SlideShare a Scribd company logo
CYBER LAW
CYBER CRIME
IT ACT 2000
MADE BY:
UMANG MAHESHWARI
CYBER LAW
CYBER LAW IS THE LAW GOVERNING CYBER SPACE.
CYBER SPACE IS VERY WIDE TERM AND INCLUDES​ COMPUTERS,
NETWORKS, SOFTWARE, DATA STORAGE DEVICES (SUCH AS
HARD DISKS, USB DISKS ETC.), THE INTERNET, WEBSITES, EMAIL
AND EVEN ELECTRONIC DEVICES SUCH AS CELL PHONE, ATM
MACHINES ETC.
 CYBER LAW OF INDIA IS DEFINED UNDER IT
ACT 2000.
 SIMPLY SPEAKING CYBER LAW IS GENERIC
TERM WHICH REFERS TO ALL LEGAL AND
REGULATORY ASPECTS OF INTERNET AND
WORLD WIDE WEB.
 THE GROWTH OF ELECTRONIC COMMERCE
HAS PROPELLED THE NEED FOR VIBRANT
AND EFFECTIVE REGULATORY MECHANISMS
WHICH WOULD STRENGTHEN THE LEGAL
INFRASTRUCTURE AND WOULD BE CRUCIAL
FOR THE SUCCESS OF ELECTRONIC
COMMERCE.
CYBER LAW OF INDIA
ENCOMPASSES LAWS RELATING
TO:-
 CYBER CRIME
 ELECTRONIC AND DIGITAL SIGNATURE
 INTELLECTUAL PROPERTY
 DATA PROTECTION AND PRIVACY
CYBER CRIME
 CYBER CRIME IS THE LATEST AND
PERHAPS THE MOST COMPLICATED
PROBLEM IN THE CYBER WORLD.
CYBER CRIMES ARE UNLAWFUL ACTS
WHERE COMPUTERS​ ARE USED EITHER
AS A TOOL, OR A TARGET, OR BOTH.
THE ENORMOUS GROWTH IN
ELECTRONIC COMMERCE AND ONLINE
SHARE TRADING HAS LED TO A
PHENOMENAL SPURT IN INCIDENTS OF
 CYBER CRIME IS ANY ILLEGAL ACT COMMITTED
USING A COMPUTER NETWORK (ESPECIALLY THE
INTERNET).
CRIMINAL ACTIVITIES THAT TAKE PLACE IN
CYBER SPACE (THE INTERNET).
COMPUTER USED TO COMMIT A CRIME :-
PORNOGRAPHY, THREATENING EMAIL, ASSUMING
SOMEONE'S IDENTIFY, SEXUAL HARASSMENT,
DEFAMATION, SPAM, PHISHING.
CYBER CRIME CAN BE BASICALLY
DIVIDED INTO THREE MAJOR
CATEGORIES:-
CYBER CRIME AGAINST PERSON
CYBER CRIME AGAINST PROPERTY
CYBER​CRIME AGAINST GOVERNMENT
CYBER CRIME AGAINST PERSON
 CYBER CRIME AGAINST PERSON INCLUDES VARIOUS CRIME LIKE
TRANSMISSION OF CHILD, PORNOGRAPHY, HARASSMENT OF ANY
ONE WITH THE USE OF COMPUTER SUCH AS E-MAIL.
 THE TRAFFICKING, DISTRIBUTION, POSTING AND DISSEMINATION
OF OBSENCE MATERIAL INCLUDING PORNOGRAPHY AND
INCIDENTS EXPOSURES​, IS ONE OF THE MOST IMPORTANT CYBER
CRIMES KNOWN TODAY IN GENRE.
CYBER CRIME AGAINST PROPERTY
THESE CRIMES INCLUDE:
 COMPUTER VANDALISM (DESTRUCTION OF OTHER'S PROPERTY
 TRANSMISSION OF HARMFUL PROGRAMMES
 SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION
 STEALING SECRET INFORMATION AND DATA
CYBER CRIME AGAINST
GOVERNMENT
 CYBER TERRORISM IS ONE DISTINCT KIND
OF CRIME IN THIS CATEGORY.
 THE MEDIUM OF CYBER SPACE IS USED BY
INDIVIDUALS OR GROUPS TO THREATEN THE
INTERNATIONAL GOVERNMENTS AS ALSO TO
TERRORIZE THE CITIZENS OF A COUNTRY.
 THIS CRIME MANIFESTS ITSELF INTO
TERRORISM WHEN AN INDIVIDUAL "CRACKS"
INTO A GOVERNMENT OR MILITARY
MAINTAINED WEBSITE.
ELECTRONIC AND DIGITAL SIGNATURE
 ELECTRONIC SIGNATURE ARE USED TO
AUTHENTICATE ELECTRONIC RECORDS.
DIGITAL SIGNATURE ARE ONE TYPE OF
ELECTRONIC SIGNATURE.
 DIGITAL SIGNATURE SATISFY THREE
MAJOR LEGAL REQUIREMENTS:-
• SIGNER AUNTHENTICATION
• MESSAGE AUTHENTICATION
• MESSAGE INTEGRITY
INTELLECTUAL PROPERTY
 INTELLECTUAL PROPERTY REFERS
TO CREATION OF THE HUMAN MIND
E.G. A STORY, A SONG, A PAINTING, A
DESIGN ETC.
 THE FACETS OF INTELLECTUAL
PROPERTY THAT RELATE TO CYBER
SPACE ARE COVERED BY CYBER LAW.
I.T. ACT 2000
INFORMATION TECHNOLOGY ACT
CONSISTED OF 94 SECTION SEGREGATED
INTO 13 CHAPTERS.
FOUR SCHEDULE FORM PART OF THE
ACT.
 CAME INTO EXISTENCE ON OCTOBER 17,
2000.
 INDIA IS THE 12TH NATION IN THE WORLD
TO ENACT THE CYBER LAW.
 THE PRIMARY SOURCE OF CYBER LAW IN INDIA
IS THE INFORMATION TECHNOLOGY ACT 2000.
 THE MAIN PURPOSE OF THE ACT IS TO PROVIDE
LEGAL RECOGNITION TO ELECTRONIC
COMMERCE AND TO FACILITATE FILING OF
ELECTRONIC​ RECORDS WITH THE GOVERNMENT.
 THE IT ACT 2000 ATTEMPTS TO CHANGE
OUTDATED LAWS AND PROVIDES​ WAYS TO DEAL
WITH CYBER CRIME. SUCH AN ACT IS REQUIRED
AS PEOPLE CAN PERFORM PURCHASE
TRANSACTION OVER THE NET THROUGH CREDIT
CARDS​ WITHOUT FEAR OF GETTING MISUSED.
IT AMENDMENT ACT 2008
 INFORMATION TECHNOLOGY ACT 2008, AS A NEW
VERSION OF INFORMATION TECHNOLOGY ACT 2000
IS OFTEN REFERRED, HAS PROVIDED THE
ADDITIONAL FOCUS ON INFORMATION SECURITY. IT
HAS ADDED SEVERAL NEW SECTIONS​ ON OFFENSE
INCLUDING CYBER TERRORISM AND DATA
PROTECTION.
THE IT ACT 2008 HAS BEEN PASSED BY THE
PARLIAMENT ON 23RD DECEMBER 2008 AND CAME
INTO FORCE FROM OCTOBER 27, 2009 ONWARDS.
NEED & IMPORTANCE OF CYBER LAW
 TACKLING CYBER CRIME
 SUCCESSFUL AND SMOOTH FUNCTIONING OF E-
COMMERCE AND VIRTUAL COMMUNICATION
 NO JURISDICTIONAL BOUNDARIES
 INCREASING USE OF MOBILE BANKING AND
INTERNET BANKING
 CLOUD COMPUTING IS PROVING​ TO BE A MAJOR
THREAT
 ECONOMIC EFFECIENCY​
Cyber law

More Related Content

What's hot

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
DINESH KAMBLE
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
Amlin David
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Cyber law
Cyber lawCyber law
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Cyber law
Cyber lawCyber law
Cyber law
AHSSAN AKHTAR
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 

What's hot (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber law

Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
AnirudhRaju6
 
ISO Standards And various Indian Cyber Laws
ISO Standards  And  various  Indian Cyber LawsISO Standards  And  various  Indian Cyber Laws
ISO Standards And various Indian Cyber Laws
SurajKumar579888
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
Cyber law final
Cyber law finalCyber law final
Cyber law final
Kanhaiya Kumar
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
Harini Sai
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
 

Similar to Cyber law (20)

Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
ISO Standards And various Indian Cyber Laws
ISO Standards  And  various  Indian Cyber LawsISO Standards  And  various  Indian Cyber Laws
ISO Standards And various Indian Cyber Laws
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act 2000
It act 2000It act 2000
It act 2000
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

More from Umang Maheshwari

Apollo hospital Case study
Apollo hospital Case studyApollo hospital Case study
Apollo hospital Case study
Umang Maheshwari
 
7 P's of Airline industry
7 P's of Airline industry7 P's of Airline industry
7 P's of Airline industry
Umang Maheshwari
 
RR Kabel project report
RR Kabel project reportRR Kabel project report
RR Kabel project report
Umang Maheshwari
 
AG poly pack project report
AG poly pack project reportAG poly pack project report
AG poly pack project report
Umang Maheshwari
 
Lotte project report
Lotte project reportLotte project report
Lotte project report
Umang Maheshwari
 
Patanjali
PatanjaliPatanjali
Patanjali
Umang Maheshwari
 
Global economic crisis
Global economic crisisGlobal economic crisis
Global economic crisis
Umang Maheshwari
 
Oyo
OyoOyo
Director of Companies Act
Director of Companies ActDirector of Companies Act
Director of Companies Act
Umang Maheshwari
 
Colgate and pepsodent
Colgate and pepsodentColgate and pepsodent
Colgate and pepsodent
Umang Maheshwari
 
Facebook & Cambridge Analytica data scandal ppt
Facebook & Cambridge Analytica data scandal pptFacebook & Cambridge Analytica data scandal ppt
Facebook & Cambridge Analytica data scandal ppt
Umang Maheshwari
 
Project Report - Hero motocorp and bajaj pdf
Project Report - Hero motocorp and bajaj pdfProject Report - Hero motocorp and bajaj pdf
Project Report - Hero motocorp and bajaj pdf
Umang Maheshwari
 

More from Umang Maheshwari (12)

Apollo hospital Case study
Apollo hospital Case studyApollo hospital Case study
Apollo hospital Case study
 
7 P's of Airline industry
7 P's of Airline industry7 P's of Airline industry
7 P's of Airline industry
 
RR Kabel project report
RR Kabel project reportRR Kabel project report
RR Kabel project report
 
AG poly pack project report
AG poly pack project reportAG poly pack project report
AG poly pack project report
 
Lotte project report
Lotte project reportLotte project report
Lotte project report
 
Patanjali
PatanjaliPatanjali
Patanjali
 
Global economic crisis
Global economic crisisGlobal economic crisis
Global economic crisis
 
Oyo
OyoOyo
Oyo
 
Director of Companies Act
Director of Companies ActDirector of Companies Act
Director of Companies Act
 
Colgate and pepsodent
Colgate and pepsodentColgate and pepsodent
Colgate and pepsodent
 
Facebook & Cambridge Analytica data scandal ppt
Facebook & Cambridge Analytica data scandal pptFacebook & Cambridge Analytica data scandal ppt
Facebook & Cambridge Analytica data scandal ppt
 
Project Report - Hero motocorp and bajaj pdf
Project Report - Hero motocorp and bajaj pdfProject Report - Hero motocorp and bajaj pdf
Project Report - Hero motocorp and bajaj pdf
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (16)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

Cyber law

  • 1. CYBER LAW CYBER CRIME IT ACT 2000 MADE BY: UMANG MAHESHWARI
  • 2. CYBER LAW CYBER LAW IS THE LAW GOVERNING CYBER SPACE. CYBER SPACE IS VERY WIDE TERM AND INCLUDES​ COMPUTERS, NETWORKS, SOFTWARE, DATA STORAGE DEVICES (SUCH AS HARD DISKS, USB DISKS ETC.), THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH AS CELL PHONE, ATM MACHINES ETC.
  • 3.
  • 4.  CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 2000.  SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH REFERS TO ALL LEGAL AND REGULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB.  THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FOR VIBRANT AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENGTHEN THE LEGAL INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRONIC COMMERCE.
  • 5. CYBER LAW OF INDIA ENCOMPASSES LAWS RELATING TO:-  CYBER CRIME  ELECTRONIC AND DIGITAL SIGNATURE  INTELLECTUAL PROPERTY  DATA PROTECTION AND PRIVACY
  • 6. CYBER CRIME  CYBER CRIME IS THE LATEST AND PERHAPS THE MOST COMPLICATED PROBLEM IN THE CYBER WORLD. CYBER CRIMES ARE UNLAWFUL ACTS WHERE COMPUTERS​ ARE USED EITHER AS A TOOL, OR A TARGET, OR BOTH. THE ENORMOUS GROWTH IN ELECTRONIC COMMERCE AND ONLINE SHARE TRADING HAS LED TO A PHENOMENAL SPURT IN INCIDENTS OF
  • 7.
  • 8.  CYBER CRIME IS ANY ILLEGAL ACT COMMITTED USING A COMPUTER NETWORK (ESPECIALLY THE INTERNET). CRIMINAL ACTIVITIES THAT TAKE PLACE IN CYBER SPACE (THE INTERNET). COMPUTER USED TO COMMIT A CRIME :- PORNOGRAPHY, THREATENING EMAIL, ASSUMING SOMEONE'S IDENTIFY, SEXUAL HARASSMENT, DEFAMATION, SPAM, PHISHING.
  • 9. CYBER CRIME CAN BE BASICALLY DIVIDED INTO THREE MAJOR CATEGORIES:- CYBER CRIME AGAINST PERSON CYBER CRIME AGAINST PROPERTY CYBER​CRIME AGAINST GOVERNMENT
  • 10. CYBER CRIME AGAINST PERSON  CYBER CRIME AGAINST PERSON INCLUDES VARIOUS CRIME LIKE TRANSMISSION OF CHILD, PORNOGRAPHY, HARASSMENT OF ANY ONE WITH THE USE OF COMPUTER SUCH AS E-MAIL.  THE TRAFFICKING, DISTRIBUTION, POSTING AND DISSEMINATION OF OBSENCE MATERIAL INCLUDING PORNOGRAPHY AND INCIDENTS EXPOSURES​, IS ONE OF THE MOST IMPORTANT CYBER CRIMES KNOWN TODAY IN GENRE.
  • 11. CYBER CRIME AGAINST PROPERTY THESE CRIMES INCLUDE:  COMPUTER VANDALISM (DESTRUCTION OF OTHER'S PROPERTY  TRANSMISSION OF HARMFUL PROGRAMMES  SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION  STEALING SECRET INFORMATION AND DATA
  • 12. CYBER CRIME AGAINST GOVERNMENT  CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY.  THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUPS TO THREATEN THE INTERNATIONAL GOVERNMENTS AS ALSO TO TERRORIZE THE CITIZENS OF A COUNTRY.  THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL "CRACKS" INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
  • 13. ELECTRONIC AND DIGITAL SIGNATURE  ELECTRONIC SIGNATURE ARE USED TO AUTHENTICATE ELECTRONIC RECORDS. DIGITAL SIGNATURE ARE ONE TYPE OF ELECTRONIC SIGNATURE.  DIGITAL SIGNATURE SATISFY THREE MAJOR LEGAL REQUIREMENTS:- • SIGNER AUNTHENTICATION • MESSAGE AUTHENTICATION • MESSAGE INTEGRITY
  • 14. INTELLECTUAL PROPERTY  INTELLECTUAL PROPERTY REFERS TO CREATION OF THE HUMAN MIND E.G. A STORY, A SONG, A PAINTING, A DESIGN ETC.  THE FACETS OF INTELLECTUAL PROPERTY THAT RELATE TO CYBER SPACE ARE COVERED BY CYBER LAW.
  • 15. I.T. ACT 2000 INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGATED INTO 13 CHAPTERS. FOUR SCHEDULE FORM PART OF THE ACT.  CAME INTO EXISTENCE ON OCTOBER 17, 2000.  INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.
  • 16.
  • 17.  THE PRIMARY SOURCE OF CYBER LAW IN INDIA IS THE INFORMATION TECHNOLOGY ACT 2000.  THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO ELECTRONIC COMMERCE AND TO FACILITATE FILING OF ELECTRONIC​ RECORDS WITH THE GOVERNMENT.  THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES​ WAYS TO DEAL WITH CYBER CRIME. SUCH AN ACT IS REQUIRED AS PEOPLE CAN PERFORM PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS​ WITHOUT FEAR OF GETTING MISUSED.
  • 18. IT AMENDMENT ACT 2008  INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATION TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITIONAL FOCUS ON INFORMATION SECURITY. IT HAS ADDED SEVERAL NEW SECTIONS​ ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION. THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMBER 2008 AND CAME INTO FORCE FROM OCTOBER 27, 2009 ONWARDS.
  • 19. NEED & IMPORTANCE OF CYBER LAW  TACKLING CYBER CRIME  SUCCESSFUL AND SMOOTH FUNCTIONING OF E- COMMERCE AND VIRTUAL COMMUNICATION  NO JURISDICTIONAL BOUNDARIES  INCREASING USE OF MOBILE BANKING AND INTERNET BANKING  CLOUD COMPUTING IS PROVING​ TO BE A MAJOR THREAT  ECONOMIC EFFECIENCY​