SlideShare a Scribd company logo
1 of 20
CYBER LAWS
Introduction
“Modern thief can steal more with a computer
than with a gun.”
- National Research Council USA, ‘Computers at
Risk’ (1991)
• The birth of internet facilitates swift sharing of
information
• Forrester Research, a technology research
firm reported that the number of internet
users would touch 4 billion mark by 2018.
• With the passage of time many people
started misusing the cyberspace.
• This demanded the countries all over the
world to pass cyberlaws.
CYBER LAWS
• Cyber law is the law governing the
cyberspace.
• Wilham Gibson coined the term cyber-space
in his fictional work Neuromances (1980s)
• Cyberspace is a conceptual hallucination that
looked like a physical space but was actually
computer generated.
• Cyber Law is a term that describes the legal
issues related to the use of internet.
• Another name for Cyber Law is Internet Law
or Computer Law.
Cyber Law of India encompasses laws relating
to
1) Cyber Crimes
2) Electronic and Digital Signatures
3) Intellectual Property
4) Data Protection and Privacy
1) Cyber Crimes
• Cyber Crime is the latest and most
complicated problem in the cyber world.
• Cyber Crimes are unlawful acts where
computer is used either as a tool or target or
both.
• Enormous growth in e-commerce and online
trading has led to phenomenal increase in
cyber crimes.
Cyber Crimes can be basically
divided into 3 categories
• Cyber Crimes against persons
• Cyber Crimes against property
• Cyber Crimes against government
Cyber Crimes against persons
Include various crimes like
• Transmission of child pornography
• Harassment via e-mails
• Cheating and fraud
• Unauthorised control/access over computer
system
Cyber crimes against property
Include various crimes like
• Destruction of others property ( Computer
vandalism)
• Stealing funds from financial institutions
• Stealing secret data and information
• Physically damaging computer system
• Transmission of virus
Cyber Crimes against Government
Include
• Cyber terrorism against government
organisations
• Distribution of pirated software
• Possession of unauthorised information
2) Electronic Signature
• Electronic Signatures are used to authenticate
electronic records
Eg : Digital signatures
3) Intellectual Property
• Intellectual property refers to creations of the
human mind
Eg : Song, Story, Paintings etc
• Cyber Law protects all these Intellectual
properties related with Cyber Space.
Eg :- Copy Right Law, Trade Mark Law, Patent
Law etc
4) Data Protection and Privacy
• Data Protection and Privacy Laws aim to
achieve a balance between privacy rights of
individual and interests of data controllers like
banks, hospitals etc.
IT ACT of India, 2000
• The primary source of cyber law in India is the
Information Technology Act 2000.
• It deals with cyber crime and electronic
commerce.
• Gets the assent of Parliament on 9th June 2000
and came into effect on 17th October 2000.
• IT Act 2000 is based on UNICITRAL (United
Nations Commission on International Trade
Law) model.
• IT Act 2000 has 13 chapters, 94 sections and 4
schedules
First 14 Sections deal with legal aspects
concerning digital signatures.
Sections 43 to 47 - Penalties and
compensations
Sections 48 to 64 - Tribunals and appeal to
High Court
Sections 65 to 79 - offences
Sections 80 to 94 - miscellaneous
IT Amendment Act, 2008
• A new version of IT Act 2000
• Provided additional focus on Information
security.
• Added new sections on offences including
Cyber Terrorism and Data Protection
• Passed by the Parliament on 23rd December
2008. Came into force on 27th October 2009.
• IT Act 2008 has 14 chapters, 124 sections and
2 schedules
• Now IT Amendment Act has 14 chapters, 119
sections and 2 schedules
Important Sections of IT Act 2008
• Section 5 - legal recognition of digital signatures
• Section 43 - destroy or damage electronic devices
• Section 44 - damaging of software in electronic
devices
• Section 61 - Civil court not to have jurisdiction
• Section 65 - cyber tampering
• Section 66 - hacking with computer system
• Section 66 F - Cyber Terrorism
• Section 67 A – Cyber Pornography
• On 24th March 2015, Supreme Court deleted
Section 66A of IT Act which allowed arrest for
objectionable content online
Conclusion
• Increase dependence on cyberspace has
resulted in many cyber crimes
• The main aim of cyber law is to control man
and machine

More Related Content

What's hot

It legislation
It legislationIt legislation
It legislationdoogstone
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Internet
InternetInternet
InternetJodip
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 

What's hot (20)

It legislation
It legislationIt legislation
It legislation
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber law
Cyber lawCyber law
Cyber law
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Internet
InternetInternet
Internet
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 

Similar to Cyberlaws

Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 

Similar to Cyberlaws (20)

Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

Cyberlaws

  • 2. Introduction “Modern thief can steal more with a computer than with a gun.” - National Research Council USA, ‘Computers at Risk’ (1991)
  • 3. • The birth of internet facilitates swift sharing of information • Forrester Research, a technology research firm reported that the number of internet users would touch 4 billion mark by 2018. • With the passage of time many people started misusing the cyberspace. • This demanded the countries all over the world to pass cyberlaws.
  • 4. CYBER LAWS • Cyber law is the law governing the cyberspace. • Wilham Gibson coined the term cyber-space in his fictional work Neuromances (1980s) • Cyberspace is a conceptual hallucination that looked like a physical space but was actually computer generated.
  • 5. • Cyber Law is a term that describes the legal issues related to the use of internet. • Another name for Cyber Law is Internet Law or Computer Law.
  • 6. Cyber Law of India encompasses laws relating to 1) Cyber Crimes 2) Electronic and Digital Signatures 3) Intellectual Property 4) Data Protection and Privacy
  • 7. 1) Cyber Crimes • Cyber Crime is the latest and most complicated problem in the cyber world. • Cyber Crimes are unlawful acts where computer is used either as a tool or target or both. • Enormous growth in e-commerce and online trading has led to phenomenal increase in cyber crimes.
  • 8. Cyber Crimes can be basically divided into 3 categories • Cyber Crimes against persons • Cyber Crimes against property • Cyber Crimes against government
  • 9. Cyber Crimes against persons Include various crimes like • Transmission of child pornography • Harassment via e-mails • Cheating and fraud • Unauthorised control/access over computer system
  • 10. Cyber crimes against property Include various crimes like • Destruction of others property ( Computer vandalism) • Stealing funds from financial institutions • Stealing secret data and information • Physically damaging computer system • Transmission of virus
  • 11. Cyber Crimes against Government Include • Cyber terrorism against government organisations • Distribution of pirated software • Possession of unauthorised information
  • 12. 2) Electronic Signature • Electronic Signatures are used to authenticate electronic records Eg : Digital signatures
  • 13. 3) Intellectual Property • Intellectual property refers to creations of the human mind Eg : Song, Story, Paintings etc • Cyber Law protects all these Intellectual properties related with Cyber Space. Eg :- Copy Right Law, Trade Mark Law, Patent Law etc
  • 14. 4) Data Protection and Privacy • Data Protection and Privacy Laws aim to achieve a balance between privacy rights of individual and interests of data controllers like banks, hospitals etc.
  • 15. IT ACT of India, 2000 • The primary source of cyber law in India is the Information Technology Act 2000. • It deals with cyber crime and electronic commerce. • Gets the assent of Parliament on 9th June 2000 and came into effect on 17th October 2000. • IT Act 2000 is based on UNICITRAL (United Nations Commission on International Trade Law) model.
  • 16. • IT Act 2000 has 13 chapters, 94 sections and 4 schedules First 14 Sections deal with legal aspects concerning digital signatures. Sections 43 to 47 - Penalties and compensations Sections 48 to 64 - Tribunals and appeal to High Court Sections 65 to 79 - offences Sections 80 to 94 - miscellaneous
  • 17. IT Amendment Act, 2008 • A new version of IT Act 2000 • Provided additional focus on Information security. • Added new sections on offences including Cyber Terrorism and Data Protection • Passed by the Parliament on 23rd December 2008. Came into force on 27th October 2009.
  • 18. • IT Act 2008 has 14 chapters, 124 sections and 2 schedules • Now IT Amendment Act has 14 chapters, 119 sections and 2 schedules
  • 19. Important Sections of IT Act 2008 • Section 5 - legal recognition of digital signatures • Section 43 - destroy or damage electronic devices • Section 44 - damaging of software in electronic devices • Section 61 - Civil court not to have jurisdiction • Section 65 - cyber tampering • Section 66 - hacking with computer system • Section 66 F - Cyber Terrorism • Section 67 A – Cyber Pornography
  • 20. • On 24th March 2015, Supreme Court deleted Section 66A of IT Act which allowed arrest for objectionable content online Conclusion • Increase dependence on cyberspace has resulted in many cyber crimes • The main aim of cyber law is to control man and machine