Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber law

2,730 views

Published on

Published in: Education, Technology, Business
  • Be the first to comment

Cyber law

  1. 1. Business Law
  2. 2. Contents <ul><li>Introduction </li></ul><ul><li>Digital Signatures & Electronic Signatures </li></ul><ul><li>Electronic Governance </li></ul><ul><li>Electronic Records </li></ul><ul><li>Controller & Certifying Authorities </li></ul><ul><li>Adjudication,Penalities & Compensation </li></ul><ul><li>Case Study </li></ul>
  3. 3. Introduction <ul><li>Electronic Commerce </li></ul><ul><li>Information Technology Act , 2000 </li></ul><ul><li>as amended by </li></ul><ul><li>The Information Technology(Amendment) Act, 2008 with effect from 27/10/2009 </li></ul><ul><li>Objectives of the Act </li></ul><ul><li>Provision of Act </li></ul>
  4. 4. Digital Signatures <ul><li>Authentication of electronic record shall be effected by the use of asymmetric crypto system and hash function which envelope and transfer the initial electronic record to another (Sec.2(1)& Sec.3(1)) </li></ul><ul><li>Manners of Authentication </li></ul><ul><li>Verification of Digital signatures </li></ul><ul><li>Generation of Digital Signatures Certificate </li></ul><ul><li>Revocation of Digital Signatures Certificate </li></ul><ul><li>Suspension of Digital Signatures Certificate </li></ul>
  5. 5. Electronic Signatures <ul><li>Authentication of electronic record by a subscriber by means of electronic technique specified in the second schedule (sec.2(1)) </li></ul><ul><li>Subscriber </li></ul><ul><li>Duties of Subscriber </li></ul><ul><ul><ul><ul><ul><li>Generating key pair </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Acceptance of Digital Signature Certificate </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Control of private Key </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Extend Facilities to decrypt information </li></ul></ul></ul></ul></ul>
  6. 6. Electronic Governance <ul><li>Act for Legal recognition of Electronic Records </li></ul><ul><li>Electronic Form </li></ul><ul><li>Electronic Form evidence </li></ul><ul><li>Access </li></ul><ul><li>Computer & Network </li></ul><ul><li>Verification of Electronic Records </li></ul><ul><li>Authentication of Electronic Records </li></ul><ul><li>Use of Electronic Records </li></ul>
  7. 7. Electronic Record <ul><li>Data, Record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche(Sec.2(1)) </li></ul><ul><li>Originator </li></ul><ul><li>Intermediary </li></ul><ul><li>Liability of Intermediary </li></ul><ul><li>When Intermediary not Liable? </li></ul><ul><li>Indian Computer Emergency Response Team </li></ul>
  8. 8. Controller <ul><li>Appointment of Controller </li></ul><ul><li>Functions of Controller </li></ul><ul><li>Powers of Controller </li></ul><ul><ul><ul><ul><ul><li>To delegate </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>To Investigate contraventions </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>To give directions </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Access to Computers and date </li></ul></ul></ul></ul></ul>
  9. 9. Certifying Authority <ul><li>Definition </li></ul><ul><li>Obligations & Duties </li></ul><ul><ul><ul><ul><ul><li>Follow Procedures </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Cross certification </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Security guidelines </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Compliances by employees </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Disclosures </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Confidential Information </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Audit </li></ul></ul></ul></ul></ul>
  10. 10. Adjudication, Penalties& Compensation <ul><li>Power to Adjudicate </li></ul><ul><li>Power to Investigate Offences </li></ul><ul><li>Penalty & Compensation for damage to computer </li></ul><ul><li>Penalty for failure to furnish information, return </li></ul><ul><li>Penalty for securing access to a protected system </li></ul><ul><li>Punishment for sending offensive messages </li></ul><ul><li>Punishment for identifying theft </li></ul><ul><li>Punishment for cheating by Personation </li></ul><ul><li>Punishment for violation of privacy </li></ul><ul><li>Punishment for cyber terrorism </li></ul><ul><li>Penalty for breach of confidentiality & privacy </li></ul>
  11. 11. Case Study <ul><li>Parliament Attack Case </li></ul><ul><li>Analyzing & Retrieving information from laptops of terrorists </li></ul><ul><li>Laptops send to Computer forensics division </li></ul><ul><li>Contains information about terrorists motive </li></ul><ul><li>Retrieved the details </li></ul><ul><li>Suitable punishments were given according to the law </li></ul>
  12. 12. <ul><li>Questions </li></ul>

×