SlideShare a Scribd company logo
AN INITIATIVE OF SHIVNANDANI INDUSTRIES PVT LTD AND JAGDAMB JANAKI NAWAL JANAKI
SOCIETY
Cyber law and Cyber crime in India
CompiledbyCol Mukteshwar Prasad(Retd), MTech,CE(I),FIE(I),FIETE,FISLE,FInstOD,AMCSI
Contact -9007224278, e-mail –muktesh_prasad@yahoo.co.in
for book ”DecodingServicesSelectionBoard” and SSB guidance and training at Shivnandani Edu and
Defence Academy
7/2/2015
An Overview Of Cyber Laws vs. Cyber Crimes: In Indian Perspective
Due to immense increase in the use of Internet and dependency of individuals in every field, a
number of new crimes related to Computer and other gadgets based on internet have evolved in
the society. Such crimes where use of computers coupled with the use of Internet is involved are
broadly termed as Cyber Crimes.
Governing Laws
There was no statute in India for governing Cyber Laws involving privacy issues, jurisdiction
issues, intellectual property rights issues and a number of other legal questions. With the
tendency of misusing of technology, there arisen a need of strict statutory laws to regulate the
criminal activities in the cyber world and to protect the true sense of technology
"INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] was enacted by Parliament of
India to protect the field of e-commerce, e-governance, e-banking as well as penalties and
punishments in the field of cyber crimes. The above Act was further amended in the form of IT
Amendment Act, 2008 [ITAA-2008].
The ITA-2000 defines 'Computer' means any electronic magnetic, optical or other high-speed
data processing device or system which performs logical, arithmetic, and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input, output,
processing, storage, computer software, or communication facilities which are connected or
related to the computer in a computer system or computer network. The word 'computer' and
'computer system' have been so widely defined and interpreted to mean any electronic device
with data processing capability, performing computer functions like logical, arithmetic and
memory functions with input, storage and output capabilities and therefore any high-end
programmable gadgets like even a washing machine or switches and routers used in a network
can all be brought under the definition.
Scope and applicability
The scope and applicability of ITA-2000 was increased by its amendment in 2008. The word
'communication devices' inserted having an inclusive definition, taking into its coverage cell
phones, personal digital assistance or such other devices used to transmit any text, video etc like
what was later being marketed as iPad or other similar devices on Wi-fi and cellular models.
Though ITA- 2000 defined 'digital signature', however said definition was incapable to cater
needs of hour and therefore the term 'Electronic signature' was introduced and defined in the
ITAA -2008 as a legally valid mode of executing signatures. This includes digital signatures as
one of the modes of signatures and is far broader in ambit covering biometrics and other new
forms of creating electronic signatures not confining the recognition to digital signature process
alone.
The new amendment has replaced Section 43 with Section 66. The Word "hacking" used in
Section 66 of earlier Act has been removed and named as "data theft" in this section and has
further been widened in the form of Sections 66A to 66F. The section covers the offences such as
the sending of offensive messages through communication service, misleading the recipient of
the origin of such messages, dishonestly receiving stolen computers or other communication
device, stealing electronic signature or identity such as using another persons' password or
electronic signature, cheating by personation through computer resource or a communication
device, publicly publishing the information about any person's location without prior permission
or consent, cyber terrorism, the acts of access to a commuter resource without authorization,
such acts which can lead to any injury to any person or result in damage or destruction of any
property, while trying to contaminate the computer through any virus like Trojan etc. The
offences covered under section 66 are cognizable and non-bailable. Whereas, the consequence of
Section 43 of earlier Act were Civil in nature having its remedy in the form of damages and
compensation only, but under Section 66 of the Amendment Act, if such act is done with
criminal intention that is mens rea, then it will attract criminal liability having remedy in
imprisonment or fine or both.
Adjudication
Adjudication powers and procedures have been dealt in Sections 46 and thereafter. As per the
Act, the Central Government may appoint any officer not below the rank of a director to the
Government of India or a state Government as the adjudicator. The I.T. Secretary in any state is
normally the nominated Adjudicator for all civil offences arising out of data thefts and resultant
losses in the particular state. Very few applications were received during first 10 years of
existence of the ITA, that too in the major metros only. However, the trend of receiving
complaint under ITA is rapidly growing. The first adjudication obtained under this provision was
in Chennai, Tamil Nadu, in a case involving ICICI Bank in which the bank was told to
compensate the applicant with the amount wrongfully debited in Internet Banking, along with
cost and damages. There is an appellate procedure under this process and the composition of
Cyber Appellate Tribunal at the national level, has also been described in the Act. Every
adjudicating officer has the powers of a civil court and the Cyber Appellate Tribunal has the
powers vested in a civil court under the Code of Civil Procedure.
The major Acts , which got amended after enactment of ITA
The Indian Penal Code, 1860
The Indian Penal Code was amended by inserting the word 'electronic' thereby treating the
electronic records and documents on a par with physical records and documents. The Sections
dealing with false entry in a record or false document etc (e.g. 192, 204, 463, 464, 464, 468 to
470, 471, 474, 476 etc) have since been amended as 'electronic record and electronic document'
thereby bringing within the ambit of IPC. Now, electronic record and electronic documents has
been treated just like physical records and documents during commission of acts of forgery or
falsification of physical records in a crime. After the above amendment, the investigating
agencies file the cases/ charge-sheet quoting the relevant sections from IPC under section
463,464, 468 and 469 read with the ITA/ITAA under Sections 43 and 66 in like offences to
ensure the evidence and/or punishment can be covered and proved under either of these or under
both legislation.
The Indian Evidence Act 1872
Prior to enactment of ITA, all evidences in a court were in the physical form only. After
existence of ITA, the electronic records and documents were recognized. The definition part of
Indian Evidence Act was amended as "all documents including electronic records" were
substituted. Other words e.g. 'digital signature', 'electronic form', 'secure electronic record'
'information' as used in the ITA, were also inserted to make them part of the evidentiary
importance under the Act. The important amendment was seen by recognition of admissibility of
electronic records as evidence as enshrined in Section 65B of the Act.
The Bankers' Books Evidence (BBE) Act 1891:
Before passing of ITA, a bank was supposed to produce the original ledger or other physical
register or document during evidence before a Court. After enactment of ITA, the definitions part
of the BBE Act stood amended as: "'bankers ' books' include ledgers, day-books, cashbooks,
account-books and all other books used in the ordinary business of a bank whether kept in the
written form or as printouts of data stored in a floppy, disc, tape or any other form of electro-
magnetic data storage device". When the books consist of printouts of data stored in a floppy,
disc, tape etc, a printout of such entry ...certified in accordance with the provisions ....to the
effect that it is a printout of such entry or a copy of such printout by the principal accountant or
branch manager; and (b) a certificate by a person in-charge of computer system containing a
brief description of the computer system and the particulars of the safeguards adopted by the
system to ensure that data is entered or any other operation performed only by authorized
persons; the safeguards adopted to prevent and detect unauthorized change of data ...to retrieve
data that is lost due to systemic failure or ....
The above amendment in the provisions in Bankers Books Evidence Act recognized the printout
from a computer system and other electronic document as a valid document during course of
evidence, provided, such print-out or electronic document is accompanied by a certificate in
terms as mentioned above.
Issues not covered under ITA
ITA and ITAA is though landmark first step and became mile-stone in the technological growth
of the nation; however the existing law is not sufficed. Many issues in Cyber crime and many
crimes are still left uncovered.
Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA.
Jurisdiction has been mentioned in Sections 46, 48, 57 and 61 in the context of adjudication
process and the appellate procedure connected with and again in Section 80 and as part of the
police officers' powers to enter, search a public place for a cyber crime etc. Since cyber crimes
are basically computer based crimes and therefore if the mail of someone is hacked in one place
by accused sitting far in another state, determination of concerned P.S., who will take cognizance
is difficult. It is seen that the investigators generally try to avoid accepting such complaints on
the grounds of jurisdiction. Since the cyber crime is geography-agnostic, borderless, territory-
free and generally spread over territories of several jurisdiction; it is needed to proper training is
to be given to all concerned players in the field.
Preservation of evidence is also big issue. It is obvious that while filing cases under IT Act, very
often, chances to destroy the necessary easily as evidences may lie in some system like the
intermediaries' computers or sometimes in the opponent's computer system too.
However, most of the cyber crimes in the nation are still brought under the relevant sections of
IPC read with the comparative sections of ITA or the ITAA which gives a comfort factor to the
investigating agencies that even if the ITA part of the case is lost, the accused cannot escape
from the IPC part.
Conclusion
Society as on today is happening more and more dependent upon technology and crime based on
electronic offences are bound to increase. Endeavor of law making machinery of the nation
should be in accordance with mile compared to the fraudsters, to keep the crimes lowest. Hence,
it should be the persistent efforts of rulers and law makers to ensure that governing laws of
technology contains every aspect and issues of cyber crime and further grow in continuous and
healthy manner to keep constant vigil and check over the related crimes.
Cyber Law of India : Introduction
In Simple way we can say that cyber crime is unlawful acts wherein the computer is
either a tool or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as
theft, fraud, forgery, defamation and mischief, all of which are subject to the
Indian Penal Code. The abuse of computers has also given birth to a gamut of new
age crimes that are addressed by the Information Technology Act, 2000.
We can categorize Cyber crimes in two ways
1.The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
2.The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.
Technical Aspects
Technological advancements have created new possibilities for criminal activity, in
particular the criminal misuse of information technologies such as
a. Unauthorized access & Hacking:-
Access means gaining entry into, instructing or communicating with the logical,
arithmetical, or memory function resources of a computer, computer system or
computer network.
Unauthorized access would therefore mean any kind of access without the permission
of either the rightful owner or the person in charge of a computer, computer system
or computer network.
Every act committed towards breaking into a computer and/or network is hacking.
Hackers write or use ready-made computer programs to attack the target computer.
They possess the desire to destruct and they get the kick out of such destruction.
Some hackers hack for personal monetary gains, such as to stealing the credit card
information, transferring money from various bank accounts to their own account
followed by withdrawal of money.
By hacking web server taking control on another persons website called as web
hijacking
b. Trojan Attack:-
The program that act like something useful but do the things that are quiet damping.
The programs of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server part. When the victim
(unknowingly) runs the server on its machine, the attacker will then use the Client to
connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some
functions of the trojans use the UDP protocol as well.
c. Virus and Worm attack:-
A program that has capability to infect other programs and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are called
as worms.
d. E-mail & IRC related crimes:-
1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source
when it was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users -
similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by
sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email
message to a particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbalâ; attacks, clone attacks, and flood
attacks.
e. Denial of Service attacks:-
Flooding a computer resource with more requests than it can handle. This causes the
resource to crash thereby denying access of service to authorized users.
Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to
a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
Distributed DOS
A distributed denial of service (DoS) attack is accomplished by using
the Internet to break into computers and using them to attack a network.
Hundreds or thousands of computer systems across the Internet can be
turned into “zombies” and used to attack another system or website.
Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like
NW bandwith, RAM, CPU time. Even power, cool air, or water can
affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components
e. Pornography:-
The literal mining of the term 'Pornography' is “describing or showing
sexual acts in order to cause sexual excitement through books, films,
etc.”
This would include pornographic websites; pornographic material
produced using computers and use of internet to download and transmit
pornographic videos, pictures, photos, writings etc.
Adult entertainment is largest industry on internet.There are more than
420 million individual pornographic webpages today.
Research shows that 50% of the web-sites containing potentially illegal
contents relating to child abuse were ‘Pay-Per-View’. This indicates
that abusive images of children over Internet have been highly
commercialized.
Pornography delivered over mobile phones is now a burgeoning
business, “driven by the increase in sophisticated services that deliver
video clips and streaming video, in addition to text and images.”
Effects of Pornography
Research has shown that pornography and its messages are involved in
shaping attitudes and encouraging behavior that can harm individual
users and their families.
Pornography is often viewed in secret, which creates deception within
marriages that can lead to divorce in some cases.
In addition, pornography promotes the allure of adultery, prostitution
and unreal expectations that can result in dangerous promiscuous
behavior.
Some of the common, but false messages sent by sexualized culture.
Sex with anyone, under any circumstances, any way it is desired, is
beneficial and does not have negative consequences.
Women have one value - to meet the sexual demands of men.
Marriage and children are obstacles to sexual fulfillment.
Everyone is involved in promiscuous sexual activity, infidelity and
premarital sex.
Pornography Addiction
Dr. Victor Cline, an expert on Sexual Addiction, found that there is a
four-step progression among many who consume pornography.
1.Addiction: Pornography provides a powerful sexual stimulant or
aphrodisiac effect, followed by sexual release, most often through
masturbation.
2.Escalation: Over time addicts require more explicit and deviant
material to meet their sexual "needs."
3.Desensitization: What was first perceived as gross, shocking and
disturbing, in time becomes common and acceptable.
4.Acting out sexually: There is an increasing tendency to act out
behaviors viewed in pornography.
g. Forgery:-
Counterfeit currency notes, postage and revenue stamps, mark sheets
etc can be forged using sophisticated computers, printers and scanners.
Also impersonate another person is considered forgery.
h. IPR Violations:-
These include software piracy, copyright infringement, trademarks
violations, theft of computer source code, patent violations. etc.
Cyber Squatting- Domain names are also trademarks and protected by
ICANN’s domain dispute resolution policy and also under trademark
laws.
Cyber Squatters registers domain name identical to popular service
provider’s domain so as to attract their users and get benefit from it.
i. Cyber Terrorism:-
Targeted attacks on military installations, power plants, air traffic
control, banks, trail traffic control, telecommunication networks are the
most likely targets. Others like police, medical, fire and rescue systems
etc.
Cyberterrorism is an attractive option for modern terrorists for several
reasons.
1.It is cheaper than traditional terrorist methods.
2.Cyberterrorism is more anonymous than traditional terrorist methods.
3.The variety and number of targets are enormous.
4.Cyberterrorism can be conducted remotely, a feature that isespecially
appealing to terrorists.
5.Cyberterrorism has the potential to affect directly a larger number of
people.
j. Banking/Credit card Related crimes:-
In the corporate world, Internet hackers are continually looking for
opportunities to compromise a company’s security in order to gain
access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small
amount of money from all customer accounts and adding it to own
account also called as salami.
k. E-commerce/ Investment Frauds:-
Sales and Investment frauds. An offering that uses false or fraudulent
claims to solicit investments or loans, or that provides for the purchase,
use, or trade of forged or counterfeit securities.
Merchandise or services that were purchased or contracted by
individuals online are never delivered.
The fraud attributable to the misrepresentation of a product advertised
for sale through an Internet auction site or the non-delivery of products
purchased through an Internet auction site.
Investors are enticed to invest in this fraudulent scheme by the promises
of abnormally high profits.
l. Sale of illegal articles:-
This would include trade of narcotics, weapons and wildlife etc., by
posting information on websites, auction websites, and bulletin boards
or simply by using email communication.
Research shows that number of people employed in this criminal area.
Daily peoples receiving so many emails with offer of banned or illegal
products for sale.
m. Online gambling:-
There are millions of websites hosted on servers abroad, that offer
online gambling. In fact, it is believed that many of these websites are
actually fronts for money laundering.
n. Defamation: -
Defamation can be understood as the intentional infringement of
another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of
computers and / or the Internet. E.g. someone publishes defamatory
matter about someone on a website or sends e-mails containing
defamatory information to all of that person's friends. Information
posted to a bulletin board can be accessed by anyone. This means that
anyone can place
Cyber defamation is also called as Cyber smearing.
Cyber Stacking:-
Cyber stalking involves following a persons movements across the
Internet by posting messages (sometimes threatening) on the bulletin
boards frequented by the victim, entering the chat-rooms frequented by
the victim, constantly bombarding the victim with emails etc.
In general, the harasser intends to cause emotional distress and has no
legitimate purpose to his communications.
p. Pedophiles:-
Also there are persons who intentionally prey upon children. Specially
with a teen they will let the teen know that fully understand the feelings
towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or
indecent acts.
Pedophiles lure the children by distributing pornographic material, then
they try to meet them for sex or to take their nude photographs
including their engagement in sexual positions.
q. Identity Theft :-
Identity theft is the fastest growing crime in countries like America.
Identity theft occurs when someone appropriates another's personal
information without their knowledge to commit theft or fraud.
Identity theft is a vehicle for perpetrating other types of fraud schemes.
r. Data diddling:-
Data diddling involves changing data prior or during input into a
computer.
In other words, information is changed from the way it should be
entered by a person typing in the data, a virus that changes data, the
programmer of the database or application, or anyone else involved in
the process of having information stored in a computer file.
It also include automatic changing the financial information for some
time before processing and then restoring original information.
s. Theft of Internet Hours:-
Unauthorized use of Internet hours paid for by another person.
By gaining access to an organisation's telephone switchboard (PBX)
individuals or criminal organizations can obtain access to dial-in/dial-
out circuits and then make their own calls or sell call time to third
parties.
Additional forms of service theft include capturing 'calling card' details
and on-selling calls charged to the calling card account, and
counterfeiting or illicit reprogramming of stored value telephone cards.
t. Theft of computer system(Hardware):-
This type of offence involves the theft of a computer, some part(s) of a
computer or a peripheral attached to the computer.
u. Physically damaging a computer system:-
Physically damaging a computer or its peripheralseither by shock, fire
or excess electric supply etc.
v. Breach of Privacy and Confidentiality
Privacy
Privacy refers to the right of an individual/s to determine when, how
and to what extent his or her personal data will be shared with others.
Breach of privacy means unauthorized use or distribution or disclosure
of personal information like medical records, sexual preferences,
financial status etc.
Confidentiality
It means non disclosure of information to unauthorized or unwanted
persons.
In addition to Personal information some other type of information
which useful for business and leakage of such information to other
persons may cause damage to business or person, such information
should be protected.
Generally for protecting secrecy of such information, parties while
sharing information forms an agreement about he procedure of handling
of information and to not to disclose such information to third parties or
use it in such a way that it will be disclosed to third parties.
Many times party or their employees leak such valuable information for
monitory gains and causes breach of contract of confidentiality.
Special techniques such as Social Engineering are commonly used to
obtain confidential information.
Cyber Law and Cyber Crime

More Related Content

What's hot

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Varsha Mali
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
Rakesh Otari
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
santoshdkamat
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
vijayjituri
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
sparun
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
anveshika thakur
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Raja Farhan Saeed
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
Prakash Masagi
 

What's hot (19)

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
 

Similar to Cyber Law and Cyber Crime

Manoj 1
Manoj 1Manoj 1
Manoj 1
manojnd
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
Monica Thakur
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Cyber law
Cyber lawCyber law
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
Nadeem Kazi
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008

Similar to Cyber Law and Cyber Crime (20)

Manoj 1
Manoj 1Manoj 1
Manoj 1
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber law
Cyber lawCyber law
Cyber law
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 

More from Col Mukteshwar Prasad

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
The Psychology Behind Unethical Behavior 2.0.pptx
The Psychology Behind Unethical Behavior 2.0.pptxThe Psychology Behind Unethical Behavior 2.0.pptx
The Psychology Behind Unethical Behavior 2.0.pptx
Col Mukteshwar Prasad
 
BAD BOSS.pptx
BAD BOSS.pptxBAD BOSS.pptx
BAD BOSS.pptx
Col Mukteshwar Prasad
 
Mindset 2.0.pptx
Mindset 2.0.pptxMindset 2.0.pptx
Mindset 2.0.pptx
Col Mukteshwar Prasad
 
Why Psychology Theory 2.0.pptx
Why Psychology Theory 2.0.pptxWhy Psychology Theory 2.0.pptx
Why Psychology Theory 2.0.pptx
Col Mukteshwar Prasad
 
Personology Murray.pptx
Personology Murray.pptxPersonology Murray.pptx
Personology Murray.pptx
Col Mukteshwar Prasad
 
Emotions and Types of Emotional Responses.pptx
Emotions and Types of Emotional Responses.pptxEmotions and Types of Emotional Responses.pptx
Emotions and Types of Emotional Responses.pptx
Col Mukteshwar Prasad
 
Understanding Anger.pptx
Understanding Anger.pptxUnderstanding Anger.pptx
Understanding Anger.pptx
Col Mukteshwar Prasad
 
Cognitive Distortions New.pptx
Cognitive Distortions New.pptxCognitive Distortions New.pptx
Cognitive Distortions New.pptx
Col Mukteshwar Prasad
 
Trauma Bonding.pptx
Trauma Bonding.pptxTrauma Bonding.pptx
Trauma Bonding.pptx
Col Mukteshwar Prasad
 
Emotional Abuse.pptx
Emotional Abuse.pptxEmotional Abuse.pptx
Emotional Abuse.pptx
Col Mukteshwar Prasad
 
Attachement Styles in Adulthood 2.0.pptx
Attachement Styles in Adulthood 2.0.pptxAttachement Styles in Adulthood 2.0.pptx
Attachement Styles in Adulthood 2.0.pptx
Col Mukteshwar Prasad
 
Conduct Disorder.pptx
Conduct Disorder.pptxConduct Disorder.pptx
Conduct Disorder.pptx
Col Mukteshwar Prasad
 
Oppostion Defiant Disorder(ODD).pptx
Oppostion Defiant Disorder(ODD).pptxOppostion Defiant Disorder(ODD).pptx
Oppostion Defiant Disorder(ODD).pptx
Col Mukteshwar Prasad
 
Types of Intelligence.PPT
Types of Intelligence.PPTTypes of Intelligence.PPT
Types of Intelligence.PPT
Col Mukteshwar Prasad
 
Attachment Theory.pptx
Attachment Theory.pptxAttachment Theory.pptx
Attachment Theory.pptx
Col Mukteshwar Prasad
 
7.Defense mechanisms-Major Image-Distorting Defense Level.pptx
7.Defense mechanisms-Major Image-Distorting Defense Level.pptx7.Defense mechanisms-Major Image-Distorting Defense Level.pptx
7.Defense mechanisms-Major Image-Distorting Defense Level.pptx
Col Mukteshwar Prasad
 
e Rupee.docx
e Rupee.docxe Rupee.docx
e Rupee.docx
Col Mukteshwar Prasad
 
Moonlighting in India.docx
Moonlighting in India.docxMoonlighting in India.docx
Moonlighting in India.docx
Col Mukteshwar Prasad
 
6.Defense mechanisms-Disavowal Defense Level.pptx
6.Defense mechanisms-Disavowal Defense Level.pptx6.Defense mechanisms-Disavowal Defense Level.pptx
6.Defense mechanisms-Disavowal Defense Level.pptx
Col Mukteshwar Prasad
 

More from Col Mukteshwar Prasad (20)

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
The Psychology Behind Unethical Behavior 2.0.pptx
The Psychology Behind Unethical Behavior 2.0.pptxThe Psychology Behind Unethical Behavior 2.0.pptx
The Psychology Behind Unethical Behavior 2.0.pptx
 
BAD BOSS.pptx
BAD BOSS.pptxBAD BOSS.pptx
BAD BOSS.pptx
 
Mindset 2.0.pptx
Mindset 2.0.pptxMindset 2.0.pptx
Mindset 2.0.pptx
 
Why Psychology Theory 2.0.pptx
Why Psychology Theory 2.0.pptxWhy Psychology Theory 2.0.pptx
Why Psychology Theory 2.0.pptx
 
Personology Murray.pptx
Personology Murray.pptxPersonology Murray.pptx
Personology Murray.pptx
 
Emotions and Types of Emotional Responses.pptx
Emotions and Types of Emotional Responses.pptxEmotions and Types of Emotional Responses.pptx
Emotions and Types of Emotional Responses.pptx
 
Understanding Anger.pptx
Understanding Anger.pptxUnderstanding Anger.pptx
Understanding Anger.pptx
 
Cognitive Distortions New.pptx
Cognitive Distortions New.pptxCognitive Distortions New.pptx
Cognitive Distortions New.pptx
 
Trauma Bonding.pptx
Trauma Bonding.pptxTrauma Bonding.pptx
Trauma Bonding.pptx
 
Emotional Abuse.pptx
Emotional Abuse.pptxEmotional Abuse.pptx
Emotional Abuse.pptx
 
Attachement Styles in Adulthood 2.0.pptx
Attachement Styles in Adulthood 2.0.pptxAttachement Styles in Adulthood 2.0.pptx
Attachement Styles in Adulthood 2.0.pptx
 
Conduct Disorder.pptx
Conduct Disorder.pptxConduct Disorder.pptx
Conduct Disorder.pptx
 
Oppostion Defiant Disorder(ODD).pptx
Oppostion Defiant Disorder(ODD).pptxOppostion Defiant Disorder(ODD).pptx
Oppostion Defiant Disorder(ODD).pptx
 
Types of Intelligence.PPT
Types of Intelligence.PPTTypes of Intelligence.PPT
Types of Intelligence.PPT
 
Attachment Theory.pptx
Attachment Theory.pptxAttachment Theory.pptx
Attachment Theory.pptx
 
7.Defense mechanisms-Major Image-Distorting Defense Level.pptx
7.Defense mechanisms-Major Image-Distorting Defense Level.pptx7.Defense mechanisms-Major Image-Distorting Defense Level.pptx
7.Defense mechanisms-Major Image-Distorting Defense Level.pptx
 
e Rupee.docx
e Rupee.docxe Rupee.docx
e Rupee.docx
 
Moonlighting in India.docx
Moonlighting in India.docxMoonlighting in India.docx
Moonlighting in India.docx
 
6.Defense mechanisms-Disavowal Defense Level.pptx
6.Defense mechanisms-Disavowal Defense Level.pptx6.Defense mechanisms-Disavowal Defense Level.pptx
6.Defense mechanisms-Disavowal Defense Level.pptx
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 

Cyber Law and Cyber Crime

  • 1. AN INITIATIVE OF SHIVNANDANI INDUSTRIES PVT LTD AND JAGDAMB JANAKI NAWAL JANAKI SOCIETY Cyber law and Cyber crime in India CompiledbyCol Mukteshwar Prasad(Retd), MTech,CE(I),FIE(I),FIETE,FISLE,FInstOD,AMCSI Contact -9007224278, e-mail –muktesh_prasad@yahoo.co.in for book ”DecodingServicesSelectionBoard” and SSB guidance and training at Shivnandani Edu and Defence Academy 7/2/2015
  • 2. An Overview Of Cyber Laws vs. Cyber Crimes: In Indian Perspective Due to immense increase in the use of Internet and dependency of individuals in every field, a number of new crimes related to Computer and other gadgets based on internet have evolved in the society. Such crimes where use of computers coupled with the use of Internet is involved are broadly termed as Cyber Crimes. Governing Laws There was no statute in India for governing Cyber Laws involving privacy issues, jurisdiction issues, intellectual property rights issues and a number of other legal questions. With the tendency of misusing of technology, there arisen a need of strict statutory laws to regulate the criminal activities in the cyber world and to protect the true sense of technology "INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] was enacted by Parliament of India to protect the field of e-commerce, e-governance, e-banking as well as penalties and punishments in the field of cyber crimes. The above Act was further amended in the form of IT Amendment Act, 2008 [ITAA-2008]. The ITA-2000 defines 'Computer' means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network. The word 'computer' and 'computer system' have been so widely defined and interpreted to mean any electronic device with data processing capability, performing computer functions like logical, arithmetic and memory functions with input, storage and output capabilities and therefore any high-end programmable gadgets like even a washing machine or switches and routers used in a network can all be brought under the definition. Scope and applicability The scope and applicability of ITA-2000 was increased by its amendment in 2008. The word 'communication devices' inserted having an inclusive definition, taking into its coverage cell phones, personal digital assistance or such other devices used to transmit any text, video etc like what was later being marketed as iPad or other similar devices on Wi-fi and cellular models. Though ITA- 2000 defined 'digital signature', however said definition was incapable to cater needs of hour and therefore the term 'Electronic signature' was introduced and defined in the ITAA -2008 as a legally valid mode of executing signatures. This includes digital signatures as one of the modes of signatures and is far broader in ambit covering biometrics and other new forms of creating electronic signatures not confining the recognition to digital signature process alone. The new amendment has replaced Section 43 with Section 66. The Word "hacking" used in Section 66 of earlier Act has been removed and named as "data theft" in this section and has further been widened in the form of Sections 66A to 66F. The section covers the offences such as the sending of offensive messages through communication service, misleading the recipient of
  • 3. the origin of such messages, dishonestly receiving stolen computers or other communication device, stealing electronic signature or identity such as using another persons' password or electronic signature, cheating by personation through computer resource or a communication device, publicly publishing the information about any person's location without prior permission or consent, cyber terrorism, the acts of access to a commuter resource without authorization, such acts which can lead to any injury to any person or result in damage or destruction of any property, while trying to contaminate the computer through any virus like Trojan etc. The offences covered under section 66 are cognizable and non-bailable. Whereas, the consequence of Section 43 of earlier Act were Civil in nature having its remedy in the form of damages and compensation only, but under Section 66 of the Amendment Act, if such act is done with criminal intention that is mens rea, then it will attract criminal liability having remedy in imprisonment or fine or both. Adjudication Adjudication powers and procedures have been dealt in Sections 46 and thereafter. As per the Act, the Central Government may appoint any officer not below the rank of a director to the Government of India or a state Government as the adjudicator. The I.T. Secretary in any state is normally the nominated Adjudicator for all civil offences arising out of data thefts and resultant losses in the particular state. Very few applications were received during first 10 years of existence of the ITA, that too in the major metros only. However, the trend of receiving complaint under ITA is rapidly growing. The first adjudication obtained under this provision was in Chennai, Tamil Nadu, in a case involving ICICI Bank in which the bank was told to compensate the applicant with the amount wrongfully debited in Internet Banking, along with cost and damages. There is an appellate procedure under this process and the composition of Cyber Appellate Tribunal at the national level, has also been described in the Act. Every adjudicating officer has the powers of a civil court and the Cyber Appellate Tribunal has the powers vested in a civil court under the Code of Civil Procedure. The major Acts , which got amended after enactment of ITA The Indian Penal Code, 1860 The Indian Penal Code was amended by inserting the word 'electronic' thereby treating the electronic records and documents on a par with physical records and documents. The Sections dealing with false entry in a record or false document etc (e.g. 192, 204, 463, 464, 464, 468 to 470, 471, 474, 476 etc) have since been amended as 'electronic record and electronic document' thereby bringing within the ambit of IPC. Now, electronic record and electronic documents has been treated just like physical records and documents during commission of acts of forgery or falsification of physical records in a crime. After the above amendment, the investigating agencies file the cases/ charge-sheet quoting the relevant sections from IPC under section 463,464, 468 and 469 read with the ITA/ITAA under Sections 43 and 66 in like offences to ensure the evidence and/or punishment can be covered and proved under either of these or under both legislation. The Indian Evidence Act 1872
  • 4. Prior to enactment of ITA, all evidences in a court were in the physical form only. After existence of ITA, the electronic records and documents were recognized. The definition part of Indian Evidence Act was amended as "all documents including electronic records" were substituted. Other words e.g. 'digital signature', 'electronic form', 'secure electronic record' 'information' as used in the ITA, were also inserted to make them part of the evidentiary importance under the Act. The important amendment was seen by recognition of admissibility of electronic records as evidence as enshrined in Section 65B of the Act. The Bankers' Books Evidence (BBE) Act 1891: Before passing of ITA, a bank was supposed to produce the original ledger or other physical register or document during evidence before a Court. After enactment of ITA, the definitions part of the BBE Act stood amended as: "'bankers ' books' include ledgers, day-books, cashbooks, account-books and all other books used in the ordinary business of a bank whether kept in the written form or as printouts of data stored in a floppy, disc, tape or any other form of electro- magnetic data storage device". When the books consist of printouts of data stored in a floppy, disc, tape etc, a printout of such entry ...certified in accordance with the provisions ....to the effect that it is a printout of such entry or a copy of such printout by the principal accountant or branch manager; and (b) a certificate by a person in-charge of computer system containing a brief description of the computer system and the particulars of the safeguards adopted by the system to ensure that data is entered or any other operation performed only by authorized persons; the safeguards adopted to prevent and detect unauthorized change of data ...to retrieve data that is lost due to systemic failure or .... The above amendment in the provisions in Bankers Books Evidence Act recognized the printout from a computer system and other electronic document as a valid document during course of evidence, provided, such print-out or electronic document is accompanied by a certificate in terms as mentioned above. Issues not covered under ITA ITA and ITAA is though landmark first step and became mile-stone in the technological growth of the nation; however the existing law is not sufficed. Many issues in Cyber crime and many crimes are still left uncovered. Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA. Jurisdiction has been mentioned in Sections 46, 48, 57 and 61 in the context of adjudication process and the appellate procedure connected with and again in Section 80 and as part of the police officers' powers to enter, search a public place for a cyber crime etc. Since cyber crimes are basically computer based crimes and therefore if the mail of someone is hacked in one place by accused sitting far in another state, determination of concerned P.S., who will take cognizance is difficult. It is seen that the investigators generally try to avoid accepting such complaints on the grounds of jurisdiction. Since the cyber crime is geography-agnostic, borderless, territory- free and generally spread over territories of several jurisdiction; it is needed to proper training is to be given to all concerned players in the field.
  • 5. Preservation of evidence is also big issue. It is obvious that while filing cases under IT Act, very often, chances to destroy the necessary easily as evidences may lie in some system like the intermediaries' computers or sometimes in the opponent's computer system too. However, most of the cyber crimes in the nation are still brought under the relevant sections of IPC read with the comparative sections of ITA or the ITAA which gives a comfort factor to the investigating agencies that even if the ITA part of the case is lost, the accused cannot escape from the IPC part. Conclusion Society as on today is happening more and more dependent upon technology and crime based on electronic offences are bound to increase. Endeavor of law making machinery of the nation should be in accordance with mile compared to the fraudsters, to keep the crimes lowest. Hence, it should be the persistent efforts of rulers and law makers to ensure that governing laws of technology contains every aspect and issues of cyber crime and further grow in continuous and healthy manner to keep constant vigil and check over the related crimes. Cyber Law of India : Introduction In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. We can categorize Cyber crimes in two ways 1.The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. 2.The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws. Technical Aspects Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as
  • 6. a. Unauthorized access & Hacking:- Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. By hacking web server taking control on another persons website called as web hijacking b. Trojan Attack:- The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. The name Trojan Horse is popular. Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan. TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well. c. Virus and Worm attack:- A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms. d. E-mail & IRC related crimes:- 1. Email spoofing
  • 7. Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read 2. Email Spamming Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter. 3 Sending malicious codes through email E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code. 4. Email bombing E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address. 5. Sending threatening emails 6. Defamatory emails 7. Email frauds 8. IRC related Three main ways to attack IRC are: "verbalâ; attacks, clone attacks, and flood attacks. e. Denial of Service attacks:- Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. Examples include attempts to "flood" a network, thereby preventing legitimate network traffic attempts to disrupt connections between two machines, thereby preventing access to a service attempts to prevent a particular individual from accessing a service attempts to disrupt service to a specific system or person.
  • 8. Distributed DOS A distributed denial of service (DoS) attack is accomplished by using the Internet to break into computers and using them to attack a network. Hundreds or thousands of computer systems across the Internet can be turned into “zombies” and used to attack another system or website. Types of DOS There are three basic types of attack: a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect. b. Destruction or Alteration of Configuration Information c. Physical Destruction or Alteration of Network Components e. Pornography:- The literal mining of the term 'Pornography' is “describing or showing sexual acts in order to cause sexual excitement through books, films, etc.” This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc. Adult entertainment is largest industry on internet.There are more than 420 million individual pornographic webpages today. Research shows that 50% of the web-sites containing potentially illegal contents relating to child abuse were ‘Pay-Per-View’. This indicates that abusive images of children over Internet have been highly commercialized. Pornography delivered over mobile phones is now a burgeoning business, “driven by the increase in sophisticated services that deliver video clips and streaming video, in addition to text and images.” Effects of Pornography Research has shown that pornography and its messages are involved in shaping attitudes and encouraging behavior that can harm individual
  • 9. users and their families. Pornography is often viewed in secret, which creates deception within marriages that can lead to divorce in some cases. In addition, pornography promotes the allure of adultery, prostitution and unreal expectations that can result in dangerous promiscuous behavior. Some of the common, but false messages sent by sexualized culture. Sex with anyone, under any circumstances, any way it is desired, is beneficial and does not have negative consequences. Women have one value - to meet the sexual demands of men. Marriage and children are obstacles to sexual fulfillment. Everyone is involved in promiscuous sexual activity, infidelity and premarital sex. Pornography Addiction Dr. Victor Cline, an expert on Sexual Addiction, found that there is a four-step progression among many who consume pornography. 1.Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect, followed by sexual release, most often through masturbation. 2.Escalation: Over time addicts require more explicit and deviant material to meet their sexual "needs." 3.Desensitization: What was first perceived as gross, shocking and disturbing, in time becomes common and acceptable. 4.Acting out sexually: There is an increasing tendency to act out behaviors viewed in pornography. g. Forgery:- Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.
  • 10. Also impersonate another person is considered forgery. h. IPR Violations:- These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also under trademark laws. Cyber Squatters registers domain name identical to popular service provider’s domain so as to attract their users and get benefit from it. i. Cyber Terrorism:- Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. Cyberterrorism is an attractive option for modern terrorists for several reasons. 1.It is cheaper than traditional terrorist methods. 2.Cyberterrorism is more anonymous than traditional terrorist methods. 3.The variety and number of targets are enormous. 4.Cyberterrorism can be conducted remotely, a feature that isespecially appealing to terrorists. 5.Cyberterrorism has the potential to affect directly a larger number of people. j. Banking/Credit card Related crimes:- In the corporate world, Internet hackers are continually looking for opportunities to compromise a company’s security in order to gain access to confidential banking and financial information. Use of stolen card information or fake credit/debit cards are common. Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own
  • 11. account also called as salami. k. E-commerce/ Investment Frauds:- Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities. Merchandise or services that were purchased or contracted by individuals online are never delivered. The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site. Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits. l. Sale of illegal articles:- This would include trade of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication. Research shows that number of people employed in this criminal area. Daily peoples receiving so many emails with offer of banned or illegal products for sale. m. Online gambling:- There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. n. Defamation: - Defamation can be understood as the intentional infringement of another person's right to his good name. Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. Information posted to a bulletin board can be accessed by anyone. This means that anyone can place
  • 12. Cyber defamation is also called as Cyber smearing. Cyber Stacking:- Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications. p. Pedophiles:- Also there are persons who intentionally prey upon children. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents. They earns teens trust and gradually seduce them into sexual or indecent acts. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. q. Identity Theft :- Identity theft is the fastest growing crime in countries like America. Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud. Identity theft is a vehicle for perpetrating other types of fraud schemes. r. Data diddling:- Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file. It also include automatic changing the financial information for some
  • 13. time before processing and then restoring original information. s. Theft of Internet Hours:- Unauthorized use of Internet hours paid for by another person. By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organizations can obtain access to dial-in/dial- out circuits and then make their own calls or sell call time to third parties. Additional forms of service theft include capturing 'calling card' details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. t. Theft of computer system(Hardware):- This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer. u. Physically damaging a computer system:- Physically damaging a computer or its peripheralseither by shock, fire or excess electric supply etc. v. Breach of Privacy and Confidentiality Privacy Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records, sexual preferences, financial status etc. Confidentiality It means non disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected.
  • 14. Generally for protecting secrecy of such information, parties while sharing information forms an agreement about he procedure of handling of information and to not to disclose such information to third parties or use it in such a way that it will be disclosed to third parties. Many times party or their employees leak such valuable information for monitory gains and causes breach of contract of confidentiality. Special techniques such as Social Engineering are commonly used to obtain confidential information.