specially authorized by the Central Government or the
State Government, as the case may be,
o in this behalf may, if satisfied that it is necessary or expedient
so to do
o in the interest of the sovereignty or integrity of India,
o defence of India,
o security of the State,
o friendly relations with foreign States or
o public order or
28N e e r a j A a r o r a3/28/2016
Contd…
o for preventing incitement to the commission of any cognizable
offence relating to above or
o for investigation of any offence,
o it may to intercept, monitor or decrypt or cause to be
intercepted or monitored or decrypted any information
generated, transmitted, received or stored in any computer
resource
The Information Technology (Procedure &
Safeguards for interception, monitoring and
decryption of information) Rules, 2009.
29N e e r a j A a r o r a3/28/2016
 69A: Government gets power to issue directions for blocking for
public access of any information through any computer resource.
 Directions can be issued in the interest of:-
o Sovereignty & Integrity of India,
o Defence of India,
o Security of the State,
o Public Order
o Friendly Relations with Foreign States or
o Preventing Commission of Cognizable Offence Relating to
Above
The Information Technology (Procedures & Safeguards for
Blocking for access of information by Public) Rules, 2009.
30N e e r a j A a r o r a3/28/2016
(1) The Central Government may,
 to enhance cyber security and for identification, analysis and
prevention of intrusion or
 spread of computer contaminant in the country,
 by notification in the Official Gazette, authorise any agency of the
Government to monitor and collect traffic data or information
generated, transmitted, received or stored in any computer
resource.
The Information Technology (Procedures & Safeguards for monitoring
and collecting traffic data or information) Rules, 2009.
31N e e r a j A a r o r a3/28/2016
Section 70 – Protected System
(1) The appropriate Government may, by notification in the Official
Gazette, declare any computer resource which directly or
indirectly affects the facility of Critical Information
Infrastructure, to be a protected system.
(2) Unauthorised access or attempt to access is punishable.
(3) National Nodal Agency responsible for research and
development to protect the critical information structure.
32N e e r a j A a r o r a3/28/2016
Contd…
Liability of internet service provider(ISP Liability)–section
79
 The Section extends the immunity to the ISP from prosecutions
under other laws including IT Act, as the provisions starts with
the wordings, “Notwithstanding anything contained in
any law…”.
 The intermediary is not liable for third party information, data or
communication link hosted by him if –
 The intermediary function is limited to providing access to
communication system.
 The intermediary has not initiated the transmission, selected the
receiver of the transmission and interfered/modify the
transmission.
 The intermediary observes due diligence and guidelines of the
central government.
33N e e r a j A a r o r a3/28/2016
Contd...
Liability of Internet Service Provider
 The intermediary is only liable for third party information, data
or communication link hosted by him if –
 if the intermediary has conspired in the commission of the
unlawful act or
 if it has actual knowledge or the appropriate government has
notified it that any information, data residing in it is being used to
commit the unlawful act, and it fails to expeditiously remove on
that resource without vitiating the evidence in any manner
34N e e r a j A a r o r a3/28/2016
.
E-mails: nirajdp@gmail.com
© HAZEN LEGAL ASSOCIATES, 2015 All Rights Reserved

More Related Content

What's hot

Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
 
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...Arslan Khalid
 
Massachusetts Eye and Ear Infirmary HIPAA Violation
Massachusetts Eye and Ear Infirmary HIPAA  ViolationMassachusetts Eye and Ear Infirmary HIPAA  Violation
Massachusetts Eye and Ear Infirmary HIPAA Violationdata brackets
 
Landmark judgement on 498 a false dowry case
Landmark judgement on 498 a false dowry caseLandmark judgement on 498 a false dowry case
Landmark judgement on 498 a false dowry casegurpreet singh
 
Misuse of Section 498A of IPC
Misuse of Section 498A of IPCMisuse of Section 498A of IPC
Misuse of Section 498A of IPCMansi Agarwal
 
POLICE CITE FAILURE TO COMMUNICATE
POLICE CITE FAILURE TO COMMUNICATEPOLICE CITE FAILURE TO COMMUNICATE
POLICE CITE FAILURE TO COMMUNICATEluke1905
 
Online FIR System in KPK
Online FIR System in KPKOnline FIR System in KPK
Online FIR System in KPKAshir Iqbal
 
Strategic roadmap
Strategic roadmapStrategic roadmap
Strategic roadmapnicfs
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 
House rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryHouse rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryWorld Truth
 

What's hot (17)

Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...
 
2012 Annual Clery report
2012 Annual Clery report 2012 Annual Clery report
2012 Annual Clery report
 
Massachusetts Eye and Ear Infirmary HIPAA Violation
Massachusetts Eye and Ear Infirmary HIPAA  ViolationMassachusetts Eye and Ear Infirmary HIPAA  Violation
Massachusetts Eye and Ear Infirmary HIPAA Violation
 
Landmark judgement on 498 a false dowry case
Landmark judgement on 498 a false dowry caseLandmark judgement on 498 a false dowry case
Landmark judgement on 498 a false dowry case
 
Malware
MalwareMalware
Malware
 
Misuse of Section 498A of IPC
Misuse of Section 498A of IPCMisuse of Section 498A of IPC
Misuse of Section 498A of IPC
 
POLICE CITE FAILURE TO COMMUNICATE
POLICE CITE FAILURE TO COMMUNICATEPOLICE CITE FAILURE TO COMMUNICATE
POLICE CITE FAILURE TO COMMUNICATE
 
Online FIR System in KPK
Online FIR System in KPKOnline FIR System in KPK
Online FIR System in KPK
 
Strategic roadmap
Strategic roadmapStrategic roadmap
Strategic roadmap
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Crpc sec 156
Crpc sec 156Crpc sec 156
Crpc sec 156
 
Letter of response to NASA
Letter of response to NASALetter of response to NASA
Letter of response to NASA
 
cyber law
cyber law cyber law
cyber law
 
House rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryHouse rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcry
 
IPC sections | Indian Sarais Act 1887
IPC sections | Indian Sarais Act 1887IPC sections | Indian Sarais Act 1887
IPC sections | Indian Sarais Act 1887
 
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
 

Viewers also liked

My Project_Final
My Project_FinalMy Project_Final
My Project_FinalHemant Jog
 
Supreme Court Advocate on Record Association v. Union of India, 1993
Supreme Court Advocate on Record Association  v. Union of India, 1993Supreme Court Advocate on Record Association  v. Union of India, 1993
Supreme Court Advocate on Record Association v. Union of India, 1993Abhinandan Ray
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Civic sports
Civic sportsCivic sports
Civic sportsJack740
 
Sport rabbit
Sport rabbitSport rabbit
Sport rabbitJack740
 
Breakaway Service
Breakaway ServiceBreakaway Service
Breakaway Servicepck100
 
Visualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionVisualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionMhermano
 
سمینار آشنائی Ims
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims Meisam J Moghadam
 
Voicing our elasticity
Voicing our elasticity Voicing our elasticity
Voicing our elasticity Umar Basim
 
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDSoftware Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDOWASP Delhi
 

Viewers also liked (16)

My Project_Final
My Project_FinalMy Project_Final
My Project_Final
 
Supreme Court Advocate on Record Association v. Union of India, 1993
Supreme Court Advocate on Record Association  v. Union of India, 1993Supreme Court Advocate on Record Association  v. Union of India, 1993
Supreme Court Advocate on Record Association v. Union of India, 1993
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Iso 9001 2008~2015 changes
Iso 9001 2008~2015 changesIso 9001 2008~2015 changes
Iso 9001 2008~2015 changes
 
Civic sports
Civic sportsCivic sports
Civic sports
 
Gajendra_Resume1
Gajendra_Resume1Gajendra_Resume1
Gajendra_Resume1
 
Sport rabbit
Sport rabbitSport rabbit
Sport rabbit
 
Breakaway Service
Breakaway ServiceBreakaway Service
Breakaway Service
 
Visualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionVisualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical Reflection
 
سمینار آشنائی Ims
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims
 
Anchor fans
Anchor fansAnchor fans
Anchor fans
 
Voicing our elasticity
Voicing our elasticity Voicing our elasticity
Voicing our elasticity
 
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDSoftware Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
 

Similar to Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE

Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015Dejan Jasnič
 
Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015Dejan Jasnič
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRajshekar786
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 

Similar to Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Rakesh n cyber
Rakesh n cyberRakesh n cyber
Rakesh n cyber
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015
 
Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015Cyber Risk Conference, Ljubljana, November 2015
Cyber Risk Conference, Ljubljana, November 2015
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cuber crime and its investigation
Cuber crime and its investigationCuber crime and its investigation
Cuber crime and its investigation
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using TerraformOWASP Delhi
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash GoelOWASP Delhi
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraOWASP Delhi
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraOWASP Delhi
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraOWASP Delhi
 

More from OWASP Delhi (20)

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeover
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report Writing
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air Gap
 
UDP Hunter
UDP HunterUDP Hunter
UDP Hunter
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container Escapes
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using Terraform
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash Goel
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit Batra
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE

  • 1. By Neeraj Aarora Advocate-on-Record, Supreme Court CISSP, FCMA, CISA, CEH, CFCE
  • 2.  DDOs Attacks against Estonian Websites.  First Accessed other People's Computers through Zombie Applications.  Estonian Attack relied on vast Botnets to send Coordinated Crash-inducing Data to Web Servers.  Freezed complete infrastructure. 2N e e r a j A a r o r a3/28/2016
  • 3. Whoever , (1) with the intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in any section of the people.  one who causes denial of access to computer resources,  or has unauthorized access to a computer resource,  or introduces a virus, or containment  Effect to cause death, injury to person or damage/destruction of property, disruption of essential supplies. (2)unauthorized access to information, data restricted for security of State. 3N e e r a j A a r o r a3/28/2016
  • 4.  Very Effective, Size: 500 KiloByte.  Attacked in Three Phases.  it targets Microsoft Windows Machines and Networks.  Sought Out Siemens Step7 software (Windows-based used to Program Industrial Control Systems that Operate Equipment, such as Centrifuges).  Compromised Programmable Logic Controllers.  Spy on Industrial Systems and even Cause Fast-Spinning Centrifuges to Tear themselves apart.  Can Spread Stealthily Between Computers running Windows.  Can Spread through USB thumb Drive. 4N e e r a j A a r o r a3/28/2016
  • 5. Cyber Contravention Cyber Offences + 43, 43A Sec. 65 – 67, 72, 72A Sec 43 Adjudicating Officer Police/Court Sec 66 5N e e r a j A a r o r a3/28/2016
  • 6.  Unauthorized access –  If any person without permission of the owner or any other person who is the in charge of a computer, computer systems or computer network commits any violation in Section 43 (a) – (j).  Penalty and compensation –  Liable to pay damages by way of compensation to the tune of Rs. 5 Crores. 6N e e r a j A a r o r a3/28/2016
  • 7.  “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.”  Dishonestly or fraudulently as defined u/s 24/25 IPC  Cognizable & Bailable. 7N e e r a j A a r o r a3/28/2016
  • 8. Sec. 43(a) Unauthorized Access Sec. 43(b) downloads, copies or extracts any data Sec. 43 (c) introduces or causes to be introduced any computer contaminant or computer virus Sec. 43(d) damages or causes to be damaged any computer resource Sec. 43(e) disrupts or causes disruption of any computer, computer system or computer network 8N e e r a j A a r o r a3/28/2016
  • 9.  Mails along with pdf are being sent.  Virus, Cryptowall encrypts the hard drive.  Also encrypt the external or shared drives.  Hackers demand money.  Difficult to decrypt the data. 9N e e r a j A a r o r a3/28/2016
  • 10.  Russian hackers attacked the U.S. financial system in mid- August, infiltrating and stealing data from JP Morgan Chase & Co.  Theft of sensitive data belonging to customer of JP Morgan.  Attack was done using a malware.  Misappropriate money converted to legal through layering. 10N e e r a j A a r o r a3/28/2016
  • 11. Employee Computer Desktop Wiper Malware… 11N e e r a j A a r o r a3/28/2016
  • 12. Sec. 43(f) denies or causes the denial of access to any person authorized to access any computer Sec. 43(g) provides any assistance to any person in any unauthorized access Sec. 43(h) charges the services availed of by a person to the account of another person Sec. 43(i) destroys, deletes or alters any information residing in a computer resource Sec. 43(j) steals, conceals, destroys or alters any computer source code 12N e e r a j A a r o r a3/28/2016
  • 13. Sec.66B “Punishment for dishonestly receiving stolen computer resource or communication device-  whoever dishonestly received or  retains any stolen computer resource or  communication device knowing or having reason to believe the same to be stolen  computer resource or  communication device, Sec. 65 conceals, destroys or alters any computer source code used when the computer source code is required to be kept by law 13N e e r a j A a r o r a3/28/2016
  • 14. Section 66C– Punishment for Identity Theft “Whoever,  fraudulently or dishonestly make use of  the electronic signature, password or any other unique identification feature of any other person, Section 66D – Punishment for Cheating by Personation by Using Computer Resource ; “Whoever,  by means of any communication device or computer resource  cheats by personation, 14N e e r a j A a r o r a3/28/2016
  • 15.  captures, publishes or transmits  the image of a private area of any person without his or her consent,  under circumstances violating the privacy  “Private Areas” means the naked or undergarment clad genitals, pubic area, buttocks or female breast”  “Under circumstances violating privacy”  One could disrobe in privacy  One’s private area would not be visible to the public 15N e e r a j A a r o r a3/28/2016
  • 16.  Team of doctors took photographs of the 20-year-old woman undergoing Caesarian Operation.  Through mobile phone and shared the pictures on WhatsApp.  On complaint case, a case u/s Section 354 IPC, Section 66E & Section 67 of IT Act.  Three doctors and four paramedical staff in Kerala arrested. 16N e e r a j A a r o r a3/28/2016
  • 17.
  • 18.  “Whoever publishes or transmits or causes to be published or transmitted in the electronic form”  any material which is lascivious or appeals to the prurient interest or  if its effect is such as to tend to deprave and corrupt persons  who are likely, having regard to all relevant circumstances,  to read, see or hear the matter contained or embodied in it  Punishment for 3 yrs on first conviction and subsequent 5 yrs. 18N e e r a j A a r o r a3/28/2016
  • 19.  Accused married with the daughter of the complainant against his will.  Complainant took away his daughter who then was staying with her father.  Accused sent obscene SMS on the mobile used by his wife.  Petition u/s 482 Cr.P.C. was filed.  Contention of accused was, the SMS were sent to the wife and not to the complainant.  Mobile phone used by the daughter.  Exchange of communication between the husband and wife and therefore of a confidential nature. 19N e e r a j A a r o r a3/28/2016
  • 20.  Bombay High Court held that Section 67 prohibits publishing of information which is obscene in electronic form.  Section even prohibits transmission of such information if it is likely to be read by others. The court held that the SMSs were obscene per se and some of them referred to the complainant. 20N e e r a j A a r o r a3/28/2016
  • 21. Whoever –  publishes or transmits or causes to be published or transmitted in the electronic form any material.  which contains sexually explicit act or conduct.  shall be punished on first conviction with imprisonment upto 5 yrs & fine upto 10 lac and subsequent conviction upto 7 yrs & fine upto 10 lac.”  This Section covers "Sexually Explicit Content” transmitted in electronic form. 21N e e r a j A a r o r a3/28/2016
  • 22.  67B. Punishment for publishing or transmitting child Pornography in electronic form- Whoever—  publishes or transmits material depicting children engaged in sexually explicit act  creates text or digital images, collects, seeks, browses, downloads, distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner; or  cultivates, entices or induces children to online relationship on sexually explicit act  facilitates abusing children online, or records in any electronic form pertaining to sexually explicit act with children, 22N e e r a j A a r o r a3/28/2016
  • 23. Lt. Colonel arrested for surfing Child Pornography  A serving Indian Army officer of the rank of Lt. Colonel has been nabbed by the Mumbai Police .  He was allegedly uploading, possessing & disseminating obscene pictures of foreign children between the ages of 3 & 10 on the Internet.  The German Federal Bureau spotted the photos on a child pornography site and traced the pictures to India.  The German agency alerted the Interpol which in turn passed the information to CBI which in turned tipped the Mumbai Police.  The Mumbai police has taken two hard drives from the Lt. Colonel’s house as evidence against him. 23N e e r a j A a r o r a3/28/2016
  • 24. Citibank Mphasis Call Center Fraud  US $3,50,000 were embezzled from the account for US customers.  Data was managed by the Call Center Mphasis, Pune.  Employee of the BPO misuse the information.  The provision of the liability of the body corporate was introduced. 24N e e r a j A a r o r a3/28/2016
  • 25.  Section 43A –  Where a body corporate possessing, dealing and handling any sensitive personal data.  Which it owns, control or operates  Is negligent in implementing and maintaining reasonable security practices and procedures  Such a body corporate shall be liable to pay compensation.  The Information Technology (Reasonable Security Practices & Procedures & Sensitive Personal Data or Information), Rules 2011. A body corporate means any company includes a firm, sole proprietorship or other association of individual engages in professional and commercial practices. 25N e e r a j A a r o r a3/28/2016
  • 26.  WhatsApp  Facebook  Truecaller  WeChat 26N e e r a j A a r o r a3/28/2016
  • 27. Amar Singh Arun Jaitley Sec. 72A  A person including an intermediary is held liable if he discloses “personal information” which he accessed while providing services under a contract. 27N e e r a j A a r o r a3/28/2016
  • 28.  Where the Central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, o in this behalf may, if satisfied that it is necessary or expedient so to do o in the interest of the sovereignty or integrity of India, o defence of India, o security of the State, o friendly relations with foreign States or o public order or 28N e e r a j A a r o r a3/28/2016
  • 29. Contd… o for preventing incitement to the commission of any cognizable offence relating to above or o for investigation of any offence, o it may to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource The Information Technology (Procedure & Safeguards for interception, monitoring and decryption of information) Rules, 2009. 29N e e r a j A a r o r a3/28/2016
  • 30.  69A: Government gets power to issue directions for blocking for public access of any information through any computer resource.  Directions can be issued in the interest of:- o Sovereignty & Integrity of India, o Defence of India, o Security of the State, o Public Order o Friendly Relations with Foreign States or o Preventing Commission of Cognizable Offence Relating to Above The Information Technology (Procedures & Safeguards for Blocking for access of information by Public) Rules, 2009. 30N e e r a j A a r o r a3/28/2016
  • 31. (1) The Central Government may,  to enhance cyber security and for identification, analysis and prevention of intrusion or  spread of computer contaminant in the country,  by notification in the Official Gazette, authorise any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource. The Information Technology (Procedures & Safeguards for monitoring and collecting traffic data or information) Rules, 2009. 31N e e r a j A a r o r a3/28/2016
  • 32. Section 70 – Protected System (1) The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system. (2) Unauthorised access or attempt to access is punishable. (3) National Nodal Agency responsible for research and development to protect the critical information structure. 32N e e r a j A a r o r a3/28/2016
  • 33. Contd… Liability of internet service provider(ISP Liability)–section 79  The Section extends the immunity to the ISP from prosecutions under other laws including IT Act, as the provisions starts with the wordings, “Notwithstanding anything contained in any law…”.  The intermediary is not liable for third party information, data or communication link hosted by him if –  The intermediary function is limited to providing access to communication system.  The intermediary has not initiated the transmission, selected the receiver of the transmission and interfered/modify the transmission.  The intermediary observes due diligence and guidelines of the central government. 33N e e r a j A a r o r a3/28/2016
  • 34. Contd... Liability of Internet Service Provider  The intermediary is only liable for third party information, data or communication link hosted by him if –  if the intermediary has conspired in the commission of the unlawful act or  if it has actual knowledge or the appropriate government has notified it that any information, data residing in it is being used to commit the unlawful act, and it fails to expeditiously remove on that resource without vitiating the evidence in any manner 34N e e r a j A a r o r a3/28/2016
  • 35. .
  • 36. E-mails: nirajdp@gmail.com © HAZEN LEGAL ASSOCIATES, 2015 All Rights Reserved

Editor's Notes

  1. Unauthorized Access 43 (a) Access or secures access to such computer, computer system or computer network or computer resource” Copying information 43 (b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium. Computer viruses 43 (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network. Damaging Computer 43 (d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network Disrupting Computer Network 43 (e) disrupts or causes disruption of any computer, computer system or computer network
  2. Denial of Access 43 (f) denies or causes the denial of access to any person authorized to access any computer, computer system or computer network by any means Facilitating Access 43 (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder” Computer Fraud 43 (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network.” Hacking 43 (i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means. Computer Source code Theft 43 (j) steal, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage.
  3. Section 65-Tampering with Source Code conceals, destroys or alters any computer source code used when the computer source code is required to be kept or maintained by law for the time being in force Section 66A – Offensive Messages Any person who sends, by means of a computer resource or a communication device,— (a) any information that is grossly offensive or has menacing character; or (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,