SlideShare a Scribd company logo
Cyber Crime
• Various Types of Cyber Crime:
• Phishing : By using e-mail messages which completely
resembles the original mail messages of customers,
hackers can ask for verification of certain information,
like account numbers or passwords etc. here customer
might not have knowledge that the e-mail messages
are deceiving and would fail to identify the originality
of the messages, this results in huge financial loss
when the hackers use that information for fraudulent
acts like withdrawing money from customers account
without him having knowledge of it
Role of IT Act in Ecommerce
• The IT Act 2000 empowers the government
departments to accept filing, creating and retention
of official documents in the digital format
• From the perspective of e-commerce in India, the IT
Act 2000 and its provisions contain many positive
aspects. Firstly, the implications of these provisions for
the e-businesses would be that email would now be a
valid and legal form of communication in our country
that can be duly produced and approved in a court of
law.
• Case: Techie’s wife loses Rs.11 lakh to
phishing, ends life.
• In January 2016, in what is said to be the first
case of its kind, a phishing scam has claimed
the life of a 44-year-old woman in the city's
police limits.
• Hacking: Basically it’s trying to get into
computer systems in order to steal , corrupt,
or illegitimately view data. Hacking in simple
terms means an illegal intrusion into a
computer system and/or network. Hackers
write or use ready-made computer programs
to attack the target computer. They possess
the desire to destruct and they get the kick
out of such destruction.
• Case : Former Air India employee arrested for
hacking the airlines website, illegally selling
tickets
• July 2016, Anitesh Goswami, a former employee
hacked the airline’s website and obtained tickets
by redeeming miles of members of the Flying
Returns programme. He has been booked under
the IT Act. He is an IT expert and was well versed
with the functioning of the intranet and internet
based systems of Air India.
• Cyber Stalking : Cyberstalking is a crime in
which the attacker harasses a victim using
electronic communication, such as e-
mail or instant messaging (IM), or messages
posted to a Web site or a discussion group.
• Case: Cyber stalker accused of sending
obscene messages to over 2000 women
arrested
• July 7, 2016 Delhi Police arrested a 31-year-
old named Mohammad Khalid on charges of
sending obscene messages and pornographic
video clips to over 2000 women in New Delhi
following a complaint from a woman residing
at Ashok Vihar
• Child Pornography: Cyber pornography is
believed to be one of the largest businesses
on the Internet today. The millions of
pornographic websites that flourish on the
Internet are testimony to this. The Internet is
being highly used by its abusers to reach and
abuse children sexually, worldwide.
• Virus Dissemination: Viruses stop the normal
function of the system programs and also to
the whole computer system. They can also
ruin/mess up your system and render it
unusable without reinstallation of the
operating system
• Salami attacks : These attacks are used for the
commission of financial crimes. The key here is to
make the alteration so insignificant that in a
single case it would go completely unnoticed. E.g.
a bank employee inserts a program, into the
bank’s servers, that deducts a small amount of
money (say Rs. 5 a month) from the account of
every customer. No account holder will probably
notice this unauthorized debit, but the bank
employee will make a sizable amount of money
every month.
• Sale of illegal articles : This category of cyber
crimes includes sale of narcotics, weapons and
wildlife etc., by posting information on
websites, auction websites, and bulletin
boards or simply by using email
communication.
• Online gambling : There are millions of
websites; all hosted on servers abroad, that
offer online gambling.
• Forgery : Computers, printers and scanners are
used to forge counterfeit currency notes, postage
and revenue stamps, mark sheets etc. These are
made using computers, and high quality scanners
and printers.
• Credit Card Fraud: Credit card frauds are the
scams committed using others’ card in a
fraudulent way. It is the case where one’s card is
used without their knowledge or authorization to
purchase goods or services
• Case: 50 year old duped twice in credit card
fraud.
• July 10, 2016. A 50 year old man was duped
twice by unidentified suspects. After learning
about an unknown transaction worth over Rs
12,250 on his credit card, was done by some
unidentified suspects, he contacted the bank
requesting to block his card. But to his dismay, a
few days later he got another message regarding
a transaction made on his credit card was used
for shopping worth Rs 89,899.
Emerging Trends of Cyber Law
• Stringent regulatory rules are put in place by
many countries to prevent unauthorized
access to networks. Such acts are declared as
penal offences.
• Stakeholders of the mobile companies will call
upon the governments of the world to
reinforce cyber-legal systems and
administrations to regulate the emerging
mobile threats and crimes
• Cloud computing is another major growing
trend. With more advances in the technology,
huge volumes of data will flow into the cloud
which is not completely immune to cyber-
crimes.
• The growth of Bitcoins and other virtual
currency is yet another trend to watch out for.
Bitcoin crimes are likely to multiply in the near
future.
DIGITAL SIGNATURES:
E- Governance
• e-Governance is basically associated with
carrying out the functions and achieving the
results of governance through the utilization
of ICT (Information and Communications
Technology).
Through e-governance, government services
will be made available to citizens in a
convenient, efficient and transparent manner.
• Government to Citizen:
• Computerization of Land Records : Ensuring
landowners get computerized copies of
ownership, crop and tenancy and updated
copies of Record of Rights on demand
• Government to Business:
• MCA 21 : By the Ministry of Corporate Affairs,
the project aims at providing easy and secure
online access to all registry related services
provided by the Union Ministry of Corporate
Affairs
• No clear provision for handling of domain name issues.
• It is covered into the civil procedure.
• There are not any clear provision.
• CASE : 2012: First PIL filed by a law student Shreya
Singhal seeking amendent in section 66A, after two
girls Shaheen Dhada and Rinu Shrinivasan were
arrested in Palghar in Thane district as one of them
posted a commect against the shut down in Mumbai
following the Shiv Sena Leader Bal Thackery’s death
and the other “liked” it.
• Section 43: Penalty and Compensation for Damage to
Computer, computer system etc.
• If any person without permission of the owner or any
other person who is in-charge of a computer, computer
system or computer network
• accesses or secures access to such computer, computer
system or computer network or computer resource
(ITAA2008)
• downloads, copies or extracts any data, computer data
base or information from such computer, computer
system or computer network including information or
data held or stored in any removable storage medium
• Case: Mphasis BPO Fraud, 2005.
• In December 2004, four call centre employees
working at an outsourcing facility operated by
MphasiS in India obtained PIN codes of 4
customers of Mphasis’ client, CitiGroup. They
were not authorised and yet they opened
accounts at Indian banks using false identities.
They transferred money from the bank accounts
of CitiGroup customers to their new accounts
with the Indian Banks. April 2005, they were
caught by the police on the basis of a tip off.
• Section 66 : Computer Related Offences
amended vide Information Technology
Amendment Act 2008 reads as under:
• If any person, dishonestly, or fraudulently,
does any act referred to in section 43, he shall
be punishable with imprisonment for a term
which may extend to two three years or with
fine which may extend to five lakh rupees or
with both.
• Section 66C – Punishment of Identity Theft
• Whoever, fraudulently or dishonestly make
use of the electronic signature, password or
any other unique identification feature of any
other person, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall also
be liable to fine which may extend to rupees
one lakh
• Case: Man posing as actor held for Blackmailing
aspiring models:
• June 29, 2016. The cyber cell of the local police
arrested a man for allegedly luring aspiring models by
posing as renowned Punjabi actor Darshan Aulakh. The
accused was also allegedly blackmailing the models
and minting money from them on the pretext of giving
them roles in movies and music albums. The actor
lodged a complaint alleging that somebody was
misusing his name and misleading models by using the
name of Darshan Aulakh Productions.
• Section 66 D - Punishment for cheating by
personation by using computer resource
• Whoever, by means of any communication
device or computer resource cheats by
personation, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall also
be liable to fine which may extend to one lakh
rupees
• Section 66E : Punishment for violation of privacy
• Whoever, intentionally or knowingly captures,
publishes or transmits the image of a private area
of any person without his or her consent, under
circumstances violating the privacy of that
person, shall be punished with imprisonment
which may extend to three years or with fine not
exceeding two lakh rupees, or with both
• Case: Man held for taking nude photos of aunt.
• July 18, 2016. Colaba police arrested a 32-year old man for
allegedly forcing his aunt to establish physical relationship
with him, clicking her nude photograph and threatening to
make her photograph viral if she did not comply to his
demands. The accused sent the victim's nude photograph
to her husband's mobile phone. When the husband
confronted her, she narrated her entire ordeal to him. The
husband complained to the Police and the accused was
caught while he was on the run by Immigration Authorities
and was booked under sections 66E (punishment for
violation of privacy) and 67A (punishment for publishing or
transmitting of material containing sexually explicit act in
electronic form) of the Information Technology Act.
• Section 66F : Punishment for cyber terrorism:
• Whoever,-
• (A) with intent to threaten the unity, integrity,
security or sovereignty of India or to strike
terror in the people or any section of the
people

More Related Content

Similar to CYBER CRIMES AND IT ACT.pptx

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Anusha Kadayyanmath
 
Anil final
Anil finalAnil final
Anil final
Rakshith Shetty
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Rini Mahade
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Varsha Mali
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
Rakesh Otari
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Deepak Shrivastava
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
Avinash Tegginmani
 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment
Irfhan K Sorab
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
Prakash Masagi
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
santoshdkamat
 

Similar to CYBER CRIMES AND IT ACT.pptx (20)

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Anil final
Anil finalAnil final
Anil final
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
 

Recently uploaded

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 

Recently uploaded (16)

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 

CYBER CRIMES AND IT ACT.pptx

  • 1. Cyber Crime • Various Types of Cyber Crime: • Phishing : By using e-mail messages which completely resembles the original mail messages of customers, hackers can ask for verification of certain information, like account numbers or passwords etc. here customer might not have knowledge that the e-mail messages are deceiving and would fail to identify the originality of the messages, this results in huge financial loss when the hackers use that information for fraudulent acts like withdrawing money from customers account without him having knowledge of it
  • 2. Role of IT Act in Ecommerce • The IT Act 2000 empowers the government departments to accept filing, creating and retention of official documents in the digital format • From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.
  • 3. • Case: Techie’s wife loses Rs.11 lakh to phishing, ends life. • In January 2016, in what is said to be the first case of its kind, a phishing scam has claimed the life of a 44-year-old woman in the city's police limits.
  • 4. • Hacking: Basically it’s trying to get into computer systems in order to steal , corrupt, or illegitimately view data. Hacking in simple terms means an illegal intrusion into a computer system and/or network. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction.
  • 5. • Case : Former Air India employee arrested for hacking the airlines website, illegally selling tickets • July 2016, Anitesh Goswami, a former employee hacked the airline’s website and obtained tickets by redeeming miles of members of the Flying Returns programme. He has been booked under the IT Act. He is an IT expert and was well versed with the functioning of the intranet and internet based systems of Air India.
  • 6. • Cyber Stalking : Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e- mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • 7. • Case: Cyber stalker accused of sending obscene messages to over 2000 women arrested • July 7, 2016 Delhi Police arrested a 31-year- old named Mohammad Khalid on charges of sending obscene messages and pornographic video clips to over 2000 women in New Delhi following a complaint from a woman residing at Ashok Vihar
  • 8. • Child Pornography: Cyber pornography is believed to be one of the largest businesses on the Internet today. The millions of pornographic websites that flourish on the Internet are testimony to this. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.
  • 9. • Virus Dissemination: Viruses stop the normal function of the system programs and also to the whole computer system. They can also ruin/mess up your system and render it unusable without reinstallation of the operating system
  • 10. • Salami attacks : These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank’s servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
  • 11. • Sale of illegal articles : This category of cyber crimes includes sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication. • Online gambling : There are millions of websites; all hosted on servers abroad, that offer online gambling.
  • 12. • Forgery : Computers, printers and scanners are used to forge counterfeit currency notes, postage and revenue stamps, mark sheets etc. These are made using computers, and high quality scanners and printers. • Credit Card Fraud: Credit card frauds are the scams committed using others’ card in a fraudulent way. It is the case where one’s card is used without their knowledge or authorization to purchase goods or services
  • 13. • Case: 50 year old duped twice in credit card fraud. • July 10, 2016. A 50 year old man was duped twice by unidentified suspects. After learning about an unknown transaction worth over Rs 12,250 on his credit card, was done by some unidentified suspects, he contacted the bank requesting to block his card. But to his dismay, a few days later he got another message regarding a transaction made on his credit card was used for shopping worth Rs 89,899.
  • 14. Emerging Trends of Cyber Law • Stringent regulatory rules are put in place by many countries to prevent unauthorized access to networks. Such acts are declared as penal offences. • Stakeholders of the mobile companies will call upon the governments of the world to reinforce cyber-legal systems and administrations to regulate the emerging mobile threats and crimes
  • 15. • Cloud computing is another major growing trend. With more advances in the technology, huge volumes of data will flow into the cloud which is not completely immune to cyber- crimes. • The growth of Bitcoins and other virtual currency is yet another trend to watch out for. Bitcoin crimes are likely to multiply in the near future.
  • 17. E- Governance • e-Governance is basically associated with carrying out the functions and achieving the results of governance through the utilization of ICT (Information and Communications Technology). Through e-governance, government services will be made available to citizens in a convenient, efficient and transparent manner.
  • 18. • Government to Citizen: • Computerization of Land Records : Ensuring landowners get computerized copies of ownership, crop and tenancy and updated copies of Record of Rights on demand
  • 19. • Government to Business: • MCA 21 : By the Ministry of Corporate Affairs, the project aims at providing easy and secure online access to all registry related services provided by the Union Ministry of Corporate Affairs
  • 20. • No clear provision for handling of domain name issues. • It is covered into the civil procedure. • There are not any clear provision. • CASE : 2012: First PIL filed by a law student Shreya Singhal seeking amendent in section 66A, after two girls Shaheen Dhada and Rinu Shrinivasan were arrested in Palghar in Thane district as one of them posted a commect against the shut down in Mumbai following the Shiv Sena Leader Bal Thackery’s death and the other “liked” it.
  • 21. • Section 43: Penalty and Compensation for Damage to Computer, computer system etc. • If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network • accesses or secures access to such computer, computer system or computer network or computer resource (ITAA2008) • downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium
  • 22. • Case: Mphasis BPO Fraud, 2005. • In December 2004, four call centre employees working at an outsourcing facility operated by MphasiS in India obtained PIN codes of 4 customers of Mphasis’ client, CitiGroup. They were not authorised and yet they opened accounts at Indian banks using false identities. They transferred money from the bank accounts of CitiGroup customers to their new accounts with the Indian Banks. April 2005, they were caught by the police on the basis of a tip off.
  • 23. • Section 66 : Computer Related Offences amended vide Information Technology Amendment Act 2008 reads as under: • If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.
  • 24. • Section 66C – Punishment of Identity Theft • Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh
  • 25. • Case: Man posing as actor held for Blackmailing aspiring models: • June 29, 2016. The cyber cell of the local police arrested a man for allegedly luring aspiring models by posing as renowned Punjabi actor Darshan Aulakh. The accused was also allegedly blackmailing the models and minting money from them on the pretext of giving them roles in movies and music albums. The actor lodged a complaint alleging that somebody was misusing his name and misleading models by using the name of Darshan Aulakh Productions.
  • 26. • Section 66 D - Punishment for cheating by personation by using computer resource • Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees
  • 27. • Section 66E : Punishment for violation of privacy • Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
  • 28. • Case: Man held for taking nude photos of aunt. • July 18, 2016. Colaba police arrested a 32-year old man for allegedly forcing his aunt to establish physical relationship with him, clicking her nude photograph and threatening to make her photograph viral if she did not comply to his demands. The accused sent the victim's nude photograph to her husband's mobile phone. When the husband confronted her, she narrated her entire ordeal to him. The husband complained to the Police and the accused was caught while he was on the run by Immigration Authorities and was booked under sections 66E (punishment for violation of privacy) and 67A (punishment for publishing or transmitting of material containing sexually explicit act in electronic form) of the Information Technology Act.
  • 29. • Section 66F : Punishment for cyber terrorism: • Whoever,- • (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people