SlideShare a Scribd company logo
1 of 11
 NAME : RAHUL PANDEY
 STANDARD : 12TH PCM
 SUBJECT : COMPUTER SCIENCE
 SUBJECT TEACHER : MR. SUNIL CHUPHAL
 TOPIC : CYBER LAW
ACKNOWLEDGMET
I would like to express my special thanks of
gratitude to my teacher Mr. Sunil Chuphal
who gave me the golden opportunity to
do this wonderful project, which also
helped me in doing a lot of Research and I
came to know about so many new things I
am really thankful to them.
What Is Cyber Law
Cyber law, also known as Internet Law or Cyber Law,
is the part of the overall legal system that is related
to legal informatics and supervises the digital
circulation of information, e-commerce, software and
information security. It is associated with legal
informatics and electronic elements, including
information systems, computers, software, and
hardware. It covers many areas, such as access to and
usage of the Internet, encompassing various
subtopics as well as freedom of expression, and
online privacy.
Why are cyber laws needed?
There are many security issues with using the
Internet and also available different malicious people
who try to unauthorized access your computer
system to perform potential fraud. Therefore,
similarly, any law, cyber law is created to protect
online organizations and people on the network
from unauthorized access and malicious people. If
someone does any illegal activity or breaks the cyber
rule, it offers people or organizations to have that
persons sentenced to punishment or take action
against them.
What happens if anyone breaks a
cyber law?
If anyone breaks a cyber law, the action would be
taken against that person on the basis of the type of
cyber law he broke, where he lives, and where he
broke the law. There are many situations like if you
break the law on a website, your account will be
banned or suspended and blocked your IP (Internet
Protocol) address. Further more, if any person
performs a very serious illegal activity, such as
causing another person or company distress,
hacking, attacking another person or website,
advance action can be taken against that person.
Importance of Cyber Law
Cyber laws are formed to punish people who perform
any illegal activities online. They are important to
punish related to these types of issues such as online
harassment, attacking another website or individual,
data theft, disrupting the online workflow of any
enterprise and other illegal activities.
 When users apply transactions on the Internet, cyber
law covers every transaction and protect them.
 It touches every reaction and action in cyberspace.
 It captures all activities on the Internet.
Areas involving in Cyber Laws
 Fraud
Cyber laws are formed to prevent financial crimes
such as identity theft, credit card theft and other that
occurring online.
 Copyrighting Issues
The Internet is the source that contains different
types of data, which can be accessed anytime,
anywhere. But it is the authority of anyone to copy
the content of any other person.
 Scam/ Treachery
There are different frauds and scams available on the
Internet that can be personally harmful to any
company or an individual
How to protect yourself on the
Internet
 Verify data is encrypted
 Use a safe password
 Keep your software and operating system up-to-date
 When available always enable two-factor
authentication
 Be aware of phishing scams
 Always think before you share something
 Secure saved passwords
 Do not always trust what you read online
Advantages of Cyber Law
Following are the advantages of cyber laws:
 Secured E-commerce for Setting Online Business.
 Digital Certificate for securing site.
 Blocking unwanted content from Internet.
 Proper monitoring of traffic.
 Security Against common frauds.
 Born of new Security Agencies like Cyber Cell.
 Software as well as Hardware security.
Cyber Law.pptx

More Related Content

Similar to Cyber Law.pptx

Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
Mahmudul hasan
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 

Similar to Cyber Law.pptx (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Legal and regulatory environment e commerce
Legal and regulatory environment e commerceLegal and regulatory environment e commerce
Legal and regulatory environment e commerce
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Digital law
Digital lawDigital law
Digital law
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Cyber Law.pptx

  • 1.  NAME : RAHUL PANDEY  STANDARD : 12TH PCM  SUBJECT : COMPUTER SCIENCE  SUBJECT TEACHER : MR. SUNIL CHUPHAL  TOPIC : CYBER LAW
  • 2. ACKNOWLEDGMET I would like to express my special thanks of gratitude to my teacher Mr. Sunil Chuphal who gave me the golden opportunity to do this wonderful project, which also helped me in doing a lot of Research and I came to know about so many new things I am really thankful to them.
  • 3.
  • 4. What Is Cyber Law Cyber law, also known as Internet Law or Cyber Law, is the part of the overall legal system that is related to legal informatics and supervises the digital circulation of information, e-commerce, software and information security. It is associated with legal informatics and electronic elements, including information systems, computers, software, and hardware. It covers many areas, such as access to and usage of the Internet, encompassing various subtopics as well as freedom of expression, and online privacy.
  • 5. Why are cyber laws needed? There are many security issues with using the Internet and also available different malicious people who try to unauthorized access your computer system to perform potential fraud. Therefore, similarly, any law, cyber law is created to protect online organizations and people on the network from unauthorized access and malicious people. If someone does any illegal activity or breaks the cyber rule, it offers people or organizations to have that persons sentenced to punishment or take action against them.
  • 6. What happens if anyone breaks a cyber law? If anyone breaks a cyber law, the action would be taken against that person on the basis of the type of cyber law he broke, where he lives, and where he broke the law. There are many situations like if you break the law on a website, your account will be banned or suspended and blocked your IP (Internet Protocol) address. Further more, if any person performs a very serious illegal activity, such as causing another person or company distress, hacking, attacking another person or website, advance action can be taken against that person.
  • 7. Importance of Cyber Law Cyber laws are formed to punish people who perform any illegal activities online. They are important to punish related to these types of issues such as online harassment, attacking another website or individual, data theft, disrupting the online workflow of any enterprise and other illegal activities.  When users apply transactions on the Internet, cyber law covers every transaction and protect them.  It touches every reaction and action in cyberspace.  It captures all activities on the Internet.
  • 8. Areas involving in Cyber Laws  Fraud Cyber laws are formed to prevent financial crimes such as identity theft, credit card theft and other that occurring online.  Copyrighting Issues The Internet is the source that contains different types of data, which can be accessed anytime, anywhere. But it is the authority of anyone to copy the content of any other person.  Scam/ Treachery There are different frauds and scams available on the Internet that can be personally harmful to any company or an individual
  • 9. How to protect yourself on the Internet  Verify data is encrypted  Use a safe password  Keep your software and operating system up-to-date  When available always enable two-factor authentication  Be aware of phishing scams  Always think before you share something  Secure saved passwords  Do not always trust what you read online
  • 10. Advantages of Cyber Law Following are the advantages of cyber laws:  Secured E-commerce for Setting Online Business.  Digital Certificate for securing site.  Blocking unwanted content from Internet.  Proper monitoring of traffic.  Security Against common frauds.  Born of new Security Agencies like Cyber Cell.  Software as well as Hardware security.