SlideShare a Scribd company logo
Cyber Law &
IT ACT 2000
Background for Cyberlaws

 In 1969 America’s Department of Defense commissioned the
  construction of a super network called ARPANET.
  The Advanced Research Projects Agency Network(ARPANET).
 Basically intended as a military network slowly grew and the internet
  was born.
 According to International Data Corporation (IDC), Approximately 163
  million individuals or entities will use the internet by the end of this year
  as opposed to 16.1 million in 1995.
 This present state of the Internet make the necessity of Cyberlaws
  more important.
Need for Cyberlaw


• Due to the anonymous nature of the Internet, it is possible to
  engage into a variety of criminal activities with impunity and
  people with intelligence, have been grossly misusing this
  aspect of the Internet to perpetuate criminal activities in
  cyberspace.

• Also the number of users are increasing rapidly.

• Hence the need for Cyberlaws arises.
Cyber Crime


• The Computer as a Target
  Using a computer to attack other computers.
  e.g. Hacking, Virus/Worm attacks, DOS attack etc.

• The Computer as a Weapon
  Using a computer to commit real world crimes.
  e.g. Cyber Terrorism, IPR violations, Credit card frauds,
  EFT frauds, Pornography etc.
Criminal Misuse of Information
          Technologies
Unauthorized access & Hacking
    Any kind of access without the permission of either the rightful owner
    or the person in charge of a computer, computer system or computer
    network.
    Every act committed towards breaking into a computer and/or
    network is hacking.

Trojan Attack
    The program that act like something useful but do the things that are
    quiet damping. The programs of this kind are called as Trojans.

  Virus and Worm attack
  A program that has capability to infect other programs and make copies
    of itself and spread into other programs is called virus.
  Programs that multiply like viruses but spread from computer to
    computer are called as worms.
E-mail related crimes
  Email Spamming
  Sending malicious codes through email
  Email bombingSending threatening emails
  Defamatory emails
  Email frauds

Denial of Service attacks
  Flooding a computer resource with more requests than it can handle.
   This causes the resource to crash thereby denying access of service
   to authorized users.
 attempts to "flood" a network, thereby preventing legitimate network
 traffic
 attempts to disrupt connections between two machines, thereby
 preventing access to a service
Cyber law


• Cyber law is a system of law and regulation for the
  cyber space. Simply speaking cyber law is a generic
  term which refers to all the legal and regulatory aspects
  of internet and the world wide web.
• The growth of Electronic Commerce has propelled the need
  for vibrant and effective regulatory mechanisms which would
  strengthen the legal infrastructure, and would be crucial for
  the success of Electronic Commerce.
• The cyberlaw of India is defined under IT Act, 2000
IT ACT 2000


• The Act came into effect following the clearance of the
  Information Technology Bill 2000 in May 2000 by both the
  houses of the Parliament. The Bill received the assent of the
  President Of India in August 2000 (IT Act 2000).
• The IT Act 2000 attempts to change outdated laws and
  provides ways to deal with cyber crimes. Such an act is
  required as people can perform purchase transactions over
  the net through credit cards without fear of getting misused.
• IT Act 2000 is very important to control cyber crime.
Various Objectives of IT ACT 2000

• Chapter-II of the Act specifically stipulates that any subscriber
  may authenticate an electronic record by affixing his digital
  signature.
• Chapter-IV of the said Act gives a scheme for Regulation of
  Certifying Authorities. The Act envisages a Controller of Certifying
  Authorities who shall perform the function of exercising
  supervision over the activities of the Certifying Authorities as also
  laying down standards and conditions governing the Certifying
  Authorities as also specifying the various forms and content of
  Digital Signature Certificates.
• Chapter-VII of the Act details about the scheme of things relating
  to Digital Signature Certificates. The duties of subscribers are
  also enshrined in the said Act.
Various Objectives of IT ACT 2000

• Chapter-IX of the said Act talks about penalties and adjudication
  for various offences. The penalties for damage to computer,
  computer systems etc. has been fixed as damages by way of
  compensation not exceeding Rs. 1,00,00,000 to affected persons.
• Chapter-X of the Act talks of the establishment of the Cyber
  Regulations Appellate Tribunal, which shall be an appellate body
  where appeals against the orders passed by the Adjudicating
  Officers, shall be preferred.
• Chapter-XI of the Act talks about various offences and the said
  offences shall be investigated only by a Police Officer not below
  the rank of Deputy Superintendent of Police. These offences
  include tampering with computer source documents, publishing of
  information, hacking which is obscene in electronic form.
Various Objectives of IT ACT 2000



The Act also provides for the constitution of the Cyber
Regulations Advisory Committee, which shall advice
the government as regards any rules, or for any other
purpose connected with the said act.
Advantage of IT ACT 2000

•   The E-commerce industry carries out its business via
    transactions and communications done through electronic
    records. It thus becomes essential that such transactions be
    made legal.
•   The Act legalizes the e-mail and gives it the status of being
    valid form of carrying out communication in India. This implies
    that e-mails can be duly produced and approved in a court of
    law as a legal document.
•   The Act now allows Government to issue notification on the
    web thus helping E-governance.
•   It eases the task of companies of the filing any form, application
    or document by laying down the guidelines to be submitted at
    any appropriate office, authority, body or agency owned or
    controlled by the government.
Advantage of IT ACT 2000

• The act also provides statutory remedy to the corporate in
  case the crime against the accused for breaking into their
  computer systems or network and damaging and copying
  the data is proven. The remedy provided by the Act is in the
  form of monetary damages, not exceeding Rs. 1 crore.

• The law has also laid guidelines for providing Internet
  Services on a license on a non-exclusive basis.

• The law sets up the Territorial Jurisdiction of the
  Adjudicating Officers for cyber crimes and the Cyber
  Regulations Appellate Tribunal.
Criticism of IT Act 2000

•   The law misses out completely the issue of Intellectual
    Property Rights, and makes no provisions whatsoever for
    copyrighting, trade marking or patenting of electronic
    information and data.

•   The law even stays silent over the regulation of electronic
    payments gateway and segregates the negotiable
    instruments from the applicability of the IT Act.

•   The act empowers the Deputy Superintendent of Police to
    look up into the investigations and filling of charge sheet
    when any case related to cyber law is called.
Criticism of IT Act 2000

•   Internet is a borderless medium; it spreads to every corner
    of the world where life is possible and hence is the cyber
    criminal.

•   Adequate and reasonable provisions must me made in the
    IT Act, 2000 regarding “Internet censorship”
Digital Signature


• Digital signature provides authentication to an electronic
  record.
• Makes electronic document valid. Carry same property as of
  a handwritten signature on a paper.
• It consist of public key and a private key.
   – Private key is allocated to a individual which enables the user to fix a
     digital signature.
   – Public key is available to all who want to check authentication of
     records.


   The key are provided by regulatory authorities and are
   unique.
Benefit of Digital Signature


Benefits of Digital Signature

• Authentication
• Integrity

Drawbacks of Digital Signature

• Doesn’t provide certainty of date and time
Few tips to protect you from cyber
           crime

• Protect your PC

  •   Use a firewall
  •   Install anti-virus software and prevent virus infections.
  •   Make regular backups
  •   Secure wireless networks
  •   Get the latest updates and browse the internet safely.
Few tips to protect you from cyber
            crime

• Protect yourself

   •   Bank online safely
   •   Shop only safely
   •   Use strong passwords
   •   Be careful with file sharing
   •   Protect your privacy
Making Cyber law more effective

• A sound Cyber law regime:
   It is important to realize that we need “qualitative law” and not
      “quantitative law”.

• A sound enforcement machinery:
  A law might have been properly enacted and may be theoretically
  effective too but it is useless unless enforced in its true letter and
  spirit. The law enforcement machinery in India is not well
  equipped to deal with cyber law offences and contraventions.

• A sound judicial system:
  A sound judicial system is the backbone for preserving the law
  and order in a society. In short, the dream for an “Ideal Cyber Law
  in India” requires a “considerable” amount of time, money and
  resources.
Cyber Law Cases in India


• Parliament Attack Case

• Official Website of Maharashtra Government Hacked

• City Principal Seeks Police Help To Stop Cyber Crime

• Community sites: The new Danger
Conclusions

• Computer – related crime is a real.
• Increase in number of crimes.
• Law should be alter as and when required.
• Cyber law defined as a though full group conversation about
  core values and distinct benefits to the society will persist .
• Law as that applicable to physical , geographically defined
  territories.
• It is the duty of every citizen to contribute toward making the
  said cyber space.
Thank You

More Related Content

What's hot

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
E contract
E  contractE  contract
E contract
Benita Ezeigbo
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
DINESH KAMBLE
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
Ritu Gautam
 

What's hot (20)

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
E contract
E  contractE  contract
E contract
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
 

Viewers also liked

COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
Pina Parmar
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 

Viewers also liked (8)

Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber law-it-act-2000

Cyber
CyberCyber
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
drsrivanicshod
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
priya rana
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
barsha2011
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
Rahul Rathod
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 

Similar to Cyber law-it-act-2000 (20)

Cyber
CyberCyber
Cyber
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
It act 2000
It act 2000It act 2000
It act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Cyber law-it-act-2000

  • 1. Cyber Law & IT ACT 2000
  • 2. Background for Cyberlaws  In 1969 America’s Department of Defense commissioned the construction of a super network called ARPANET. The Advanced Research Projects Agency Network(ARPANET).  Basically intended as a military network slowly grew and the internet was born.  According to International Data Corporation (IDC), Approximately 163 million individuals or entities will use the internet by the end of this year as opposed to 16.1 million in 1995.  This present state of the Internet make the necessity of Cyberlaws more important.
  • 3. Need for Cyberlaw • Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. • Also the number of users are increasing rapidly. • Hence the need for Cyberlaws arises.
  • 4. Cyber Crime • The Computer as a Target Using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. • The Computer as a Weapon Using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 5. Criminal Misuse of Information Technologies Unauthorized access & Hacking Any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Every act committed towards breaking into a computer and/or network is hacking. Trojan Attack The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. Virus and Worm attack A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 6. E-mail related crimes Email Spamming Sending malicious codes through email Email bombingSending threatening emails Defamatory emails Email frauds Denial of Service attacks Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. attempts to "flood" a network, thereby preventing legitimate network traffic attempts to disrupt connections between two machines, thereby preventing access to a service
  • 7. Cyber law • Cyber law is a system of law and regulation for the cyber space. Simply speaking cyber law is a generic term which refers to all the legal and regulatory aspects of internet and the world wide web. • The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would strengthen the legal infrastructure, and would be crucial for the success of Electronic Commerce. • The cyberlaw of India is defined under IT Act, 2000
  • 8. IT ACT 2000 • The Act came into effect following the clearance of the Information Technology Bill 2000 in May 2000 by both the houses of the Parliament. The Bill received the assent of the President Of India in August 2000 (IT Act 2000). • The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. Such an act is required as people can perform purchase transactions over the net through credit cards without fear of getting misused. • IT Act 2000 is very important to control cyber crime.
  • 9. Various Objectives of IT ACT 2000 • Chapter-II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. • Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities. The Act envisages a Controller of Certifying Authorities who shall perform the function of exercising supervision over the activities of the Certifying Authorities as also laying down standards and conditions governing the Certifying Authorities as also specifying the various forms and content of Digital Signature Certificates. • Chapter-VII of the Act details about the scheme of things relating to Digital Signature Certificates. The duties of subscribers are also enshrined in the said Act.
  • 10. Various Objectives of IT ACT 2000 • Chapter-IX of the said Act talks about penalties and adjudication for various offences. The penalties for damage to computer, computer systems etc. has been fixed as damages by way of compensation not exceeding Rs. 1,00,00,000 to affected persons. • Chapter-X of the Act talks of the establishment of the Cyber Regulations Appellate Tribunal, which shall be an appellate body where appeals against the orders passed by the Adjudicating Officers, shall be preferred. • Chapter-XI of the Act talks about various offences and the said offences shall be investigated only by a Police Officer not below the rank of Deputy Superintendent of Police. These offences include tampering with computer source documents, publishing of information, hacking which is obscene in electronic form.
  • 11. Various Objectives of IT ACT 2000 The Act also provides for the constitution of the Cyber Regulations Advisory Committee, which shall advice the government as regards any rules, or for any other purpose connected with the said act.
  • 12. Advantage of IT ACT 2000 • The E-commerce industry carries out its business via transactions and communications done through electronic records. It thus becomes essential that such transactions be made legal. • The Act legalizes the e-mail and gives it the status of being valid form of carrying out communication in India. This implies that e-mails can be duly produced and approved in a court of law as a legal document. • The Act now allows Government to issue notification on the web thus helping E-governance. • It eases the task of companies of the filing any form, application or document by laying down the guidelines to be submitted at any appropriate office, authority, body or agency owned or controlled by the government.
  • 13. Advantage of IT ACT 2000 • The act also provides statutory remedy to the corporate in case the crime against the accused for breaking into their computer systems or network and damaging and copying the data is proven. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore. • The law has also laid guidelines for providing Internet Services on a license on a non-exclusive basis. • The law sets up the Territorial Jurisdiction of the Adjudicating Officers for cyber crimes and the Cyber Regulations Appellate Tribunal.
  • 14. Criticism of IT Act 2000 • The law misses out completely the issue of Intellectual Property Rights, and makes no provisions whatsoever for copyrighting, trade marking or patenting of electronic information and data. • The law even stays silent over the regulation of electronic payments gateway and segregates the negotiable instruments from the applicability of the IT Act. • The act empowers the Deputy Superintendent of Police to look up into the investigations and filling of charge sheet when any case related to cyber law is called.
  • 15. Criticism of IT Act 2000 • Internet is a borderless medium; it spreads to every corner of the world where life is possible and hence is the cyber criminal. • Adequate and reasonable provisions must me made in the IT Act, 2000 regarding “Internet censorship”
  • 16. Digital Signature • Digital signature provides authentication to an electronic record. • Makes electronic document valid. Carry same property as of a handwritten signature on a paper. • It consist of public key and a private key. – Private key is allocated to a individual which enables the user to fix a digital signature. – Public key is available to all who want to check authentication of records. The key are provided by regulatory authorities and are unique.
  • 17. Benefit of Digital Signature Benefits of Digital Signature • Authentication • Integrity Drawbacks of Digital Signature • Doesn’t provide certainty of date and time
  • 18. Few tips to protect you from cyber crime • Protect your PC • Use a firewall • Install anti-virus software and prevent virus infections. • Make regular backups • Secure wireless networks • Get the latest updates and browse the internet safely.
  • 19. Few tips to protect you from cyber crime • Protect yourself • Bank online safely • Shop only safely • Use strong passwords • Be careful with file sharing • Protect your privacy
  • 20. Making Cyber law more effective • A sound Cyber law regime: It is important to realize that we need “qualitative law” and not “quantitative law”. • A sound enforcement machinery: A law might have been properly enacted and may be theoretically effective too but it is useless unless enforced in its true letter and spirit. The law enforcement machinery in India is not well equipped to deal with cyber law offences and contraventions. • A sound judicial system: A sound judicial system is the backbone for preserving the law and order in a society. In short, the dream for an “Ideal Cyber Law in India” requires a “considerable” amount of time, money and resources.
  • 21. Cyber Law Cases in India • Parliament Attack Case • Official Website of Maharashtra Government Hacked • City Principal Seeks Police Help To Stop Cyber Crime • Community sites: The new Danger
  • 22. Conclusions • Computer – related crime is a real. • Increase in number of crimes. • Law should be alter as and when required. • Cyber law defined as a though full group conversation about core values and distinct benefits to the society will persist . • Law as that applicable to physical , geographically defined territories. • It is the duty of every citizen to contribute toward making the said cyber space.