SlideShare a Scribd company logo
9 Things About Indian Cyber Law 
Adv. Prashant Mali 
Masters in Computer Science(MSc), Masters in Law(LLM), 
Certified Computer Forensics Professional(CCFP) 
High Court Lawyer – Mumbai, India 
Speaker, Author & Expert in Cyber Law & Cyber Security 
President – Cyber Law Consulting(Advocates & Attorneys)
9 Things About Indian Cyber Law 
#1 If anybody copies data (i.e .pdf files, .jpg 
files etc) in his pen drive or microSDcard 
without the permission of the owner 
cyberlawconsulting@gmail.com
Data Theft in Cyber Law 
• Section 43(b) 
If any person without permission of the owner or any 
other person who is in charge of a computer, computer 
system or computer network, - 
downloads, copies or extracts any data, computer data 
base or information from such computer, computer system 
or computer network including information or data held or 
stored in any removable storage medium; 
• Section 66 
If any person, dishonestly, or fraudulently, does any act 
referred to in section 43, he shall be punishable with 
imprisonment for a term which may extend to three years 
or with fine which may extend to 5 lakh rupees or with 
both. cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#2 If you download .mp3 or .mpeg4 songs from 
the website distributing free songs or videos 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#3 If you cut or copy and then 
paste any data or information 
from any website without 
prior permission of the 
website owner for any 
material or financial gains 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#4 If an employee keeps 
forwarding all his official 
emails from his official 
email id 
i.e from empname@company.com 
to his personal email id 
i.e to empname@gmail.com; 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#5 You have made your friends 
or unknown persons Facebook 
profile or his email or website 
by someone’s name 
to defraud or cheat 
the friend or other persons at large 
cyberlawconsulting@gmail.com
Spreading Virus as per Cyber Law 
• Section 43(c) 
If any person without permission of the owner or any 
other person who is in charge of a computer, computer 
system or computer network, - 
Introduces or causes to be introduced any computer 
contaminant or computer virus into any computer, 
computer system or computer network; 
• Section 66 
If any person, dishonestly, or fraudulently, does any act 
referred to in section 43, he shall be punishable with 
imprisonment for a term which may extend to three years 
or with fine which may extend to 5 lakh rupees or with 
both. 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#6 If you insert a pen drive in someone’s 
computer and that has virus or worms in it, and 
this is then passed in the computer or server 
you just accessed or the e-mails you forward has 
virus attached to it which gets transmitted 
everywhere because of your forwarded email 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
• Section 43(d) 
If any person without permission of the owner or any other 
person who is in charge of a computer, computer system or 
computer network, - 
damages or causes to be damaged any computer, computer 
system or computer network, data, computer data base or 
any other programs residing in such computer, computer 
system or computer network; 
• Section 66 
If any person, dishonestly, or fraudulently, does any act 
referred to in section 43, he shall be punishable with 
imprisonment for a term which may extend to three years or 
with fine which may extend to 5 lakh rupees or with both. 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#7 If you by your activities crash anybody's hard 
disk or break his monitor or destroy his 
computer 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#8 If you delete files or folders or modify the 
content of files or folders from someone’s 
computer 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
• Section 43(g) 
If any person without permission of the owner or any other 
person who is in charge of a computer, computer system or 
computer network, - 
provides any assistance to any person to facilitate access to a 
computer, computer system or computer network in 
contravention of the provisions of this Act, rules or regulations 
made there under; 
• Section 66 
If any person, dishonestly, or fraudulently, does any act 
referred to in section 43, he shall be punishable with 
imprisonment for a term which may extend to three years or 
with fine which may extend to 5 lakh rupees or with both. 
cyberlawconsulting@gmail.com
9 Things About Indian Cyber Law 
#9 If you steal someone’s software programs 
source code or change it or delete it thereby 
causing financial loss to someone or financial gain 
to yourself. Don’t takeaway Code or upload it to 
website/email while Leaving your old Company 
cyberlawconsulting@gmail.com
THANK YOU 
Adv. Prashant Mali [BSc.(Phy.), MSc.(Computer Sci.),CCFP,LLM] 
President - Cyber Law Consulting 
Author, Speaker & Expert 
Mob: 09821763157 
facebook.com/cyberlawconsultant 
Web : www.prashantmali.com 
www.cyberlawconsulting.com 
Email : cyberlawconsulting@gmail.com 
Twitter: @CyberMahaGuru 
cyberlawconsulting@gmail.com

More Related Content

What's hot

Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 Final
William Hamilton
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
Kavya2Kavyaa
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Sushma Habib
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
Karnika Seth
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
Saranya Babu Rajendran
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Sushma Habib
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
anveshika thakur
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
Anirban Mandal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anirban Mandal
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
amiable_indian
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
Karan Bhagatwala
 
Cyber security
Cyber securityCyber security
Cyber security
SAKSHIMAHADIK
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Network Intelligence India
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 

What's hot (20)

Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 Final
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 

Viewers also liked

Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
Mousmi Pawar
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
kparthjadhav
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyber law
Cyber lawCyber law
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
guest66dc5f
 
EDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 PresentationEDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 Presentation
Paul Gruhn
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Tirthankar Sutradhar
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
Khushbu Chudasama
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
TeamOneI1MBA11
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
Apurva Kavishwar
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 

Viewers also liked (20)

Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_LawWHITEPAPER-7_years_of_Indian_Cyber_Law
WHITEPAPER-7_years_of_Indian_Cyber_Law
 
EDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 PresentationEDLD804 Constitutional Law Chapter 1 Presentation
EDLD804 Constitutional Law Chapter 1 Presentation
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Information technology act
Information technology actInformation technology act
Information technology act
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 

Similar to 9 things about indian cyber law prashant mali

Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
Ranjita Naik
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
KOMALMALLIK
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Rajshekar786
 
Cyber law
Cyber lawCyber law
Cyber law
Farheen Sultana
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
Kamal Thakur
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
Snavi
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Adwiteeya Agrawal
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
Padmaja Naidu
 
Cyber law
Cyber lawCyber law
Cyber law
Padmaja Naidu
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
cparimala
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Anna Manley
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
ShazidNawasShovon
 
cyber law
cyber law cyber law
cyber law
Rubina Shaikh
 
Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignment
Rubina Shaikh
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
Abdul Rehman
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
Vishni Ganepola
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Altacit Global
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
Niti Dhruva
 

Similar to 9 things about indian cyber law prashant mali (20)

Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law
Cyber lawCyber law
Cyber law
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
cyber law
cyber law cyber law
cyber law
 
Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignment
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 

More from Adv Prashant Mali

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
Adv Prashant Mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
Adv Prashant Mali
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
Adv Prashant Mali
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
Adv Prashant Mali
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
Adv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Adv Prashant Mali
 

More from Adv Prashant Mali (13)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

Recently uploaded

一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
onduyv
 
Offences relating to public servants.pptx
Offences relating to public servants.pptxOffences relating to public servants.pptx
Offences relating to public servants.pptx
ssuser369aa3
 
1.-Introduction-to-Ethics-in-Research.pptx
1.-Introduction-to-Ethics-in-Research.pptx1.-Introduction-to-Ethics-in-Research.pptx
1.-Introduction-to-Ethics-in-Research.pptx
mjmjlorenzo0805
 
Central Industrial Security Force coffee table book
Central Industrial Security Force coffee table bookCentral Industrial Security Force coffee table book
Central Industrial Security Force coffee table book
AravindMenon37
 
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
bzofm
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
hedonxu
 
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
cadyzeo
 
Call Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts Available
Call Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts AvailableCall Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts Available
Call Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts Available
soyamiss679 #v08
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
ubype
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
meboh
 
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
mecyyn
 
How to Review a Contract Faster and More Efficiently
How to Review a Contract Faster and More EfficientlyHow to Review a Contract Faster and More Efficiently
How to Review a Contract Faster and More Efficiently
PracticeLeagueLegalt
 
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
ucoux1
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
qevye
 
Comparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahintaComparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahinta
adi2292
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
AHRP Law Firm
 
Asian legal busiess india you are invited
Asian legal busiess india you are invitedAsian legal busiess india you are invited
Asian legal busiess india you are invited
digitalrashi12
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
uhsox
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
onduyv
 
1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx
1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx
1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx
AkashKumar1733
 

Recently uploaded (20)

一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
 
Offences relating to public servants.pptx
Offences relating to public servants.pptxOffences relating to public servants.pptx
Offences relating to public servants.pptx
 
1.-Introduction-to-Ethics-in-Research.pptx
1.-Introduction-to-Ethics-in-Research.pptx1.-Introduction-to-Ethics-in-Research.pptx
1.-Introduction-to-Ethics-in-Research.pptx
 
Central Industrial Security Force coffee table book
Central Industrial Security Force coffee table bookCentral Industrial Security Force coffee table book
Central Industrial Security Force coffee table book
 
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
 
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
 
Call Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts Available
Call Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts AvailableCall Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts Available
Call Girls Hyderabad 📞 8824825030 Top Class Hyderabad Escorts Available
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
 
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
 
How to Review a Contract Faster and More Efficiently
How to Review a Contract Faster and More EfficientlyHow to Review a Contract Faster and More Efficiently
How to Review a Contract Faster and More Efficiently
 
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
 
Comparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahintaComparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahinta
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
 
Asian legal busiess india you are invited
Asian legal busiess india you are invitedAsian legal busiess india you are invited
Asian legal busiess india you are invited
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
 
1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx
1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx
1.Cybercrime - emerging trends, modus, motivations, intentions, threats.pptx
 

9 things about indian cyber law prashant mali

  • 1. 9 Things About Indian Cyber Law Adv. Prashant Mali Masters in Computer Science(MSc), Masters in Law(LLM), Certified Computer Forensics Professional(CCFP) High Court Lawyer – Mumbai, India Speaker, Author & Expert in Cyber Law & Cyber Security President – Cyber Law Consulting(Advocates & Attorneys)
  • 2. 9 Things About Indian Cyber Law #1 If anybody copies data (i.e .pdf files, .jpg files etc) in his pen drive or microSDcard without the permission of the owner cyberlawconsulting@gmail.com
  • 3. Data Theft in Cyber Law • Section 43(b) If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; • Section 66 If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to 5 lakh rupees or with both. cyberlawconsulting@gmail.com
  • 4. 9 Things About Indian Cyber Law #2 If you download .mp3 or .mpeg4 songs from the website distributing free songs or videos cyberlawconsulting@gmail.com
  • 5. 9 Things About Indian Cyber Law #3 If you cut or copy and then paste any data or information from any website without prior permission of the website owner for any material or financial gains cyberlawconsulting@gmail.com
  • 6. 9 Things About Indian Cyber Law #4 If an employee keeps forwarding all his official emails from his official email id i.e from empname@company.com to his personal email id i.e to empname@gmail.com; cyberlawconsulting@gmail.com
  • 7. 9 Things About Indian Cyber Law #5 You have made your friends or unknown persons Facebook profile or his email or website by someone’s name to defraud or cheat the friend or other persons at large cyberlawconsulting@gmail.com
  • 8. Spreading Virus as per Cyber Law • Section 43(c) If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, - Introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; • Section 66 If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to 5 lakh rupees or with both. cyberlawconsulting@gmail.com
  • 9. 9 Things About Indian Cyber Law #6 If you insert a pen drive in someone’s computer and that has virus or worms in it, and this is then passed in the computer or server you just accessed or the e-mails you forward has virus attached to it which gets transmitted everywhere because of your forwarded email cyberlawconsulting@gmail.com
  • 10. 9 Things About Indian Cyber Law • Section 43(d) If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, - damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programs residing in such computer, computer system or computer network; • Section 66 If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to 5 lakh rupees or with both. cyberlawconsulting@gmail.com
  • 11. 9 Things About Indian Cyber Law #7 If you by your activities crash anybody's hard disk or break his monitor or destroy his computer cyberlawconsulting@gmail.com
  • 12. 9 Things About Indian Cyber Law #8 If you delete files or folders or modify the content of files or folders from someone’s computer cyberlawconsulting@gmail.com
  • 13. 9 Things About Indian Cyber Law • Section 43(g) If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, - provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made there under; • Section 66 If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to 5 lakh rupees or with both. cyberlawconsulting@gmail.com
  • 14. 9 Things About Indian Cyber Law #9 If you steal someone’s software programs source code or change it or delete it thereby causing financial loss to someone or financial gain to yourself. Don’t takeaway Code or upload it to website/email while Leaving your old Company cyberlawconsulting@gmail.com
  • 15. THANK YOU Adv. Prashant Mali [BSc.(Phy.), MSc.(Computer Sci.),CCFP,LLM] President - Cyber Law Consulting Author, Speaker & Expert Mob: 09821763157 facebook.com/cyberlawconsultant Web : www.prashantmali.com www.cyberlawconsulting.com Email : cyberlawconsulting@gmail.com Twitter: @CyberMahaGuru cyberlawconsulting@gmail.com