This document provides an introduction to cyber crimes, including definitions and examples. It discusses how computers are vulnerable due to large data storage in small spaces, ease of access, complexity of technology, and human error. It then outlines various types of cyber crimes such as credit card fraud, cyber pornography, intellectual property theft, and cyber stalking. The document also discusses international initiatives to combat cyber crimes and provides examples of cyber crime cases in India. Overall, the document serves as a high-level overview of the topic of cyber crimes.
Presentation made by Dr Tabrez Ahmad in Biju Pattanaik State Police Academy Bhubaneswar. To train DSP,s on Cyber Crime Investigation and Cyber Forensics.
Presentation made by Dr Tabrez Ahmad in Biju Pattanaik State Police Academy Bhubaneswar. To train DSP,s on Cyber Crime Investigation and Cyber Forensics.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
In todays world every 2nd company must have suffered some form of Cyber Crime at some point of time. Should it be ignored or should it be dealt with Iron Hands. Is there anything a company can or must do to prevent this? Yes, where there are problems, there are solutions and our IT Act give you such solutions. What is required is awareness and this presentation is just an attempt to sensitize todays corporates to arise to this issue and deal with it effectively.
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
Cyber law expert Karnika Seth delivered a lecdture on rising Cybercrimes and the Information Technology Act,2000 applicable in India to combat Cybercrime. It discusses thye latest trends in Cyberlaw in India, case studies, IT Act,2000 and strategies to combat cybercrimes.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. Introduction to Cyber crime
• Computer Crime, E-Crime, Hi-Tech Crime or
Electronic Crime is where a computer is the
target of a crime or is the means adopted to
commit a crime.
• Most of these crimes are not new. Criminals
simply devise different ways to undertake
standard criminal activities such as fraud,
theft, blackmail, forgery, and embezzlement
using the new medium, often involving the
Internet
3. Computer vulnerability
• Computers store huge amounts of data in small
spaces
• Ease of access
• Complexity of technology
• Human error
• One of the key elements that keeps most members of
any society honest is fear of being caught — the
deterrence factor. Cyberspace changes two of those
rules. First, it offers the criminal an opportunity of
attacking his victims from the remoteness of a different
continent and secondly, the results of the crime are not
immediately apparent.
• Need new laws and upgraded technology to combat
cyber crimes
5. International initiatives
• Representatives from the 26 Council of Europe
members, the United States, Canada, Japan and South
Africa in 2001 signed a convention on cybercrime in
efforts to enhance international cooperation in
combating computer-based crimes.
The Convention on Cybercrime, drawn up by experts of
the Council of Europe, is designed to coordinate these
countries' policies and laws on penalties on crimes in
cyberspace, define the formula guaranteeing the
efficient operation of the criminal and judicial
authorities, and establish an efficient mechanism for
international cooperation.
• In 1997, The G-8 Ministers agreed to ten "Principles to
Combat High-Tech Crime" and an "Action Plan to
Combat High-Tech Crime."
6. Contd..
• Main objectives-
• Create effective cyber crime laws
• Handle jurisdiction issues
• Cooperate in international investigations
• Develop acceptable practices for search and
seizure
• Establish effective public/private sector
interaction
10. Number of Indian sites hacked
25 25
20
15
12
10
6
5
0 0
1998 1999 2000 2001
11. REPORTED CASES
• State versus Amit Pasari and Kapil Juneja
• Delhi Police
– M/s Softweb Solutions
– Website www.go2nextjob.com hosted
– Complaint of hacking by web hosting service
• State versus Joseph Jose
– Delhi Police
• Hoax Email - Purported planting of 6 bombs in Connaught Place
• State versus Aneesh Chopra
– Delhi Police
• Three company websites hacked
• Accused: An ex -employee
• State versus K R Vijayakumar
– Bangalore Cyber Crime Police Station, 2001
• Criminal intimidation of employers and crashing the company’s
server
• Phoenix Global solutions
–
11
12. What is India incorporated’s biggest
threat?
• Cyber crime is now a bigger threat to India Inc than
physical crime. In a recent survey by IBM, a greater
number of companies (44%) listed cyber crime as a
bigger threat to their profitability than physical crime
(31%).
The cost of cyber crime stems primarily from loss of
revenue, loss of market capitalisation, damage to the
brand, and loss of customers, in that order.
About 67% local Chief Information Officers (CIOs) who
took part in the survey perceived cyber crime as more
costly, compared to the global benchmark of 50%.
13. Civil Wrongs under IT Act
• Chapter IX of IT Act, Section 43
• Whoever without permission of owner of the computer
– Secures access (mere U/A access)
• Not necessarily through a network
– Downloads, copies, extracts any data
– Introduces or causes to be introduced any viruses or
contaminant
– Damages or causes to be damaged any computer resource
• Destroy, alter, delete, add, modify or rearrange
• Change the format of a file
– Disrupts or causes disruption of any computer resource
• Preventing normal continuance of
14. Denies or causes denial of access by any means
Denial of service attacks
Assists any person to do any thing above
Rogue Websites, Search Engines, Insiders providing
vulnerabilities
Charges the services availed by a person to the account
of another person by tampering or manipulating any
computer resource
Credit card frauds, Internet time thefts
Liable to pay damages not exceeding Rs. One crore to the
affected party
Investigation by
ADJUDICATING OFFICER
Powers of a civil court
15. Section 46 IT Act
• Section 46 of the IT Act states that an adjudicating
officer shall be adjudging whether a person has
committed a contravention of any of the provisions of
the said Act, by holding an inquiry. Principles of audi
alterum partum and natural justice are enshrined in
the said section which stipulates that a reasonable
opportunity of making a representation shall be
granted to the concerned person who is alleged
to have violated the provisions of the IT Act. The said
Act stipulates that the inquiry will be carried out in the
manner as prescribed by the Central Government
• All proceedings before him are deemed to be judicial
proceedings, every Adjudicating Officer has all powers
conferred on civil courts
• Appeal to cyber Appellate Tribunal- from decision of
Controller, Adjudicating Officer {section 57 IT act}
16. Section 47, IT Act
• Section 47 of the Act lays down that while
adjudging the quantum of compensation under
this Act, the adjudicating officer shall have due
regard to the following factors, namely-
• (a) the amount of gain of unfair advantage,
wherever quantifiable, made as a result of the
default;
• (b) the amount of loss caused to any person
as a result of the default;
• (c) the repetitive nature of the default
17. Section 65: Source Code
• Most important asset of software companies
• “Computer Source Code" means the listing of
programmes, computer commands, design and
layout
• Ingredients
– Knowledge or intention
– Concealment, destruction, alteration
– computer source code required to be kept or maintained
by law
• Punishment
– imprisonment up to three years and / or
– fine up to Rs. 2 lakh
18. Section 66: Hacking
• Ingredients
– Intention or Knowledge to cause wrongful loss
or damage to the public or any person
– Destruction, deletion, alteration, diminishing
value or utility or injuriously affecting
information residing in a computer resource
• Punishment
– imprisonment up to three years, and / or
– fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
Section 66 covers data theft aswell as data alteration
18
19. Sec. 67. Pornography
• Ingredients
– Publishing or transmitting or causing to be published
– in the electronic form,
– Obscene material
• Punishment
– On first conviction
• imprisonment of either description up to five years and
• fine up to Rs. 1 lakh
– On subsequent conviction
• imprisonment of either description up to ten years and
• fine up to Rs. 2 lakh
• Section covers
– Internet Service Providers,
– Search engines,
– Pornographic websites
• Cognizable, Non-Bailable, JMIC/ Court of Sessions
20. Sec 69: Decryption of information
• Ingredients
– Controller issues order to Government agency to
intercept any information transmitted through any
computer resource.
– Order is issued in the interest of the
• sovereignty or integrity of India,
• the security of the State,
• friendly relations with foreign States,
• public order or
• preventing incitement for commission of a cognizable offence
– Person in charge of the computer resource fails to
extend all facilities and technical assistance to decrypt
the information-punishment upto 7 years.
21. Sec 70 Protected System
• Ingredients
– Securing unauthorised access or attempting to secure
unauthorised access
– to ‘protected system’
• Acts covered by this section:
– Switching computer on / off
– Using installed software / hardware
– Installing software / hardware
– Port scanning
• Punishment
– Imprisonment up to 10 years and fine
• Cognizable, Non-Bailable, Court of Sessions
22. Cyber crimes punishable under
various Indian laws
• Sending pornographic or obscene emails are punishable under Section 67 of the IT Act.
• An offence under this section is punishable on first conviction with imprisonment for a term,
which may extend to five years and with fine, which may extend to One lakh rupees.
• In the event of a second or subsequent conviction the recommended punishment is
imprisonment for a term, which may extend to ten years and also with fine which may extend to
Two lakh rupees.
• Emails that are defamatory in nature are punishable under Section 500 of the Indian Penal
Code (IPC), which recommends an imprisonment of upto two years or a fine or both.
• Threatening emails are punishable under the provisions of the IPC pertaining to criminal
intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII)
• Email spoofing
Email spoofing is covered under provisions of the IPC relating to
fraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII)
23. Computer Related Crimes under IPC
and Special Laws
Sending threatening messages by email Sec 503 IPC
Sending defamatory messages by email Sec 499, 500 IPC
Forgery of electronic records Sec 463, 470, 471 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing Sec 416, 417, 463 IPC
Online sale of Drugs NDPS Act
Web-Jacking Sec. 383 IPC
Online sale of Arms Arms Act
24. Cognizability and Bailability
• Not mentioned in the Act
– Rely on Part II of Schedule I of CrPC
• If punishable with death, imprisonment for life or
imprisonment for more than 7 years: Cognizable,
Non-Bailable, Court of Session
• If punishable with imprisonment for 3 years and
upwards but not more than 7 years: Cognizable, Non -
Bailable, Magistrate of First Class
• If punishable with imprisonment of less than 3 years:
Non-Cognizable, Bailable, Any Magistrate (or
Controller of CAs)
24
25. Power of Police to Investigate
Section 156 Cr.P.C. : Power to
investigate cognizable offences.
Section 155 Cr.P.C. : Power to
investigate non cognizable offences.
Section 91 Cr.P.C. : Summon to produce
documents.
Section 160 Cr.P.C. : Summon to require
attendance of witnesses.
26. Power of Police to investigate (contd.)
Section 165 Cr.P.C. : Search by police officer.
Section 93 Cr.P.C : General provision as to
search warrants.
Section 47 Cr.P.C. : Search to arrest the
accused.
Section 78 of IT Act, 2000 : Power to
investigate offences-not below rank of DSP.
Section 80 of IT Act, 2000 : Power of police
officer to enter any public place and search
& arrest.
27. Case Study- BPO Data Theft
• The recently reported case of a Bank
Fraud in Pune in which some ex
employees of BPO arm of MPhasis Ltd
MsourcE, defrauded US Customers of Citi
Bank to the tune of RS 1.5 crores has
raised concerns of many kinds including
the role of "Data Protection".
28. Case Study (contd.)
• The crime was obviously committed using "Unauthorized Access" to the
"Electronic Account Space" of the customers. It is therefore firmly within
the domain of "Cyber Crimes".
• ITA-2000 is versatile enough to accommodate the aspects of crime not
covered by ITA-2000 but covered by other statutes since any IPC offence
committed with the use of "Electronic Documents" can be considered as a
crime with the use of a "Written Documents". "Cheating", "Conspiracy",
"Breach of Trust" etc are therefore applicable in the above case in addition
to section in ITA-2000.
• Under ITA-2000 the offence is recognized both under Section 66 and
Section 43. Accordingly, the persons involved are liable for imprisonment
and fine as well as a liability to pay damage to the victims to the maximum
extent of Rs 1 crore per victim for which the "Adjudication Process" can be
invoked.
29. Case Study (contd.)
• The BPO is liable for lack of security that enabled the commission of the fraud as well
as because of the vicarious responsibility for the ex-employee's involvement. The
process of getting the PIN number was during the tenure of the persons as
"Employees" and hence the organization is responsible for the crime.
• Some of the persons who have assisted others in the commission of the crime even
though they may not be directly involved as beneficiaries will also be liable under
Section 43 of ITA-2000.
• Under Section 79 and Section 85 of ITA-2000, vicarious responsibilities are indicated
both for the BPO and the Bank on the grounds of "Lack of Due Diligence".
• At the same time, if the crime is investigated in India under ITA-2000, then the fact
that the Bank was not using digital signatures for authenticating the customer
instructions is a matter which would amount to gross negligence on the part of the
Bank. (However, in this particular case since the victims appear to be US Citizens and
the Bank itself is US based, the crime may come under the jurisdiction of the US
courts and not Indian Courts).
30. FIR NO 76/02 PS
PARLIAMENT STREET
• Mrs. SONIA GANDHI RECEIVED THREATING E-MAILS
• E- MAIL FROM
– missonrevenge84@khalsa.com
– missionrevenge84@hotmail.com
• THE CASE WAS REFERRED
• ACCUSED PERSON LOST HIS PARENTS DURING 1984 RIOTS
30
31. ASLU Survey published in March 2003-
Incidence of Cyber crime in India
• Non Reporting-causes
UNAUTHORISED
• 60% feared negative
ACCESS 19% publicity
• 23% did not know police
equipped to handle
E-MAIL ABUSE 21%
cyber crimes
• 9% feared further cyber
attacks
DATA THEFT 33%
• 8% had no awareness of
cyber laws
• False arrest concerns
32. Better Enforcement initiatives
• Mumbai Cyber lab is a joint initiative of Mumbai police and
NASSCOM –more exchange and coordination of this kind
• Suggested amendments to the IT Act,2000-new provisions for child
pornography, etc
• More Public awareness campaigns
• Training of police officers to effectively combat cyber crimes
• More Cyber crime police cells set up across the country
• Effective E-surveillance
• Websites aid in creating awareness and encouraging reporting of
cyber crime cases.
• Specialised Training of forensic investigators and experts
• Active coordination between police and other law enforcement
agencies and authorities is required.
33. REFERENCE
SETH ASSOCIATES
ADVOCATES AND LEGAL CONSULTANTS
New Delhi Law Office: C-1/16, Daryaganj, New Delhi-110002, India
Tel:+91 (11) 55352272, +91 9868119137
www.sethassociates.com
Corporate Law Office: B-10, Sector 40, NOIDA-201301, N.C.R, India
Tel: +91 (120) 4352846, +91 9810155766
Fax: +91 (120) 4331304
E-mail: mail@sethassociates.com www.sethassociates.com