SlideShare a Scribd company logo
1 of 15
PRESENTATION ON
  CYBER LAWS
CONTENTS
•   INTRODUCTION
•   NEED FOR CYBER LAWS
•   CYBER LAWS IN INDIA
•   CYBER CRIMES
•   OFFENCES AND LAWS IN CYBER SPACE
•   CYBER LAWS AMENDMENTS
•   CONCLUSION
INTRODUCTION
•   GROWTH OF CYBER SPACE


•   ONSET OF INTERNET


•   CYBER LAW OR LAW OF INTERNET
NEED FOR CYBER LAWS


• TACKLING CYBER
  CRIMES


• INTELLECTUAL
  PROPERTY RIGHTS AND
  COPYRIGHTS
  PROTECTION ACT
CYBER LAWS IN INDIA
• ITACT PASSED IN 2000
• INTERNET IN INDIA
• IMPLEMENTATION OF
  CYBER LAW
• REASONS FOR DELAY
  IN IMPLEMENTATION OF
  CYBER LAWS IN INDIA
IT ACT PROVISIONS
• email would now be a valid and legal form of
  communication in our country that can be duly
  produced and approved in a court of law.

• Companies shall now be able to carry out electronic
  commerce using the legal infrastructure provided by
  the Act.

• Digital signatures have been given legal validity and
  sanction in the Act.
   
IT ACT PROVISIONS
•   The Act now allows Government to issue notification on the web thus heralding e-
    governance


•   statutory remedy in case if anyone breaks into companies computer systems or
    network and causes damages or copies data
CYBER CRIMES
• CYBER CRIMES AGAINST
  PERSONS
 eg ‘melissa’and ‘lovebug’ virus
• CYBER CRIMES AGAINST
  PROPERTY
 eg computer vandalism
• CYBER CRIMES AGAINST
  GOVERNMENT
• eg ‘Al-Qaeda’
CYBER CRIMES
CRIME THROUGH ORKUT
•   Koushambi ,24-year old software
    professional working for TCS was
    brutally killed by Manish Thakur, in a
    hotel room at Andheri.
INTERNET AND ITS EFFECT
• 20% - 30% of Internet pornography
  consumption is by
  children of ages 12 - 17.

• MySpace is being used by
  predators to meet and entice kids
  online.

• Specific marketing strategies are
  being used to attract children to
  porn sites.
OFFENCES AND LAWS IN CYBER
SPACE
• TAMPERING WITH COMPUTER
  DOCUMENTS
• HACKING WITH COMPUTER
  SYSTEM
• PUBLISHING OBSCENE
  MATERIAL ON INTERNET
• BREACHING OF
  CONFIDENTIALITY AND
  PRIVACY
CYBER LAWS AMENDMENTS
•   INDIAN PENAL CODE,1860


•   INDIAN EVIDENCE ACT,1872


•   BANKER’S BOOK EVIDENCE ACT,1891


•   GENERAL CLAUSES ACT,1897
CONCLUSION
•   CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET




•   ACHIEVING GLOBAL PEACE AND HARMONY
THANK YOU

•      QUERIES WELCOMED

More Related Content

What's hot

Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idhambuu
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 

What's hot (20)

Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Similar to Cyber laws

Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptAjayYadav672180
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 

Similar to Cyber laws (20)

cyber-laws (1).ppt
cyber-laws (1).pptcyber-laws (1).ppt
cyber-laws (1).ppt
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Akhila
AkhilaAkhila
Akhila
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
IT Act
IT ActIT Act
IT Act
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 

More from Sourabh Badve

More from Sourabh Badve (8)

Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
Ip routing
Ip routingIp routing
Ip routing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configuration
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Cyber laws

  • 1. PRESENTATION ON CYBER LAWS
  • 2. CONTENTS • INTRODUCTION • NEED FOR CYBER LAWS • CYBER LAWS IN INDIA • CYBER CRIMES • OFFENCES AND LAWS IN CYBER SPACE • CYBER LAWS AMENDMENTS • CONCLUSION
  • 3. INTRODUCTION • GROWTH OF CYBER SPACE • ONSET OF INTERNET • CYBER LAW OR LAW OF INTERNET
  • 4. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 5. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • INTERNET IN INDIA • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 6. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.  
  • 7. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 8. CYBER CRIMES • CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus • CYBER CRIMES AGAINST PROPERTY eg computer vandalism • CYBER CRIMES AGAINST GOVERNMENT • eg ‘Al-Qaeda’
  • 10. CRIME THROUGH ORKUT • Koushambi ,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.
  • 11. INTERNET AND ITS EFFECT • 20% - 30% of Internet pornography consumption is by children of ages 12 - 17. • MySpace is being used by predators to meet and entice kids online. • Specific marketing strategies are being used to attract children to porn sites.
  • 12. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 13. CYBER LAWS AMENDMENTS • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872 • BANKER’S BOOK EVIDENCE ACT,1891 • GENERAL CLAUSES ACT,1897
  • 14. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY
  • 15. THANK YOU • QUERIES WELCOMED