SlideShare a Scribd company logo
PRESENTATION ON
CYBER LAWS
INTRODUCTION
Cyber law is a term which refers
to all the legal and regulatory
aspects of Internet and the
World Wide Web. Anything
concerned with or related to,
or emanating from, any legal
aspects or issues concerning
any activity of netizens and
others, in Cyberspace comes
within the ambit of Cyber law.
NEED FOR CYBER LAWS
 Security of Information
 Security of Government Data
 Intellectual Property Rights
 Privacy and Confidentially of
Information
 Legal Status of
Online Transaction
IT ACT PASSED IN 2000
• Enacted on 17th May 2000
by the central government.
• India is 12th nation in the
world to adopt cyber laws.
• Information Technology
Act2000 consisted of 94
sections segregated into13
chapters.
• 4 schedules form part of the
Act.
SALIENT FEATURES OF THE
ACT
The information technology act 2000 is a
technology intensive act in the sense that it talks
about the use of digital signature to authenticate
electronic records. It is based on UNCITRAL’s
model law on e-commerce which adopts
functional equivalent approach, that accepts
digital signature as an authentication standard.
DIGITAL SIGNATURES
ELECTRONIC GOVERNANCE
It is a kind of window of opportunity facilitating a
much faster, convenient, transparent interaction
between the government and its people. It involves
information technology enabled initiatives that are
used for improving
• e-services
• e-administration
• e-society
ATTRIBUTION, ACKNOWLEDGEMENT
AND DISPATCH OF ELECTRONIC
RECORDS
The information Technology Act,2000 has not
amended the Indian contract act,1872 in any
manner whatsoever. In order to form a valid
electronic contract one still needs a promisor or a
promisee. The act grants legal recognition to
communication process involving computer,
computer system and computer network by
identifying, attribution, acknowledgement and
dispatch of electronic records as key statutory
provisions.
DIGITAL SIGNATURE
CERTIFICATES
It is an important instrument of trust identifying
the subscriber over the networks . It creats a
‘binding linkage’ between the subscriber and the
issuer. ‘binding policies’ are needed for the same.
The policies must define the level of trust of
relying party shall put forth in the issuer’s overall
certificate issuance and management process.
DUTIES OF SUBSCRIBERS
The word ‘subscriber’ denotes a person who has
paid subscription amount to avail some kind of
service. A subscriber is in a way a customer or a
buyer. He is a customer with a difference as he
usually pays for a service in advance.
SECURE ELECTRONIC
RECORDS AND SECURE
DIGITAL SIGNATURES
• Information is a valuable commodity. It needs
to be confidential, secure and retains its
integrity. Only a secured system leads to secure
transactions. From the user’s perspective, the act
concerns with the application of security
procedures at the user’s level. The aim is to
protect the communication and not the medium.
IT ACT PROVISIONS
• email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
• Companies shall now be able to carry out
electronic commerce using the legal infrastructure
provided by the Act.
• Digital signatures have been given legal validity
and sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
notification on the web thus heralding e-
governance
• Statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies data
AMENDMENTS
The major amendment provided that though
cheque is a negotiable instrument yet the
provisions of act would apply to it.
The main focus of new amendments is on
cyber security.
The words digital signature has been replaced
by the words electronic signature.
CYBER CRIMES
It is an illegal act that involves a computer,
computer system or computer network, i.e any
illegal act for which knowledge of computer
technology is essential for its perpetration,
investigation or prosecution.
Cyber crime is divided into 2 groups
Crime where Accused is
computer victim is a
computer.
Crime where computer
becomes a part of
evidence for the crime
that has taken place.
OFFENCES AND LAWS IN
CYBER SPACE
• TAMPERING WITH
COMPUTER
DOCUMENTS
• HACKING WITH
COMPUTER SYSTEM
• PUBLISHING OBSCENE
MATERIAL ON
INTERNET
• BREACHING OF
CONFIDENTIALITY
AND PRIVACY
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
IN TODAYS WORLD OF INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY
THANK YOU

More Related Content

What's hot

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Sonu Mishra
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
Vibhor Agarwal
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
E contract
E contractE contract
E contract
RajThakuri
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
Mayuresh Patil
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
maruhope
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Pradeep Tomar
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
Digital signature
Digital signatureDigital signature
Digital signature
Renu Verma
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 

What's hot (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
E contract
E contractE contract
E contract
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber law
Cyber lawCyber law
Cyber law
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 

Viewers also liked

MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
Colin Zick
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Online
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Ip address
Ip addressIp address
Ip address
Amandeep Kaur
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
elliehood
 

Viewers also liked (7)

MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Ip address
Ip addressIp address
Ip address
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 

Similar to Cyber law final

Cyber
CyberCyber
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
Madhavi38
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
akshitarathi77
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
sandeepharish2
 
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
drsrivanicshod
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
2coolshivani
 
Article on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfArticle on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdf
RISHAVBHARDWAJ12
 
Informtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptxInformtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptx
bharathwajkatta1
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
AnimeshTripathi33
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
sambaba17
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
pattok
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
Vikas Saw
 

Similar to Cyber law final (20)

Cyber
CyberCyber
Cyber
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
 
It act 2000
It act 2000It act 2000
It act 2000
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Article on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfArticle on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdf
 
Informtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptxInformtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptx
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Cyber law final

  • 2. INTRODUCTION Cyber law is a term which refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned with or related to, or emanating from, any legal aspects or issues concerning any activity of netizens and others, in Cyberspace comes within the ambit of Cyber law.
  • 3. NEED FOR CYBER LAWS  Security of Information  Security of Government Data  Intellectual Property Rights  Privacy and Confidentially of Information  Legal Status of Online Transaction
  • 4. IT ACT PASSED IN 2000 • Enacted on 17th May 2000 by the central government. • India is 12th nation in the world to adopt cyber laws. • Information Technology Act2000 consisted of 94 sections segregated into13 chapters. • 4 schedules form part of the Act.
  • 5. SALIENT FEATURES OF THE ACT The information technology act 2000 is a technology intensive act in the sense that it talks about the use of digital signature to authenticate electronic records. It is based on UNCITRAL’s model law on e-commerce which adopts functional equivalent approach, that accepts digital signature as an authentication standard. DIGITAL SIGNATURES
  • 6. ELECTRONIC GOVERNANCE It is a kind of window of opportunity facilitating a much faster, convenient, transparent interaction between the government and its people. It involves information technology enabled initiatives that are used for improving • e-services • e-administration • e-society
  • 7. ATTRIBUTION, ACKNOWLEDGEMENT AND DISPATCH OF ELECTRONIC RECORDS The information Technology Act,2000 has not amended the Indian contract act,1872 in any manner whatsoever. In order to form a valid electronic contract one still needs a promisor or a promisee. The act grants legal recognition to communication process involving computer, computer system and computer network by identifying, attribution, acknowledgement and dispatch of electronic records as key statutory provisions.
  • 8. DIGITAL SIGNATURE CERTIFICATES It is an important instrument of trust identifying the subscriber over the networks . It creats a ‘binding linkage’ between the subscriber and the issuer. ‘binding policies’ are needed for the same. The policies must define the level of trust of relying party shall put forth in the issuer’s overall certificate issuance and management process.
  • 9. DUTIES OF SUBSCRIBERS The word ‘subscriber’ denotes a person who has paid subscription amount to avail some kind of service. A subscriber is in a way a customer or a buyer. He is a customer with a difference as he usually pays for a service in advance.
  • 10. SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES • Information is a valuable commodity. It needs to be confidential, secure and retains its integrity. Only a secured system leads to secure transactions. From the user’s perspective, the act concerns with the application of security procedures at the user’s level. The aim is to protect the communication and not the medium.
  • 11. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 12. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • Statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 13. AMENDMENTS The major amendment provided that though cheque is a negotiable instrument yet the provisions of act would apply to it. The main focus of new amendments is on cyber security. The words digital signature has been replaced by the words electronic signature.
  • 14. CYBER CRIMES It is an illegal act that involves a computer, computer system or computer network, i.e any illegal act for which knowledge of computer technology is essential for its perpetration, investigation or prosecution. Cyber crime is divided into 2 groups Crime where Accused is computer victim is a computer. Crime where computer becomes a part of evidence for the crime that has taken place.
  • 15. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 16. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY