SlideShare a Scribd company logo
KANHAIYA KUMAR (215)
RAHUL PANDEY (229)
"The modern thief can steal more with a
computer than with a gun. Tomorrow's
terrorist may be able to do more damage
with a keyboard than with a bomb".
–National Research Council, U S A
"Computers at Risk”.1991
Cyber Law is the law governing cyber space.
Cyber space is a very wide term and
includes computers, networks, software,
data storage devices (such as hard disks, USB
disks etc), the Internet, websites, emails and
even electronic devices such as cell phones,
ATM machines etc.
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
Intellectual property refers to creations of
the human mind e.g. a story, a song, a
painting, a design etc.
The facets of intellectual property that
relate to cyber space are covered by Cyber
law.
These include:
 Copyright law: relating to computer software,
source code, websites, cell phone content etc.
• Software and source code licences.
• Trademark law with relation to domain names,
meta tags, mirroring, framing, linking etc.
• Semiconductor law which relates to the protection
of semiconductor integrated circuits design and
layouts.
• Patent law in relation to computer hardware and
software.
 Data Protection and Privacy Laws aim to achieve
a fair balance between the privacy rights of the
individual and the interests of data controllers such
as banks, hospitals, email service providers etc.
 These laws seek to address the challenges to
privacy caused by collecting, storing and
transmitting data using new technologies.
Need for Cyber Law:
 Cyberspace is an intangible dimension that is
impossible to govern and regulate using
conventional law.
 Cyberspace has complete disrespect for
jurisdictional boundaries.
 Cyberspace handles gigantic traffic volumes every
second.
 Cyberspace is open to participation by all.
 Cyberspace offers enormous potential for
anonymity to its members.
 Cyberspace offers never-seen-before economic
efficiency.
 Electronic information has become the main
object of cyber crime.
 Here the “original” information, so to say,
remains in the “possession” of the “owner” and
yet information gets stolen.
 The primary source of cyber law in India is the
Information Technology Act , 2000 (IT Act) which
came into force on 17 October 2000.
 The primary purpose of the Act is to provide legal
recognition to electronic commerce and to
facilitate filing of electronic records with the
Government.
 Information Technology Act 2000 consisted of 94
sections segregated into 13 chapters.
 Four schedules form part of the Act.
The Information Technology
Amendment Act, 2008 (IT Act 2008) has
been passed by the parliament on 23rd
December 2008.
It received the assent of President of
India on 5th February, 2009.
The IT Act 2008 has been notified on
October 27, 2009.
ITA 2008, as the new version of
Information Technology Act 2000 is
often referred, has provided additional
focus on Information Security.
It has added several new sections on
offences including Cyber Terrorism and
Data Protection.
In the 2008 version of the Act, there are 124
sections (excluding 5 sections that have been
omitted from the earlier version) and 14
chapters.
Schedule I and II have been replaced.
Schedules III and IV are deleted.
Salient features of the Amendment Act:
 The term “digital signature” has been replaced
with “electronic signature” to make the Act
more technology neutral.
A new section 10A has been inserted to the
effect that contracts concluded electronically
shall not be deemed to be unenforceable solely
on the ground that electronic form or means
was used.
A new section 43A has been inserted to protect
sensitive personal data or information dealt,
possessed, or handled by a body corporate.
New sections 66A to 66F prescribe punishment
for offenses such as obscene electronic
message transmissions, identity theft,
cheating by impersonation using computer
resource, violation of privacy & cyber terrorism.
 Section 67 of the old Act is amended to
reduce term of imprisonment for publishing or
transmitting obscene material in electronic form
to 3 years from 5 years and increase the fine
thereof from Rs.100,000 to Rs. 500,000.
 Sections 67 A and B insert penal provisions in
respect of offenses of publishing/ transmitting of
material containing sexually explicit act and
child pornography in electronic form.
 Section 79 of the old Act which exempted
intermediaries has been modified to the effect that
an intermediary shall not be liable for any 3rd
party
information data or communication link made
available or hosted by him, subject to certain
conditions.
 A proviso has been added to Section 81 which
states that the provisions of the Act shall have
overriding effect.
THANK YOU

More Related Content

What's hot

Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
Mayuresh Patil
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
maruhope
 
Cyber law
Cyber lawCyber law
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
It act 2000
It act 2000It act 2000
It act 2000
Rishav Mishra
 
Cyber laws
Cyber lawsCyber laws
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
it act 2000
it act 2000it act 2000
it act 2000
virtualatall
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
RAJ ANAND
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 

What's hot (20)

Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Information technology act
Information technology actInformation technology act
Information technology act
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 

Viewers also liked

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Regulation on social media in india
Regulation on social media in indiaRegulation on social media in india
Regulation on social media in india
Rashmi Warghade
 
Freedom Of The Press
Freedom Of The PressFreedom Of The Press
Freedom Of The Press
bkind2animals
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
Adv Prashant Mali
 
Information technology act
Information technology actInformation technology act
Information technology act
Meghana Bhogle
 
Freedom of press presentation
Freedom of press presentation Freedom of press presentation
Freedom of press presentation
Punjab University Lahore
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
Yogendra Wagh
 

Viewers also liked (9)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Regulation on social media in india
Regulation on social media in indiaRegulation on social media in india
Regulation on social media in india
 
Freedom Of The Press
Freedom Of The PressFreedom Of The Press
Freedom Of The Press
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Freedom of press presentation
Freedom of press presentation Freedom of press presentation
Freedom of press presentation
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 

Similar to Cyber law final

Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
ManuGupta344215
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
AnirudhRaju6
 
India cyber
India cyberIndia cyber
India cyber
sabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
cloneseeyom
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
PAYAL SINHA
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
maneeshchandran1
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 

Similar to Cyber law final (20)

Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Cyber law final

  • 2. "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". –National Research Council, U S A "Computers at Risk”.1991
  • 3. Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 4. Cyber law encompasses laws relating to: 1. Cyber Crimes 2. Electronic and Digital Signatures 3. Intellectual Property 4. Data Protection and Privacy
  • 5. Intellectual property refers to creations of the human mind e.g. a story, a song, a painting, a design etc. The facets of intellectual property that relate to cyber space are covered by Cyber law.
  • 6. These include:  Copyright law: relating to computer software, source code, websites, cell phone content etc. • Software and source code licences. • Trademark law with relation to domain names, meta tags, mirroring, framing, linking etc. • Semiconductor law which relates to the protection of semiconductor integrated circuits design and layouts. • Patent law in relation to computer hardware and software.
  • 7.  Data Protection and Privacy Laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc.  These laws seek to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies.
  • 8. Need for Cyber Law:  Cyberspace is an intangible dimension that is impossible to govern and regulate using conventional law.  Cyberspace has complete disrespect for jurisdictional boundaries.  Cyberspace handles gigantic traffic volumes every second.  Cyberspace is open to participation by all.
  • 9.  Cyberspace offers enormous potential for anonymity to its members.  Cyberspace offers never-seen-before economic efficiency.  Electronic information has become the main object of cyber crime.  Here the “original” information, so to say, remains in the “possession” of the “owner” and yet information gets stolen.
  • 10.  The primary source of cyber law in India is the Information Technology Act , 2000 (IT Act) which came into force on 17 October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.  Four schedules form part of the Act.
  • 11. The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008. It received the assent of President of India on 5th February, 2009. The IT Act 2008 has been notified on October 27, 2009.
  • 12. ITA 2008, as the new version of Information Technology Act 2000 is often referred, has provided additional focus on Information Security. It has added several new sections on offences including Cyber Terrorism and Data Protection.
  • 13. In the 2008 version of the Act, there are 124 sections (excluding 5 sections that have been omitted from the earlier version) and 14 chapters. Schedule I and II have been replaced. Schedules III and IV are deleted.
  • 14. Salient features of the Amendment Act:  The term “digital signature” has been replaced with “electronic signature” to make the Act more technology neutral. A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used.
  • 15. A new section 43A has been inserted to protect sensitive personal data or information dealt, possessed, or handled by a body corporate. New sections 66A to 66F prescribe punishment for offenses such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy & cyber terrorism.
  • 16.  Section 67 of the old Act is amended to reduce term of imprisonment for publishing or transmitting obscene material in electronic form to 3 years from 5 years and increase the fine thereof from Rs.100,000 to Rs. 500,000.  Sections 67 A and B insert penal provisions in respect of offenses of publishing/ transmitting of material containing sexually explicit act and child pornography in electronic form.
  • 17.  Section 79 of the old Act which exempted intermediaries has been modified to the effect that an intermediary shall not be liable for any 3rd party information data or communication link made available or hosted by him, subject to certain conditions.  A proviso has been added to Section 81 which states that the provisions of the Act shall have overriding effect.