SlideShare a Scribd company logo

Cyber law

brief understanding about cyber law

1 of 13
Download to read offline
By :
Vishali Pandita
MBA (College Roll No- 14060)
Guru Nanak Institutes,Mullana Ambala
CYBERLAW
 Cyber law is a much newer phenomenon having emerged
much after the onset of internet . It is a generic term which
refers to all the legal and regulatory aspects of internet and the
www.
 So it is the part of the overall legal system that deals with the
internet,cyberspace and their respective legal issues.
 In other words you can say Cyber law is the law governing
cyber space
And cyber space includes computers/w, data storage
devices,internet websites,emails,and even electronic devices
such as cell phones, ATM machines etc.
Generally cyber law has been referred to “ law of
the internet”.
CYBERLAWSININDIA
• In May 2000,both the houses of the Indian
Parliament passed the Information
Technology Bill. The bill received the assent of
the president in August 2000 and came to be
known as the Information Technology
Act,2000.
• Cyber laws are contained in the IT ACT 2000.
ITACT2000
IT ACT 2000,has 13 chapters,94 sections and 4 schedules
• First 14 sections deals with some legal aspects
concerning digital signatures
• Further other sections deals with certifying authorities
who are licensed to issue digital signatures.
• Sections 43 to 47 provide for penalties and
compensation.
• Section 48 to 64 deals with Tribunals a appeal to high
court.
• Section 65 to 79 of the act deals with offences.
• Section 80 to 94 deals with miscellaneous of the act.
Cyber law
“Digital signature” means authentication of any
electronic record by a subscriber by means of an
electronic method or procedure in accordance with the
provisions of Section 3.
It consist of public key and private key.
Private key is allocated to a individual which
enables the user to fix a digital signature.
Public key is available to all who want to check
authentication of records.

More Related Content

What's hot

What's hot (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
5G Technology - History of Wireless Technology
5G Technology - History of Wireless Technology5G Technology - History of Wireless Technology
5G Technology - History of Wireless Technology
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Viewers also liked

Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)Phật Ngôn
 
Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)Phật Ngôn
 
Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)Phật Ngôn
 
từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)Phật Ngôn
 
Allppt instructor ch03_mcm
Allppt instructor ch03_mcmAllppt instructor ch03_mcm
Allppt instructor ch03_mcmmrbagzis
 
Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)Phật Ngôn
 
Angie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrialAngie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrialAngiie Parga
 
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)Phật Ngôn
 
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)Phật Ngôn
 
Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)Phật Ngôn
 
Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)Phật Ngôn
 
Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)Phật Ngôn
 
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)Phật Ngôn
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Trainingjogemwind
 
Branding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettesBranding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettesuzairyousuf
 

Viewers also liked (18)

Baani nh 8
Baani nh 8Baani nh 8
Baani nh 8
 
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
Cẩm nang của người Phật Tử - Tập 1 (Khải Thiên)
 
Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)Bồ Đề Tư Lương Luận (Thích Như Điển)
Bồ Đề Tư Lương Luận (Thích Như Điển)
 
Exámen pcf
Exámen pcfExámen pcf
Exámen pcf
 
Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)Giới Tướng (Thích Nhất Chân)
Giới Tướng (Thích Nhất Chân)
 
từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)từ điển phật học đối chiếu việt anh 1 (thích minh thông)
từ điển phật học đối chiếu việt anh 1 (thích minh thông)
 
Allppt instructor ch03_mcm
Allppt instructor ch03_mcmAllppt instructor ch03_mcm
Allppt instructor ch03_mcm
 
Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)Bích Nham Lục (Thích Thanh Từ)
Bích Nham Lục (Thích Thanh Từ)
 
Angie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrialAngie paola parga c. higiene y seguridad industrial
Angie paola parga c. higiene y seguridad industrial
 
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
Hoa Vô Ưu Tập 9 (Thích Thanh Từ)
 
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
Bồ Đề Hải (Không Nên Tùy Tiện Hiện Thần Thông)
 
Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)Chết Đi Về Đâu (Thích Nhật Từ)
Chết Đi Về Đâu (Thích Nhật Từ)
 
Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)Vào Thiền (Nguyên Minh)
Vào Thiền (Nguyên Minh)
 
Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)Bhutan có gì lạ (Thích Như Điền)
Bhutan có gì lạ (Thích Như Điền)
 
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
Chết vào Thân Trung Ấm Và Tái Sinh (Diệu Hạnh Chân Giác)
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
 
Branding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettesBranding strategy for DUNHILL cigarettes
Branding strategy for DUNHILL cigarettes
 
5 почему 05 01-2015
5 почему 05 01-20155 почему 05 01-2015
5 почему 05 01-2015
 

Similar to Cyber law

India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03 ATHULYARAJDS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 

Similar to Cyber law (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 

Recently uploaded

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.Florence Dayana
 
Data Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdfData Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdfChristalin Nelson
 
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Katherine Villaluna
 
New Features in the Odoo 17 Sales Module
New Features in  the Odoo 17 Sales ModuleNew Features in  the Odoo 17 Sales Module
New Features in the Odoo 17 Sales ModuleCeline George
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasAlexandraSwartzwelde
 
Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...
Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...
Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...AKSHAYMAGAR17
 
Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Sue Beckingham
 
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...Nguyen Thanh Tu Collection
 
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024avesmalik2
 
Diploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdf
Diploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdfDiploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdf
Diploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdfSUMIT TIWARI
 
spring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdfspring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdfKonstantina Koutsodimou
 
Overview of Databases and Data Modelling-2.pdf
Overview of Databases and Data Modelling-2.pdfOverview of Databases and Data Modelling-2.pdf
Overview of Databases and Data Modelling-2.pdfChristalin Nelson
 
Understanding Canada's international higher education landscape (2024)
Understanding Canada's international higher education landscape (2024)Understanding Canada's international higher education landscape (2024)
Understanding Canada's international higher education landscape (2024)CaraSkikne1
 
Nzinga Kika - The story of the queen
Nzinga Kika    -  The story of the queenNzinga Kika    -  The story of the queen
Nzinga Kika - The story of the queenDeanAmory1
 
Organic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional GroupsOrganic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional GroupsDr.M.Geethavani
 
ADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS method.pptx
ADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS  method.pptxADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS  method.pptx
ADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS method.pptxAKSHAYMAGAR17
 

Recently uploaded (20)

Advance Mobile Application Development class 04
Advance Mobile Application Development class 04Advance Mobile Application Development class 04
Advance Mobile Application Development class 04
 
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
 
Data Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdfData Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdf
 
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
Practical Research 1, Lesson 5: DESIGNING A RESEARCH PROJECT RELATED TO DAILY...
 
first section physiology laboratory.pptx
first section physiology laboratory.pptxfirst section physiology laboratory.pptx
first section physiology laboratory.pptx
 
New Features in the Odoo 17 Sales Module
New Features in  the Odoo 17 Sales ModuleNew Features in  the Odoo 17 Sales Module
New Features in the Odoo 17 Sales Module
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in Canvas
 
Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...
Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...
Ideotype concept and climate resilient crop varieties for future- Wheat, Rice...
 
Lipids as Biopolymer
Lipids as Biopolymer Lipids as Biopolymer
Lipids as Biopolymer
 
Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...
 
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
 
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
VPEC BROUCHER FOR ALL COURSES UPDATED FEB 2024
 
Diploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdf
Diploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdfDiploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdf
Diploma 2nd yr PHARMACOLOGY chapter 5 part 1.pdf
 
spring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdfspring_bee_bot_creations_erd primary.pdf
spring_bee_bot_creations_erd primary.pdf
 
CLUBE PERLINGUAS .
CLUBE PERLINGUAS                        .CLUBE PERLINGUAS                        .
CLUBE PERLINGUAS .
 
Overview of Databases and Data Modelling-2.pdf
Overview of Databases and Data Modelling-2.pdfOverview of Databases and Data Modelling-2.pdf
Overview of Databases and Data Modelling-2.pdf
 
Understanding Canada's international higher education landscape (2024)
Understanding Canada's international higher education landscape (2024)Understanding Canada's international higher education landscape (2024)
Understanding Canada's international higher education landscape (2024)
 
Nzinga Kika - The story of the queen
Nzinga Kika    -  The story of the queenNzinga Kika    -  The story of the queen
Nzinga Kika - The story of the queen
 
Organic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional GroupsOrganic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional Groups
 
ADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS method.pptx
ADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS  method.pptxADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS  method.pptx
ADAPTABILITY, Types of Adaptability AND STABILITY ANALYSIS method.pptx
 

Cyber law

  • 1. By : Vishali Pandita MBA (College Roll No- 14060) Guru Nanak Institutes,Mullana Ambala
  • 2. CYBERLAW  Cyber law is a much newer phenomenon having emerged much after the onset of internet . It is a generic term which refers to all the legal and regulatory aspects of internet and the www.  So it is the part of the overall legal system that deals with the internet,cyberspace and their respective legal issues.  In other words you can say Cyber law is the law governing cyber space And cyber space includes computers/w, data storage devices,internet websites,emails,and even electronic devices such as cell phones, ATM machines etc. Generally cyber law has been referred to “ law of the internet”.
  • 3. CYBERLAWSININDIA • In May 2000,both the houses of the Indian Parliament passed the Information Technology Bill. The bill received the assent of the president in August 2000 and came to be known as the Information Technology Act,2000. • Cyber laws are contained in the IT ACT 2000.
  • 4. ITACT2000 IT ACT 2000,has 13 chapters,94 sections and 4 schedules • First 14 sections deals with some legal aspects concerning digital signatures • Further other sections deals with certifying authorities who are licensed to issue digital signatures. • Sections 43 to 47 provide for penalties and compensation. • Section 48 to 64 deals with Tribunals a appeal to high court. • Section 65 to 79 of the act deals with offences. • Section 80 to 94 deals with miscellaneous of the act.
  • 6. “Digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of Section 3. It consist of public key and private key. Private key is allocated to a individual which enables the user to fix a digital signature. Public key is available to all who want to check authentication of records.
  • 7. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crimes are unlawful acts where computer is used either as a tool :or a target :or both. It can be categories as :– 1. Cyber crime against persons 2. Cyber crime against property 3. Cyber crime against government
  • 8. Cyber law covers the intellectual property laws that relate to cyber space and its constituents . This includes: Copyright law in relation to computer software ,computer source code etc. Trademark law in relation to domain names. Semiconductor law ,which relates to the protection of semiconductor design and layouts. Patent law in relation to computer hardware and software.
  • 9. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as: banks, hospitals , email service providers etc. Many nations have enacted legislation relating to data protection and privacy within their jurisdictions. These laws would probably play a vital role, as the dependence on insecure networks such as the internet grows further.
  • 10. AhmadabadBlastCase 5 minutes before the blast an e-mail was sent to national TV Channels warning about blasts in Ahmedabad.The e-mail was traced to Kenneth Haywood's computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet Network.Haywoods laptop and computer was then sent to the forensic science laboratory at Kalian. Wi-fi system was used to hack Haywood’s account to send e-mail
  • 11. Need For Cyber Laws 1. Laws are necessary in all segments of society, and e-commerce is exception . 2. All internet users , including minors , need to be assured of their privacy and the safety of their personal information online . 3. In today’s highly digitalized world , almost everyone is affected by cyber law. 4. Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. 5. Government forms including income tax returns , company law forms etc are now filled in electronic forms. 6. Consumers are increasingly using credit cards for shopping.
  • 12. ADVNATAGESOFCYBERLAW 1. IT ACT 2000 attempts to change outdated laws and provides ways to deal with cyber crime. 2. Companies shall now be able to carry out electronic commerce using legal infrastructure provided by the act 3. Digital signatures have been given legal validity and sanction in the Act. 4. The act now allows government to issue notification on the web thus handling e-goverence. 5. The law sets up the territorial jurisdictions of the adjudicating officers for cyber crimes and the crime regulations appellate tribunal.
  • 13. DONOT SHARE IT WITH ANYONE ELSE AND CHANGE IT AFTER EVERY 3 MONTHS