SlideShare a Scribd company logo
1 of 13
By :
Vishali Pandita
MBA (College Roll No- 14060)
Guru Nanak Institutes,Mullana Ambala
CYBERLAW
 Cyber law is a much newer phenomenon having emerged
much after the onset of internet . It is a generic term which
refers to all the legal and regulatory aspects of internet and the
www.
 So it is the part of the overall legal system that deals with the
internet,cyberspace and their respective legal issues.
 In other words you can say Cyber law is the law governing
cyber space
And cyber space includes computers/w, data storage
devices,internet websites,emails,and even electronic devices
such as cell phones, ATM machines etc.
Generally cyber law has been referred to “ law of
the internet”.
CYBERLAWSININDIA
• In May 2000,both the houses of the Indian
Parliament passed the Information
Technology Bill. The bill received the assent of
the president in August 2000 and came to be
known as the Information Technology
Act,2000.
• Cyber laws are contained in the IT ACT 2000.
ITACT2000
IT ACT 2000,has 13 chapters,94 sections and 4 schedules
• First 14 sections deals with some legal aspects
concerning digital signatures
• Further other sections deals with certifying authorities
who are licensed to issue digital signatures.
• Sections 43 to 47 provide for penalties and
compensation.
• Section 48 to 64 deals with Tribunals a appeal to high
court.
• Section 65 to 79 of the act deals with offences.
• Section 80 to 94 deals with miscellaneous of the act.
“Digital signature” means authentication of any
electronic record by a subscriber by means of an
electronic method or procedure in accordance with the
provisions of Section 3.
It consist of public key and private key.
Private key is allocated to a individual which
enables the user to fix a digital signature.
Public key is available to all who want to check
authentication of records.
Cyber crime is the latest and perhaps the most
complicated problem in the cyber world.
Cyber crimes are unlawful acts where computer is
used either as a tool :or a target :or both.
It can be categories as :–
1. Cyber crime against persons
2. Cyber crime against property
3. Cyber crime against government
Cyber law covers the intellectual property laws that relate to
cyber space and its constituents . This includes:
Copyright law in relation to computer software ,computer
source code etc.
Trademark law in relation to domain names.
Semiconductor law ,which relates to the protection of
semiconductor design and layouts.
Patent law in relation to computer hardware and software.
Data protection and privacy laws aim to achieve a fair
balance between the privacy rights of the individual
and the interests of data controllers such as: banks,
hospitals , email service providers etc.
Many nations have enacted legislation relating to
data protection and privacy within their jurisdictions.
These laws would probably play a vital role, as the
dependence on insecure networks such as the internet
grows further.
AhmadabadBlastCase
5 minutes before the blast an e-mail was sent to national TV
Channels warning about blasts in Ahmedabad.The e-mail was traced
to Kenneth Haywood's computer, who stayed at Gunina apartment in
Navi Mumbai. Haywood claimed that his computer was hacked. A
technician associated with VSNL had asked him not to change the
password of his wireless Internet Network.Haywoods laptop and
computer was then sent to the forensic science laboratory at Kalian.
Wi-fi system was used to hack Haywood’s account to send e-mail
Need For Cyber Laws
1. Laws are necessary in all segments of society, and
e-commerce is exception .
2. All internet users , including minors , need to be assured of
their privacy and the safety of their personal information
online .
3. In today’s highly digitalized world , almost everyone is affected
by cyber law.
4. Almost all companies extensively depend upon their
computer networks and keep their valuable data in
electronic form.
5. Government forms including income tax returns , company
law forms etc are now filled in electronic forms.
6. Consumers are increasingly using credit cards for shopping.
ADVNATAGESOFCYBERLAW
1. IT ACT 2000 attempts to change outdated laws and
provides ways to deal with cyber crime.
2. Companies shall now be able to carry out electronic
commerce using legal infrastructure provided by the
act
3. Digital signatures have been given legal validity and
sanction in the Act.
4. The act now allows government to issue notification
on the web thus handling e-goverence.
5. The law sets up the territorial jurisdictions of the
adjudicating officers for cyber crimes and the crime
regulations appellate tribunal.
DONOT SHARE IT
WITH ANYONE ELSE
AND CHANGE IT AFTER
EVERY 3 MONTHS

More Related Content

What's hot (20)

Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber contract
Cyber contractCyber contract
Cyber contract
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 

Viewers also liked

Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Quincy Kiptoo
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Understanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesUnderstanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesPavan Kumar Vijay
 
Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )Gurparvesh kaur
 
Importance of Business Law for MBA Students
Importance of Business Law for MBA StudentsImportance of Business Law for MBA Students
Importance of Business Law for MBA StudentsProf. (Dr.) Tabrez Ahmad
 
Shares and its types
Shares and its typesShares and its types
Shares and its typesVishnu NK
 
Companies Act 1956
Companies Act 1956Companies Act 1956
Companies Act 1956wizkidrx
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection ActAtif Ghayas
 

Viewers also liked (17)

Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2
 
Different kinds of conscience
Different kinds of conscienceDifferent kinds of conscience
Different kinds of conscience
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
borrowing powers
borrowing powersborrowing powers
borrowing powers
 
Understanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesUnderstanding Preferential Allotment of Securities
Understanding Preferential Allotment of Securities
 
Borrowing powers
Borrowing powersBorrowing powers
Borrowing powers
 
Oppression and Management
Oppression and ManagementOppression and Management
Oppression and Management
 
Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )
 
Importance of Business Law for MBA Students
Importance of Business Law for MBA StudentsImportance of Business Law for MBA Students
Importance of Business Law for MBA Students
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Company law
Company lawCompany law
Company law
 
Business law slides
Business law slidesBusiness law slides
Business law slides
 
Shares and its types
Shares and its typesShares and its types
Shares and its types
 
Companies act 1956-ppt
Companies act 1956-pptCompanies act 1956-ppt
Companies act 1956-ppt
 
Companies Act 1956
Companies Act 1956Companies Act 1956
Companies Act 1956
 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
 
Sales of goods act
Sales of goods actSales of goods act
Sales of goods act
 

Similar to Cyber law

India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03 ATHULYARAJDS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 

Similar to Cyber law (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Cyber law

  • 1. By : Vishali Pandita MBA (College Roll No- 14060) Guru Nanak Institutes,Mullana Ambala
  • 2. CYBERLAW  Cyber law is a much newer phenomenon having emerged much after the onset of internet . It is a generic term which refers to all the legal and regulatory aspects of internet and the www.  So it is the part of the overall legal system that deals with the internet,cyberspace and their respective legal issues.  In other words you can say Cyber law is the law governing cyber space And cyber space includes computers/w, data storage devices,internet websites,emails,and even electronic devices such as cell phones, ATM machines etc. Generally cyber law has been referred to “ law of the internet”.
  • 3. CYBERLAWSININDIA • In May 2000,both the houses of the Indian Parliament passed the Information Technology Bill. The bill received the assent of the president in August 2000 and came to be known as the Information Technology Act,2000. • Cyber laws are contained in the IT ACT 2000.
  • 4. ITACT2000 IT ACT 2000,has 13 chapters,94 sections and 4 schedules • First 14 sections deals with some legal aspects concerning digital signatures • Further other sections deals with certifying authorities who are licensed to issue digital signatures. • Sections 43 to 47 provide for penalties and compensation. • Section 48 to 64 deals with Tribunals a appeal to high court. • Section 65 to 79 of the act deals with offences. • Section 80 to 94 deals with miscellaneous of the act.
  • 5.
  • 6. “Digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of Section 3. It consist of public key and private key. Private key is allocated to a individual which enables the user to fix a digital signature. Public key is available to all who want to check authentication of records.
  • 7. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crimes are unlawful acts where computer is used either as a tool :or a target :or both. It can be categories as :– 1. Cyber crime against persons 2. Cyber crime against property 3. Cyber crime against government
  • 8. Cyber law covers the intellectual property laws that relate to cyber space and its constituents . This includes: Copyright law in relation to computer software ,computer source code etc. Trademark law in relation to domain names. Semiconductor law ,which relates to the protection of semiconductor design and layouts. Patent law in relation to computer hardware and software.
  • 9. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as: banks, hospitals , email service providers etc. Many nations have enacted legislation relating to data protection and privacy within their jurisdictions. These laws would probably play a vital role, as the dependence on insecure networks such as the internet grows further.
  • 10. AhmadabadBlastCase 5 minutes before the blast an e-mail was sent to national TV Channels warning about blasts in Ahmedabad.The e-mail was traced to Kenneth Haywood's computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet Network.Haywoods laptop and computer was then sent to the forensic science laboratory at Kalian. Wi-fi system was used to hack Haywood’s account to send e-mail
  • 11. Need For Cyber Laws 1. Laws are necessary in all segments of society, and e-commerce is exception . 2. All internet users , including minors , need to be assured of their privacy and the safety of their personal information online . 3. In today’s highly digitalized world , almost everyone is affected by cyber law. 4. Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. 5. Government forms including income tax returns , company law forms etc are now filled in electronic forms. 6. Consumers are increasingly using credit cards for shopping.
  • 12. ADVNATAGESOFCYBERLAW 1. IT ACT 2000 attempts to change outdated laws and provides ways to deal with cyber crime. 2. Companies shall now be able to carry out electronic commerce using legal infrastructure provided by the act 3. Digital signatures have been given legal validity and sanction in the Act. 4. The act now allows government to issue notification on the web thus handling e-goverence. 5. The law sets up the territorial jurisdictions of the adjudicating officers for cyber crimes and the crime regulations appellate tribunal.
  • 13. DONOT SHARE IT WITH ANYONE ELSE AND CHANGE IT AFTER EVERY 3 MONTHS