SlideShare a Scribd company logo
1 of 13
By :
Vishali Pandita
MBA (College Roll No- 14060)
Guru Nanak Institutes,Mullana Ambala
CYBERLAW
 Cyber law is a much newer phenomenon having emerged
much after the onset of internet . It is a generic term which
refers to all the legal and regulatory aspects of internet and the
www.
 So it is the part of the overall legal system that deals with the
internet,cyberspace and their respective legal issues.
 In other words you can say Cyber law is the law governing
cyber space
And cyber space includes computers/w, data storage
devices,internet websites,emails,and even electronic devices
such as cell phones, ATM machines etc.
Generally cyber law has been referred to “ law of
the internet”.
CYBERLAWSININDIA
• In May 2000,both the houses of the Indian
Parliament passed the Information
Technology Bill. The bill received the assent of
the president in August 2000 and came to be
known as the Information Technology
Act,2000.
• Cyber laws are contained in the IT ACT 2000.
ITACT2000
IT ACT 2000,has 13 chapters,94 sections and 4 schedules
• First 14 sections deals with some legal aspects
concerning digital signatures
• Further other sections deals with certifying authorities
who are licensed to issue digital signatures.
• Sections 43 to 47 provide for penalties and
compensation.
• Section 48 to 64 deals with Tribunals a appeal to high
court.
• Section 65 to 79 of the act deals with offences.
• Section 80 to 94 deals with miscellaneous of the act.
“Digital signature” means authentication of any
electronic record by a subscriber by means of an
electronic method or procedure in accordance with the
provisions of Section 3.
It consist of public key and private key.
Private key is allocated to a individual which
enables the user to fix a digital signature.
Public key is available to all who want to check
authentication of records.
Cyber crime is the latest and perhaps the most
complicated problem in the cyber world.
Cyber crimes are unlawful acts where computer is
used either as a tool :or a target :or both.
It can be categories as :–
1. Cyber crime against persons
2. Cyber crime against property
3. Cyber crime against government
Cyber law covers the intellectual property laws that relate to
cyber space and its constituents . This includes:
Copyright law in relation to computer software ,computer
source code etc.
Trademark law in relation to domain names.
Semiconductor law ,which relates to the protection of
semiconductor design and layouts.
Patent law in relation to computer hardware and software.
Data protection and privacy laws aim to achieve a fair
balance between the privacy rights of the individual
and the interests of data controllers such as: banks,
hospitals , email service providers etc.
Many nations have enacted legislation relating to
data protection and privacy within their jurisdictions.
These laws would probably play a vital role, as the
dependence on insecure networks such as the internet
grows further.
AhmadabadBlastCase
5 minutes before the blast an e-mail was sent to national TV
Channels warning about blasts in Ahmedabad.The e-mail was traced
to Kenneth Haywood's computer, who stayed at Gunina apartment in
Navi Mumbai. Haywood claimed that his computer was hacked. A
technician associated with VSNL had asked him not to change the
password of his wireless Internet Network.Haywoods laptop and
computer was then sent to the forensic science laboratory at Kalian.
Wi-fi system was used to hack Haywood’s account to send e-mail
Need For Cyber Laws
1. Laws are necessary in all segments of society, and
e-commerce is exception .
2. All internet users , including minors , need to be assured of
their privacy and the safety of their personal information
online .
3. In today’s highly digitalized world , almost everyone is affected
by cyber law.
4. Almost all companies extensively depend upon their
computer networks and keep their valuable data in
electronic form.
5. Government forms including income tax returns , company
law forms etc are now filled in electronic forms.
6. Consumers are increasingly using credit cards for shopping.
ADVNATAGESOFCYBERLAW
1. IT ACT 2000 attempts to change outdated laws and
provides ways to deal with cyber crime.
2. Companies shall now be able to carry out electronic
commerce using legal infrastructure provided by the
act
3. Digital signatures have been given legal validity and
sanction in the Act.
4. The act now allows government to issue notification
on the web thus handling e-goverence.
5. The law sets up the territorial jurisdictions of the
adjudicating officers for cyber crimes and the crime
regulations appellate tribunal.
DONOT SHARE IT
WITH ANYONE ELSE
AND CHANGE IT AFTER
EVERY 3 MONTHS

More Related Content

What's hot

Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Pune Citibank Mphasis Call Center Fraud
Pune Citibank Mphasis Call Center FraudPune Citibank Mphasis Call Center Fraud
Pune Citibank Mphasis Call Center FraudRishabh Chokshi
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspaceRistya Anditha
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 

What's hot (20)

Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Pune Citibank Mphasis Call Center Fraud
Pune Citibank Mphasis Call Center FraudPune Citibank Mphasis Call Center Fraud
Pune Citibank Mphasis Call Center Fraud
 
Piracy
PiracyPiracy
Piracy
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
ICT: The organization and Work Part 2
ICT: The organization and Work Part 2ICT: The organization and Work Part 2
ICT: The organization and Work Part 2
 

Viewers also liked

Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)Phật Ngôn
 
Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)Phật Ngôn
 
Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)Phật Ngôn
 
từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)Phật Ngôn
 
Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)Phật Ngôn
 
Angie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrialAngie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrialAngiie Parga
 
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)Phật Ngôn
 
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)Phật Ngôn
 
Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)Phật Ngôn
 
Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)Phật Ngôn
 
Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)Phật Ngôn
 
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)Phật Ngôn
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Trainingjogemwind
 
Branding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettesBranding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettesuzairyousuf
 

Viewers also liked (17)

Baani nh 8
Baani nh 8Baani nh 8
Baani nh 8
 
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
 
Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)
 
Exámen pcf
Exámen pcfExámen pcf
Exámen pcf
 
Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)
 
từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)
 
Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)
 
Angie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrialAngie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrial
 
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
 
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
 
Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)
 
Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)
 
Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)
 
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
 
Branding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettesBranding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettes
 
5 почему 05 01-2015
5 почему 05 01-20155 почему 05 01-2015
5 почему 05 01-2015
 

Similar to Cyber law

India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03 ATHULYARAJDS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 

Similar to Cyber law (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Cyber law

  • 1. By : Vishali Pandita MBA (College Roll No- 14060) Guru Nanak Institutes,Mullana Ambala
  • 2. CYBERLAW  Cyber law is a much newer phenomenon having emerged much after the onset of internet . It is a generic term which refers to all the legal and regulatory aspects of internet and the www.  So it is the part of the overall legal system that deals with the internet,cyberspace and their respective legal issues.  In other words you can say Cyber law is the law governing cyber space And cyber space includes computers/w, data storage devices,internet websites,emails,and even electronic devices such as cell phones, ATM machines etc. Generally cyber law has been referred to “ law of the internet”.
  • 3. CYBERLAWSININDIA • In May 2000,both the houses of the Indian Parliament passed the Information Technology Bill. The bill received the assent of the president in August 2000 and came to be known as the Information Technology Act,2000. • Cyber laws are contained in the IT ACT 2000.
  • 4. ITACT2000 IT ACT 2000,has 13 chapters,94 sections and 4 schedules • First 14 sections deals with some legal aspects concerning digital signatures • Further other sections deals with certifying authorities who are licensed to issue digital signatures. • Sections 43 to 47 provide for penalties and compensation. • Section 48 to 64 deals with Tribunals a appeal to high court. • Section 65 to 79 of the act deals with offences. • Section 80 to 94 deals with miscellaneous of the act.
  • 5.
  • 6. “Digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of Section 3. It consist of public key and private key. Private key is allocated to a individual which enables the user to fix a digital signature. Public key is available to all who want to check authentication of records.
  • 7. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crimes are unlawful acts where computer is used either as a tool :or a target :or both. It can be categories as :– 1. Cyber crime against persons 2. Cyber crime against property 3. Cyber crime against government
  • 8. Cyber law covers the intellectual property laws that relate to cyber space and its constituents . This includes: Copyright law in relation to computer software ,computer source code etc. Trademark law in relation to domain names. Semiconductor law ,which relates to the protection of semiconductor design and layouts. Patent law in relation to computer hardware and software.
  • 9. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as: banks, hospitals , email service providers etc. Many nations have enacted legislation relating to data protection and privacy within their jurisdictions. These laws would probably play a vital role, as the dependence on insecure networks such as the internet grows further.
  • 10. AhmadabadBlastCase 5 minutes before the blast an e-mail was sent to national TV Channels warning about blasts in Ahmedabad.The e-mail was traced to Kenneth Haywood's computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet Network.Haywoods laptop and computer was then sent to the forensic science laboratory at Kalian. Wi-fi system was used to hack Haywood’s account to send e-mail
  • 11. Need For Cyber Laws 1. Laws are necessary in all segments of society, and e-commerce is exception . 2. All internet users , including minors , need to be assured of their privacy and the safety of their personal information online . 3. In today’s highly digitalized world , almost everyone is affected by cyber law. 4. Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. 5. Government forms including income tax returns , company law forms etc are now filled in electronic forms. 6. Consumers are increasingly using credit cards for shopping.
  • 12. ADVNATAGESOFCYBERLAW 1. IT ACT 2000 attempts to change outdated laws and provides ways to deal with cyber crime. 2. Companies shall now be able to carry out electronic commerce using legal infrastructure provided by the act 3. Digital signatures have been given legal validity and sanction in the Act. 4. The act now allows government to issue notification on the web thus handling e-goverence. 5. The law sets up the territorial jurisdictions of the adjudicating officers for cyber crimes and the crime regulations appellate tribunal.
  • 13. DONOT SHARE IT WITH ANYONE ELSE AND CHANGE IT AFTER EVERY 3 MONTHS