SlideShare a Scribd company logo
1 of 11
Download to read offline
Cyber law
Online Assignment
Divya.A.S
SEM 2 COMMERCE
OPTION
SNGK B.ED COLLEGE
POYTHENCODE
INTRODUCTION
"Cyber" is a prefix used to describe a person, thing, or idea as part of the computer
and information age. Taken from kybernetes, greek word for "steersman" or "governor," it was
first used in cybernetics, a word coined by norbert wiener and his colleagues. The virtual world
of internet is known as cyberspace and the laws governing this area are known as cyber laws
and all the netizens of this space come under the ambit of these laws as it carries a kind of
universal jurisdiction. Cyber law can also be described as that branch of law that deals with
legal issues related to use of inter-networked information technology. In short, cyber law is the
law governing computers and the internet.
The growth of electronic commerce has propelled the need for vibrant and
effective regulatory mechanisms which would further strengthen the legal infrastructure, so
crucial to the success of electronic commerce. All these regulatory mechanisms and legal
infrastructures come within the domain of cyber law.
Cyber law is important because it touches almost all aspects of transactions and
activities on and involving the internet, world wide web and cyberspace. Every action and
reaction in cyberspace has some legal and cyber legal perspectives.
Overview Cyber Law - IT Act 2000
Information Technology Act - 2000. An Act to provide legal recognition for transactions
carried out by means of electronic data interchange and other means of electronic communication,
commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based
methods of communication and storage of information, to facilitate electronic filing of documents with
the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872,
the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters
connected therewith or incidental thereto.
IT Act - 2000, India's first Cyber law makes punishable cyber crimes like hacking, damage to
computer source code, publishing of information, which is obscene in the electronic form, breach of
confidentiality and privacy, and publication of digital signature false in certain particulars.
Information Technology Act – 2000 , An Act to provide legal recognition for
transactions carried out by means of electronic data interchange and other means of electronic
communication, commonly referred to as "electronic commerce", which involve the use of alternatives
to paper-based methods of communication and storage of information, to facilitate electronic filing of
documents with the Government agencies and further to amend the Indian Penal Code, the Indian
Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934
and for matters connected therewith or incidental thereto.
IT Act - 2000, India's first Cyber law makes punishable cyber crimes like hacking,
damage to computer source code, publishing of information, which is obscene in the electronic form,
breach of confidentiality and privacy, and publication of digital signature false in certain particulars.
IT Act contains 94 sections in 13 chapters. Sections 65 to 74 in chapter 11 deals with
offences published under this act
Section 65 Tampering with computer source documents
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy or alter any computer source code used for a
computer, computer programme, computer system or computer network, when the computer
source code is required to be kept or maintained by law for the time being in force, shall be
punishable with imprisonment up to three years, or with fine which may extend up to two lakhs
rupees, or with both.
Sec 66 hacking with computer system
(1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing in a
computer resource or diminishes its value or utility or affects it injuriously by any means,
commits hack:
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine, resource. which may extend up to two lakhs rupees, or with both punishable under this
act
Sec.67: Publishing of information, which is obscene in electronic form
Whoever publishes or transmits or causes to be published in the electronic
form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to
tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to
read, see or hear the matter contained or embodied in it, shall be punished on first conviction with
imprisonment of either description for a term which may extend to five years and with fine which
may extend to one lakhs system. rupees and in the event of a second or subsequent conviction with
imprisonment of either description for a term which may extend to ten years and also with fine which
may extend to two lakhs rupees.
Sec.68: Power of Controller to give directions.
(1) The Controller may, by order, direct a Certifying Authority or any employee of such Authority to
take such measures or cease carrying on such activities as specified in the order if those are necessary
to ensure compliance with the provisions of this Act, rules or any regulations made there under.
(2) Any person who fails to comply with any order under sub-section (1) shall be guilty of an offence
and shall be liable on conviction to imprisonment for a term not exceeding three years or to a Fine not
exceeding two lakh rupees or to both.
Sec.69: Directions of Controller to a subscriber to extend facilities to decrypt information.
(1) If the Controller is satisfied that Sea 66. Hacking with computer system. it is necessary or expedient so to do
in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign
Stales or public order or for preventing incitement to the commission of any cognizable offence, for reasons to
be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted
through any computer
(2) The subscriber or any person in-charge of the computer resource shall, when called upon by any agency
which has been directed under sub section (1), extend all facilities and technical assistance to decrypt the
information.
(3) The subscriber or any person who fails to assist the agency referred to in sub-section (2) shall be punished
with an imprisonment for a term which may extend to seven years.
Sec.70: Protected system
(1) The appropriate Government may, by notification in the Official Gazette, declare that any computer,
computer system or computer network to be a protected
(2) The appropriate Government may, by order in writing, authorize the persons who are authorized to access
protected systems notified under sub-section (1).
(3) Any person who secures access or attempts to secure access to a protected system in contravention of the
provisions of this section shall be punished with imprisonment of either description for a ton, which may extend
to ten years and shall also be liable to fine.
Sec.71: Penalty for misrepresentation.
Whose makes any misrepresentation to, or surceases any material fact from, the
Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case
may be. Shall be punished with imprisonment for both. a term, which may extend to two years, or with
fine, which may extend to one lakhs rupees, or with both.
Sec.72: Penalty for breach of confidentiality and privacy.
Save as otherwise provided in this Act or any other law for the time being in force, any
person who, in pursuance of any of the powers conferred under this Act, rules or regulations made there
under, has secured access to any electronic record, book, register, correspondence, information, document
or other material without the consent of the person concerned discloses such electronic record, book,
register, correspondence, information, document or other material to any other person shall be punished
with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh
rupees, or with both.
Sec.73: Penalty for publishing Digital Signature Certificate false in certain particulars.
(1) No person shall publish a Digital Signature Certificate or otherwise make it available to any
other person with the knowledge that- (a) The Certifying Authority listed in the certificate has not
issued it; or (b) the subscriber listed in the certificate has not accepted it; or(c) the certificate has
been revoked or suspended, unless such publication is for the purpose of verifying a digital
signature created prior to such suspension or revocation.
(2) Any person who contravenes the provisions of sub-section (1) shall be punished with
imprisonment for a term, which may extend to two years, or with fine, which may extend to one
lakhs rupees, or with both.
Sec.74: Publication for fraudulent purpose
Whoever knowingly creates, publishes or otherwise makes available a Digital Signature Certificate
for any fraudulent or unlawful shall be punished with imprisonment for a term which may extend
to two years, or with fine, which may extend to one lakhs rupees, or with
INFORMATION TECHNOLOGY ACT ,2008
The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to
India's Information Technology Act (ITA-2000) The IT Amendment Act was passed by the Indian
Parliament in October 2008 and came into force a year later. The Act is administered by the Indian
Computer Emergency Response Team (CERT-In) The original Act was developed to promote the IT
industry, regulate e-commerce, facilitate e governance and prevent cybercrime. The Act also sought to
foster security practices within India that would serve the country in a global context The Amendment
was created to address issues that the original bill failed to cover and to accommodate further
development of IT and related security concerns since the original law was passed.
Changes in the Amendment include: redefining terms such as "communication device" to reflect current
use; validating electronic signatures and contracts; making the owner of a given IP address responsible
for content accessed or distributed through it; and making corporations responsible for implementing
effective data security practices and liable for breaches.
The Amendment has been criticized for decreasing the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of individuals. Section 69, for example, authorizes the
Indian government to intercept, monitor decrypt and block data at its discretion.
cyberlaw

More Related Content

Similar to cyberlaw

Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000ShashankBajpai24
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law casesSnavi
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdfnithyam40
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Ashish Karan
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 

Similar to cyberlaw (20)

It act 2000
It act 2000It act 2000
It act 2000
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber
CyberCyber
Cyber
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Indian cyber law & acts
Indian cyber law & actsIndian cyber law & acts
Indian cyber law & acts
 
Indian cyber law
Indian cyber lawIndian cyber law
Indian cyber law
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from divyaanjali8

Chapter 12 consumer protection .pdf
Chapter 12 consumer protection .pdfChapter 12 consumer protection .pdf
Chapter 12 consumer protection .pdfdivyaanjali8
 
phase 2 LP 1-11.pdf
phase 2 LP 1-11.pdfphase 2 LP 1-11.pdf
phase 2 LP 1-11.pdfdivyaanjali8
 
Loss of Arable soil pdf.pdf
Loss of Arable soil pdf.pdfLoss of Arable soil pdf.pdf
Loss of Arable soil pdf.pdfdivyaanjali8
 
Private,public, and Global enterprises
Private,public, and Global enterprises   Private,public, and Global enterprises
Private,public, and Global enterprises divyaanjali8
 
methodology seminar2.pdf
methodology seminar2.pdfmethodology seminar2.pdf
methodology seminar2.pdfdivyaanjali8
 
Instructional aids PPT.pdf
Instructional aids PPT.pdfInstructional aids PPT.pdf
Instructional aids PPT.pdfdivyaanjali8
 

More from divyaanjali8 (9)

Chapter 12 consumer protection .pdf
Chapter 12 consumer protection .pdfChapter 12 consumer protection .pdf
Chapter 12 consumer protection .pdf
 
phase 2 LP 1-11.pdf
phase 2 LP 1-11.pdfphase 2 LP 1-11.pdf
phase 2 LP 1-11.pdf
 
Loss of Arable soil pdf.pdf
Loss of Arable soil pdf.pdfLoss of Arable soil pdf.pdf
Loss of Arable soil pdf.pdf
 
LP 15-35.pdf
LP 15-35.pdfLP 15-35.pdf
LP 15-35.pdf
 
Private,public, and Global enterprises
Private,public, and Global enterprises   Private,public, and Global enterprises
Private,public, and Global enterprises
 
practicum .pdf
practicum .pdfpracticum .pdf
practicum .pdf
 
methodology seminar2.pdf
methodology seminar2.pdfmethodology seminar2.pdf
methodology seminar2.pdf
 
digital album.pdf
digital album.pdfdigital album.pdf
digital album.pdf
 
Instructional aids PPT.pdf
Instructional aids PPT.pdfInstructional aids PPT.pdf
Instructional aids PPT.pdf
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 

cyberlaw

  • 1. Cyber law Online Assignment Divya.A.S SEM 2 COMMERCE OPTION SNGK B.ED COLLEGE POYTHENCODE
  • 2. INTRODUCTION "Cyber" is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, greek word for "steersman" or "governor," it was first used in cybernetics, a word coined by norbert wiener and his colleagues. The virtual world of internet is known as cyberspace and the laws governing this area are known as cyber laws and all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction. Cyber law can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. In short, cyber law is the law governing computers and the internet. The growth of electronic commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of electronic commerce. All these regulatory mechanisms and legal infrastructures come within the domain of cyber law. Cyber law is important because it touches almost all aspects of transactions and activities on and involving the internet, world wide web and cyberspace. Every action and reaction in cyberspace has some legal and cyber legal perspectives.
  • 3. Overview Cyber Law - IT Act 2000 Information Technology Act - 2000. An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. IT Act - 2000, India's first Cyber law makes punishable cyber crimes like hacking, damage to computer source code, publishing of information, which is obscene in the electronic form, breach of confidentiality and privacy, and publication of digital signature false in certain particulars.
  • 4. Information Technology Act – 2000 , An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. IT Act - 2000, India's first Cyber law makes punishable cyber crimes like hacking, damage to computer source code, publishing of information, which is obscene in the electronic form, breach of confidentiality and privacy, and publication of digital signature false in certain particulars. IT Act contains 94 sections in 13 chapters. Sections 65 to 74 in chapter 11 deals with offences published under this act
  • 5. Section 65 Tampering with computer source documents Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakhs rupees, or with both. Sec 66 hacking with computer system (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack: (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine, resource. which may extend up to two lakhs rupees, or with both punishable under this act
  • 6. Sec.67: Publishing of information, which is obscene in electronic form Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakhs system. rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakhs rupees. Sec.68: Power of Controller to give directions. (1) The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made there under. (2) Any person who fails to comply with any order under sub-section (1) shall be guilty of an offence and shall be liable on conviction to imprisonment for a term not exceeding three years or to a Fine not exceeding two lakh rupees or to both.
  • 7. Sec.69: Directions of Controller to a subscriber to extend facilities to decrypt information. (1) If the Controller is satisfied that Sea 66. Hacking with computer system. it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign Stales or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer (2) The subscriber or any person in-charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities and technical assistance to decrypt the information. (3) The subscriber or any person who fails to assist the agency referred to in sub-section (2) shall be punished with an imprisonment for a term which may extend to seven years. Sec.70: Protected system (1) The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected (2) The appropriate Government may, by order in writing, authorize the persons who are authorized to access protected systems notified under sub-section (1). (3) Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a ton, which may extend to ten years and shall also be liable to fine.
  • 8. Sec.71: Penalty for misrepresentation. Whose makes any misrepresentation to, or surceases any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case may be. Shall be punished with imprisonment for both. a term, which may extend to two years, or with fine, which may extend to one lakhs rupees, or with both. Sec.72: Penalty for breach of confidentiality and privacy. Save as otherwise provided in this Act or any other law for the time being in force, any person who, in pursuance of any of the powers conferred under this Act, rules or regulations made there under, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 9. Sec.73: Penalty for publishing Digital Signature Certificate false in certain particulars. (1) No person shall publish a Digital Signature Certificate or otherwise make it available to any other person with the knowledge that- (a) The Certifying Authority listed in the certificate has not issued it; or (b) the subscriber listed in the certificate has not accepted it; or(c) the certificate has been revoked or suspended, unless such publication is for the purpose of verifying a digital signature created prior to such suspension or revocation. (2) Any person who contravenes the provisions of sub-section (1) shall be punished with imprisonment for a term, which may extend to two years, or with fine, which may extend to one lakhs rupees, or with both. Sec.74: Publication for fraudulent purpose Whoever knowingly creates, publishes or otherwise makes available a Digital Signature Certificate for any fraudulent or unlawful shall be punished with imprisonment for a term which may extend to two years, or with fine, which may extend to one lakhs rupees, or with
  • 10. INFORMATION TECHNOLOGY ACT ,2008 The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000) The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. The Act is administered by the Indian Computer Emergency Response Team (CERT-In) The original Act was developed to promote the IT industry, regulate e-commerce, facilitate e governance and prevent cybercrime. The Act also sought to foster security practices within India that would serve the country in a global context The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed. Changes in the Amendment include: redefining terms such as "communication device" to reflect current use; validating electronic signatures and contracts; making the owner of a given IP address responsible for content accessed or distributed through it; and making corporations responsible for implementing effective data security practices and liable for breaches. The Amendment has been criticized for decreasing the penalties for some cybercrimes and for lacking sufficient safeguards to protect the civil rights of individuals. Section 69, for example, authorizes the Indian government to intercept, monitor decrypt and block data at its discretion.