SlideShare a Scribd company logo
1 of 17
Seminar Presentation
on Cyber Laws
 CyberTheory.
Need of Cyber Laws.
Cyber laws in India.
 Cyber Crime & Cyber Crime Cases
 Penalties for cyber crimes.
•In 1980, there were only 50,000 Computers all over the world.
• Today, over 50,000 Computers are being sold each day
globally.
• I think it is fair to say that personal computers have become
the most empowering tool we have ever created.They are
tools of communication, they are tools of creativity & they can
be shaped by their user.
- Bill Gates.
Chairman, Microsoft.
• We live in the E-World ?
E-Commerce, E-billing, E-ticketing, E-mail, E-
learning, E-books.
•Internet is the 6th most important invention
in the life of a human being.
• Everything in this world has Advantages &
Disadvantages.
Real-world & Virtual- world
Current approaches evolved to deal
with real-world crime
Cybercrime occurs in a virtual-world
and therefore presents different issues
 Evolution of Cyber Laws ?
 Advantages of Cyber Law.
Awareness of cyber laws & crimes.
 Does Cyber Law concern me.
•To make our digital life safe.
•Tackling cyber crimes.
• Intellectual property rights & copyrights
protection act.
• Essential feature for today,s world of internet.
•Achieving global peace & harmony.
•INDIAN PENAL CODE,1860.
• INDIAN EVIDENCE ACT,1872.
•BANKERS BOOK EVIDENCE ACT,1891.
•GENERAL CLAUSES ACT,1897
•IT ACT 2000.
 email would now be a valid and legal form of communication
in our country that can be duly produced and approved in a
court of law.
 Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided by the Act.
 Digital signatures have been given legal validity and sanction
in the Act.
Action can be imposed against anyone you creates a
unauthorized access into the system of companies or
industries.
Cyber Crime
• Cyber Crime is unlawful act wherein the
computer is either targeted or used as a tool
to gain unauthorized access into a network.
•Unauthorized access & hacking.
•Virus & worm attack
•Email Spamming.
Virus & Worms
•OfficialWebsite of Maharashtra Government hacked, MUMBAI
,20 september 2007
•Three people held guilty in online credit card scam.
• Orkut : A Danger.
•Offensive Sms can lead to 2 yrs jail.
•CBIWebsite hacked by Pakistani Hackers.
• City principal seeks police help to stop Cyber Crime,Social
networking issue.
Penalties for cyber crime
• Imprisonment
• Fine for unlawful acts.
• Cancelation of certifications
Cyber laws

More Related Content

What's hot

Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.anveshika thakur
 

What's hot (20)

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 

Similar to Cyber laws

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 

Similar to Cyber laws (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT Act
IT ActIT Act
IT Act
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Cyber laws

  • 2.  CyberTheory. Need of Cyber Laws. Cyber laws in India.  Cyber Crime & Cyber Crime Cases  Penalties for cyber crimes.
  • 3.
  • 4. •In 1980, there were only 50,000 Computers all over the world. • Today, over 50,000 Computers are being sold each day globally. • I think it is fair to say that personal computers have become the most empowering tool we have ever created.They are tools of communication, they are tools of creativity & they can be shaped by their user. - Bill Gates. Chairman, Microsoft.
  • 5. • We live in the E-World ? E-Commerce, E-billing, E-ticketing, E-mail, E- learning, E-books. •Internet is the 6th most important invention in the life of a human being. • Everything in this world has Advantages & Disadvantages.
  • 6. Real-world & Virtual- world Current approaches evolved to deal with real-world crime Cybercrime occurs in a virtual-world and therefore presents different issues
  • 7.
  • 8.  Evolution of Cyber Laws ?  Advantages of Cyber Law. Awareness of cyber laws & crimes.  Does Cyber Law concern me.
  • 9. •To make our digital life safe. •Tackling cyber crimes. • Intellectual property rights & copyrights protection act. • Essential feature for today,s world of internet. •Achieving global peace & harmony.
  • 10. •INDIAN PENAL CODE,1860. • INDIAN EVIDENCE ACT,1872. •BANKERS BOOK EVIDENCE ACT,1891. •GENERAL CLAUSES ACT,1897 •IT ACT 2000.
  • 11.  email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act. Action can be imposed against anyone you creates a unauthorized access into the system of companies or industries.
  • 13. • Cyber Crime is unlawful act wherein the computer is either targeted or used as a tool to gain unauthorized access into a network. •Unauthorized access & hacking. •Virus & worm attack •Email Spamming.
  • 15. •OfficialWebsite of Maharashtra Government hacked, MUMBAI ,20 september 2007 •Three people held guilty in online credit card scam. • Orkut : A Danger. •Offensive Sms can lead to 2 yrs jail. •CBIWebsite hacked by Pakistani Hackers. • City principal seeks police help to stop Cyber Crime,Social networking issue.
  • 16. Penalties for cyber crime • Imprisonment • Fine for unlawful acts. • Cancelation of certifications