SlideShare a Scribd company logo

Cyber law

brief explaination about cyber law

1 of 13
Download to read offline
By :
Vishali Pandita
MBA (College Roll No- 14060)
Guru Nanak Institutes,Mullana Ambala
CYBERLAW
 Cyber law is a much newer phenomenon having emerged
much after the onset of internet . It is a generic term which
refers to all the legal and regulatory aspects of internet and the
www.
 So it is the part of the overall legal system that deals with the
internet,cyberspace and their respective legal issues.
 In other words you can say Cyber law is the law governing
cyber space
And cyber space includes computers/w, data storage
devices,internet websites,emails,and even electronic devices
such as cell phones, ATM machines etc.
Generally cyber law has been referred to “ law of
the internet”.
CYBERLAWSININDIA
• In May 2000,both the houses of the Indian
Parliament passed the Information
Technology Bill. The bill received the assent of
the president in August 2000 and came to be
known as the Information Technology
Act,2000.
• Cyber laws are contained in the IT ACT 2000.
ITACT2000
IT ACT 2000,has 13 chapters,94 sections and 4 schedules
• First 14 sections deals with some legal aspects
concerning digital signatures
• Further other sections deals with certifying authorities
who are licensed to issue digital signatures.
• Sections 43 to 47 provide for penalties and
compensation.
• Section 48 to 64 deals with Tribunals a appeal to high
court.
• Section 65 to 79 of the act deals with offences.
• Section 80 to 94 deals with miscellaneous of the act.
Cyber law
“Digital signature” means authentication of any
electronic record by a subscriber by means of an
electronic method or procedure in accordance with the
provisions of Section 3.
It consist of public key and private key.
Private key is allocated to a individual which
enables the user to fix a digital signature.
Public key is available to all who want to check
authentication of records.

Recommended

IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 

More Related Content

What's hot

What's hot (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
It act 2000
It act 2000It act 2000
It act 2000
 

Viewers also liked

Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Quincy Kiptoo
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Understanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesUnderstanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesPavan Kumar Vijay
 
Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )Gurparvesh kaur
 
Importance of Business Law for MBA Students
Importance of Business Law for MBA StudentsImportance of Business Law for MBA Students
Importance of Business Law for MBA StudentsProf. (Dr.) Tabrez Ahmad
 
Shares and its types
Shares and its typesShares and its types
Shares and its typesVishnu NK
 
Companies Act 1956
Companies Act 1956Companies Act 1956
Companies Act 1956wizkidrx
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection ActAtif Ghayas
 

Viewers also liked (16)

Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2
 
Different kinds of conscience
Different kinds of conscienceDifferent kinds of conscience
Different kinds of conscience
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
borrowing powers
borrowing powersborrowing powers
borrowing powers
 
Understanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesUnderstanding Preferential Allotment of Securities
Understanding Preferential Allotment of Securities
 
Borrowing powers
Borrowing powersBorrowing powers
Borrowing powers
 
Oppression and Management
Oppression and ManagementOppression and Management
Oppression and Management
 
Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )
 
Importance of Business Law for MBA Students
Importance of Business Law for MBA StudentsImportance of Business Law for MBA Students
Importance of Business Law for MBA Students
 
Company law
Company lawCompany law
Company law
 
Business law slides
Business law slidesBusiness law slides
Business law slides
 
Shares and its types
Shares and its typesShares and its types
Shares and its types
 
Companies act 1956-ppt
Companies act 1956-pptCompanies act 1956-ppt
Companies act 1956-ppt
 
Companies Act 1956
Companies Act 1956Companies Act 1956
Companies Act 1956
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
 
Sales of goods act
Sales of goods actSales of goods act
Sales of goods act
 

Similar to Cyber law

India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03 ATHULYARAJDS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 

Similar to Cyber law (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
It act 2000
It act 2000It act 2000
It act 2000
 

Recently uploaded

spring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdfspring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdfKonstantina Koutsodimou
 
DISCOURSE: TEXT AS CONNECTED DISCOURSE
DISCOURSE:   TEXT AS CONNECTED DISCOURSEDISCOURSE:   TEXT AS CONNECTED DISCOURSE
DISCOURSE: TEXT AS CONNECTED DISCOURSEMYDA ANGELICA SUAN
 
11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdfAynouraHamidova
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024avesmalik2
 
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTSA TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTSDr.M.Geethavani
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...Nguyen Thanh Tu Collection
 
Nzinga Kika - The story of the queen
Nzinga Kika    -  The story of the queenNzinga Kika    -  The story of the queen
Nzinga Kika - The story of the queenDeanAmory1
 
Odontogenesis and its related anomiles.pptx
Odontogenesis and its related anomiles.pptxOdontogenesis and its related anomiles.pptx
Odontogenesis and its related anomiles.pptxMennat Allah Alkaram
 
Creative, Technical, and Academic Writing
Creative, Technical, and Academic WritingCreative, Technical, and Academic Writing
Creative, Technical, and Academic WritingMYDA ANGELICA SUAN
 
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptxBBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptxProf. Kanchan Kumari
 
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdfAynouraHamidova
 
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Katherine Villaluna
 
A LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdf
A LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdfA LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdf
A LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdfDr.M.Geethavani
 
Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Sue Beckingham
 
Overview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdfOverview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdfChristalin Nelson
 
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in GhanaDecision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in GhanaPrince Armah, PhD
 

Recently uploaded (20)

spring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdfspring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdf
 
DISCOURSE: TEXT AS CONNECTED DISCOURSE
DISCOURSE:   TEXT AS CONNECTED DISCOURSEDISCOURSE:   TEXT AS CONNECTED DISCOURSE
DISCOURSE: TEXT AS CONNECTED DISCOURSE
 
11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 10-2023-Aynura-Hamidova.pdf
 
first section physiology laboratory.pptx
first section physiology laboratory.pptxfirst section physiology laboratory.pptx
first section physiology laboratory.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
 
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTSA TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
 
Nzinga Kika - The story of the queen
Nzinga Kika    -  The story of the queenNzinga Kika    -  The story of the queen
Nzinga Kika - The story of the queen
 
Odontogenesis and its related anomiles.pptx
Odontogenesis and its related anomiles.pptxOdontogenesis and its related anomiles.pptx
Odontogenesis and its related anomiles.pptx
 
Creative, Technical, and Academic Writing
Creative, Technical, and Academic WritingCreative, Technical, and Academic Writing
Creative, Technical, and Academic Writing
 
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptxBBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
 
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
 
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
 
A LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdf
A LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdfA LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdf
A LABORATORY MANUAL FOR ORGANIC CHEMISTRY.pdf
 
Lipids as Biopolymer
Lipids as Biopolymer Lipids as Biopolymer
Lipids as Biopolymer
 
Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...
 
Overview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdfOverview of Databases and Data Modelling-1.pdf
Overview of Databases and Data Modelling-1.pdf
 
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in GhanaDecision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
 

Cyber law

  • 1. By : Vishali Pandita MBA (College Roll No- 14060) Guru Nanak Institutes,Mullana Ambala
  • 2. CYBERLAW  Cyber law is a much newer phenomenon having emerged much after the onset of internet . It is a generic term which refers to all the legal and regulatory aspects of internet and the www.  So it is the part of the overall legal system that deals with the internet,cyberspace and their respective legal issues.  In other words you can say Cyber law is the law governing cyber space And cyber space includes computers/w, data storage devices,internet websites,emails,and even electronic devices such as cell phones, ATM machines etc. Generally cyber law has been referred to “ law of the internet”.
  • 3. CYBERLAWSININDIA • In May 2000,both the houses of the Indian Parliament passed the Information Technology Bill. The bill received the assent of the president in August 2000 and came to be known as the Information Technology Act,2000. • Cyber laws are contained in the IT ACT 2000.
  • 4. ITACT2000 IT ACT 2000,has 13 chapters,94 sections and 4 schedules • First 14 sections deals with some legal aspects concerning digital signatures • Further other sections deals with certifying authorities who are licensed to issue digital signatures. • Sections 43 to 47 provide for penalties and compensation. • Section 48 to 64 deals with Tribunals a appeal to high court. • Section 65 to 79 of the act deals with offences. • Section 80 to 94 deals with miscellaneous of the act.
  • 6. “Digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of Section 3. It consist of public key and private key. Private key is allocated to a individual which enables the user to fix a digital signature. Public key is available to all who want to check authentication of records.
  • 7. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crimes are unlawful acts where computer is used either as a tool :or a target :or both. It can be categories as :– 1. Cyber crime against persons 2. Cyber crime against property 3. Cyber crime against government
  • 8. Cyber law covers the intellectual property laws that relate to cyber space and its constituents . This includes: Copyright law in relation to computer software ,computer source code etc. Trademark law in relation to domain names. Semiconductor law ,which relates to the protection of semiconductor design and layouts. Patent law in relation to computer hardware and software.
  • 9. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as: banks, hospitals , email service providers etc. Many nations have enacted legislation relating to data protection and privacy within their jurisdictions. These laws would probably play a vital role, as the dependence on insecure networks such as the internet grows further.
  • 10. AhmadabadBlastCase 5 minutes before the blast an e-mail was sent to national TV Channels warning about blasts in Ahmedabad.The e-mail was traced to Kenneth Haywood's computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet Network.Haywoods laptop and computer was then sent to the forensic science laboratory at Kalian. Wi-fi system was used to hack Haywood’s account to send e-mail
  • 11. Need For Cyber Laws 1. Laws are necessary in all segments of society, and e-commerce is exception . 2. All internet users , including minors , need to be assured of their privacy and the safety of their personal information online . 3. In today’s highly digitalized world , almost everyone is affected by cyber law. 4. Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. 5. Government forms including income tax returns , company law forms etc are now filled in electronic forms. 6. Consumers are increasingly using credit cards for shopping.
  • 12. ADVNATAGESOFCYBERLAW 1. IT ACT 2000 attempts to change outdated laws and provides ways to deal with cyber crime. 2. Companies shall now be able to carry out electronic commerce using legal infrastructure provided by the act 3. Digital signatures have been given legal validity and sanction in the Act. 4. The act now allows government to issue notification on the web thus handling e-goverence. 5. The law sets up the territorial jurisdictions of the adjudicating officers for cyber crimes and the crime regulations appellate tribunal.
  • 13. DONOT SHARE IT WITH ANYONE ELSE AND CHANGE IT AFTER EVERY 3 MONTHS