SlideShare a Scribd company logo
Cyber Laws
Cyber Crime
• Cyber crime is a generic term that refers to all criminal
activities done using the medium of computers, the
Internet, cyber space and the worldwide web.
• Use of online social networks.
What is Cyber Law?
• Cyber law is a term used to describe the legal
issues related to use of communications
technology, particularly “cyberspace”
i.e. the Internet.
CYBER LAWS IN INDIA
• ITACT PASSED IN
2000
• IMPLEMENTATION
OF CYBER LAW
• REASONS FOR
DELAY IN
IMPLEMENTATION
OF CYBER LAWS IN
INDIA
NEED FOR CYBER LAWS
• TACKLING CYBER
CRIMES
• INTELLECTUAL
PROPERTY RIGHTS
AND COPYRIGHTS
PROTECTION ACT
Types of Cyber crimes
• Credit card frauds
• Cyber pornography
• Sale of illegal articles-narcotics,
weapons, wildlife
• Online gambling
• Intellectual Property crimes-
software piracy, copyright
infringement, trademarks
violations, theft of computer
source code
• Email spoofing
• Forgery
• Defamation
• Cyber stalking (section 509 IPC)
• Phishing
• Cyber terrorism
Crime
against
property
Crime
against
Government
Crime
against
persons
Types of Cyber Crime
• Hacking
• Data Theft
• Spreading Virus or Worms
• Identity Theft
• E-Mail Spoofing
Hacking
• Hacking means unauthorized attempts to bypass
the security mechanisms of an information
system or network.
• Unauthorized access to a computer system,
programs, data and network resources. (The
term “hacker” originally meant a very gifted
programmer.
Hacking: Law & Punishment
• Under Information Technology (Amendment) Act,
2008, Section 43(a) read with section 66 is applicable
and Section 379 & 406 of Indian Penal Code, 1860 also
are applicable.
• If crime is proved under IT Act, accused shall be
punished for imprisonment, which may extend to three
years or with fine, which may extend to five lakh rupees
or both.
Data Theft
• Data Theft is a growing problem, primarily perpetrated
by office workers with access to technology such as
desktop computers and handheld devices, capable of
storing digital information such as flash drives, iPods
and even digital cameras.
• The damage caused by data theft can be considerable
with today’s ability to transmit very
large files via e-mail, web pages, USB
devices, DVD storage and other
hand-held devices.
Data Theft: Law & Punishment
• Law & Punishment: Under Information Technology
(Amendment) Act, 2008, Section 43(b) read with
Section 66 is applicable and under Section 379, 405 &
420 of Indian Penal Code, 1860 also applicable. Data
Theft offence is cognizable, bailable, compoundable
with permission of the court before which the
prosecution of such offence is pending and triable by
any magistrate.
Spreading Virus or Worms
• In most cases, viruses can do any amount of damage,
the creator intends them to do.
• They can send your data to a third party and then delete
your data from your computer.
• They can also ruin/mess up your system and render it
unusable without a re-installation of the operating
system.
• Most have not done this much damage in
the past, but could easily do this in the future.
Spreading Virus or Worms
• Usually the virus will install files on your system
and then will change your system so that virus
program is run every time you start your system.
• It will then attempt to replicate itself by sending
itself to other potential victims.
Spreading Virus or Worms:
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 43(c) & 43(e) read with
Section 66 is applicable and under Section 268
of Indian Penal Code, 1860 also applicable.
• Spreading of Virus offence is cognizable,
bailable, compoundable with permission of the
court before which the prosecution of such
offence is pending and triable by any magistrate.
Identity Theft
• It is a form of fraud or cheating of another person’s
identity in which someone pretends to be someone else
by assuming that person’s identity.
• Information Technology (Amendment) Act, 2008,
crime of identity theft under Section 66-C, whoever,
fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification
feature of any other person known as identity theft.
Identity theft is a term used to refer to fraud that
involves stealing money or getting other benefits by
pretending to be someone else.
Email spoofing
• Email spoofing is a technique used by hackers to
fraudulently send email messages in which the sender
address and other parts of the email header are altered
to appear as though the email originated from a source
other than its actual source.
• Hackers use this method to disguise the actual email
address from which phishing and spam messages are
sent and often use email spoofing in conjunction with
Web page spoofing to trick users into providing
personal and confidential information
Email spoofing:
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-D and Section417, 419 &
465of Indian Penal Code, 1860 also applicable.
Email spoofing offence is cognizable, bailable,
compoundable with permission of the court
before which the prosecution of such offence is
pending and triable by any magistrate.
IT ACT, 2000
• The IT Act is a first step taken by the
Government of India towards promoting the
growth of electronic commerce. Despite all its
failings, it is a first historical step.
• We in India also have had a vision to become
the 12th nation in the world to enact a Cyber
law. We have enacted the Information
Technology Act, 2000.
THE IT ACT, 2000 –
OBJECTIVES
• To provide legal recognition for transactions:-
Carried out by means of electronic data
interchange,
• Other means of electronic communication,
commonly referred to as "electronic commerce",
involving the use of alternatives to paper-based
methods of communication and storage of
information,
THE IT ACT, 2000 –
OBJECTIVES
• To facilitate electronic filing of documents with the
Government agencies
• To amend the Indian Penal Code, the Indian
Evidence Act, 1872, the Banker's Book Evidence
Act, 1891 and the Reserve Bank of India Act, 1934
Conclusion
• CYBER LAWS –
ESSENTIAL FEATURE IN TODAYS WORLD OF
INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY
Thank You

More Related Content

What's hot

Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
DINESH KAMBLE
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
atuljaybhaye
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Cyber crime
Cyber crimeCyber crime
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 

Viewers also liked

9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Knowsatyam mishra
 
Ppt to stop the legal terrorism
Ppt to stop the legal terrorismPpt to stop the legal terrorism
Ppt to stop the legal terrorismswarup1972
 
Punjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous electionsPunjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous elections
Centre for Public Policy Research
 
Supernova presentation
Supernova presentationSupernova presentation
Supernova presentationAkshay Mehra
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Visual Resumes
Visual ResumesVisual Resumes
Visual Resumes
Chahat Raj Kapoor
 
Ethics in media
Ethics in mediaEthics in media
minimum wages act 1948
minimum wages act 1948minimum wages act 1948
minimum wages act 1948shhilpa
 
PowerPoint Visual Resume
PowerPoint Visual ResumePowerPoint Visual Resume
PowerPoint Visual Resume
Artyom Shostak
 
Sample PPT from College
Sample PPT from CollegeSample PPT from College
Sample PPT from College
meridian2327
 
Nationalism In India
Nationalism In IndiaNationalism In India
Nationalism In India
Charmi Doshi
 
Nationalism in india.
Nationalism in india. Nationalism in india.
Nationalism in india.
Sahil Srivastava
 
Amazing simple facts
Amazing simple factsAmazing simple facts
Amazing simple facts
Celeb 98
 
Global financial crisis 2008
Global financial crisis 2008Global financial crisis 2008
Global financial crisis 2008valliappan1991
 
BuzzFeed Pitch Deck
BuzzFeed Pitch DeckBuzzFeed Pitch Deck
BuzzFeed Pitch Deck
Tech in Asia ID
 
Contently Pitch Deck
Contently Pitch DeckContently Pitch Deck
Contently Pitch Deck
Ryan Gum
 
Pendo Series B Investor Deck External
Pendo Series B Investor Deck ExternalPendo Series B Investor Deck External
Pendo Series B Investor Deck External
Todd Olson
 
Visual resume
Visual resumeVisual resume
Visual resume
Saranyan Vigraham
 
Tinder Pitch Deck
Tinder Pitch DeckTinder Pitch Deck
Tinder Pitch Deck
Ryan Gum
 
Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008
Ryan Gum
 

Viewers also liked (20)

9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know
 
Ppt to stop the legal terrorism
Ppt to stop the legal terrorismPpt to stop the legal terrorism
Ppt to stop the legal terrorism
 
Punjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous electionsPunjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous elections
 
Supernova presentation
Supernova presentationSupernova presentation
Supernova presentation
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Visual Resumes
Visual ResumesVisual Resumes
Visual Resumes
 
Ethics in media
Ethics in mediaEthics in media
Ethics in media
 
minimum wages act 1948
minimum wages act 1948minimum wages act 1948
minimum wages act 1948
 
PowerPoint Visual Resume
PowerPoint Visual ResumePowerPoint Visual Resume
PowerPoint Visual Resume
 
Sample PPT from College
Sample PPT from CollegeSample PPT from College
Sample PPT from College
 
Nationalism In India
Nationalism In IndiaNationalism In India
Nationalism In India
 
Nationalism in india.
Nationalism in india. Nationalism in india.
Nationalism in india.
 
Amazing simple facts
Amazing simple factsAmazing simple facts
Amazing simple facts
 
Global financial crisis 2008
Global financial crisis 2008Global financial crisis 2008
Global financial crisis 2008
 
BuzzFeed Pitch Deck
BuzzFeed Pitch DeckBuzzFeed Pitch Deck
BuzzFeed Pitch Deck
 
Contently Pitch Deck
Contently Pitch DeckContently Pitch Deck
Contently Pitch Deck
 
Pendo Series B Investor Deck External
Pendo Series B Investor Deck ExternalPendo Series B Investor Deck External
Pendo Series B Investor Deck External
 
Visual resume
Visual resumeVisual resume
Visual resume
 
Tinder Pitch Deck
Tinder Pitch DeckTinder Pitch Deck
Tinder Pitch Deck
 
Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008
 

Similar to Indian Cyber laws

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
infantemiliya
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
barsha2011
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Cyber Laws
Cyber LawsCyber Laws
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
maneeshchandran1
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 

Similar to Indian Cyber laws (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 

Recently uploaded

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Indian Cyber laws

  • 2. Cyber Crime • Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web. • Use of online social networks.
  • 3. What is Cyber Law? • Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace” i.e. the Internet.
  • 4. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. Types of Cyber crimes • Credit card frauds • Cyber pornography • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling • Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code • Email spoofing • Forgery • Defamation • Cyber stalking (section 509 IPC) • Phishing • Cyber terrorism Crime against property Crime against Government Crime against persons
  • 7. Types of Cyber Crime • Hacking • Data Theft • Spreading Virus or Worms • Identity Theft • E-Mail Spoofing
  • 8.
  • 9. Hacking • Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. • Unauthorized access to a computer system, programs, data and network resources. (The term “hacker” originally meant a very gifted programmer.
  • 10. Hacking: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable. • If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lakh rupees or both.
  • 11. Data Theft • Data Theft is a growing problem, primarily perpetrated by office workers with access to technology such as desktop computers and handheld devices, capable of storing digital information such as flash drives, iPods and even digital cameras. • The damage caused by data theft can be considerable with today’s ability to transmit very large files via e-mail, web pages, USB devices, DVD storage and other hand-held devices.
  • 12. Data Theft: Law & Punishment • Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable. Data Theft offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 13. Spreading Virus or Worms • In most cases, viruses can do any amount of damage, the creator intends them to do. • They can send your data to a third party and then delete your data from your computer. • They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. • Most have not done this much damage in the past, but could easily do this in the future.
  • 14. Spreading Virus or Worms • Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. • It will then attempt to replicate itself by sending itself to other potential victims.
  • 15. Spreading Virus or Worms: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable. • Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 16. Identity Theft • It is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity. • Information Technology (Amendment) Act, 2008, crime of identity theft under Section 66-C, whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as identity theft. Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else.
  • 17. Email spoofing • Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source. • Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information
  • 18. Email spoofing: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-D and Section417, 419 & 465of Indian Penal Code, 1860 also applicable. Email spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 19. IT ACT, 2000 • The IT Act is a first step taken by the Government of India towards promoting the growth of electronic commerce. Despite all its failings, it is a first historical step. • We in India also have had a vision to become the 12th nation in the world to enact a Cyber law. We have enacted the Information Technology Act, 2000.
  • 20. THE IT ACT, 2000 – OBJECTIVES • To provide legal recognition for transactions:- Carried out by means of electronic data interchange, • Other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information,
  • 21. THE IT ACT, 2000 – OBJECTIVES • To facilitate electronic filing of documents with the Government agencies • To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934
  • 22. Conclusion • CYBER LAWS – ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY