This presentation provides an overview of cyber laws in India. It begins with definitions of cyber crime and classifications of different types of cyber crimes such as those against persons, property, and government. It then discusses the need for cyber laws in India given its growing internet user base. The key cyber laws discussed are the Information Technology Act of 2000 and its 2008 amendment, which created offenses related to hacking, identity theft, cheating, and privacy violations. Statistics on reported cyber crimes in India are also presented. Countermeasures to cyber crimes and the future threats are briefly outlined before a case study is described.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
In this topic we discuss detail about what is law.what is cyber law.and what reasons behind this to ask cyber law and some punishment against cyber crime.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
In this topic we discuss detail about what is law.what is cyber law.and what reasons behind this to ask cyber law and some punishment against cyber crime.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
This ppt is useful for basic understanding of IT Act 2000. This ppt explains offences and relevant penal sections [IT Act & IPC] in cyber crimes. This ppt also explains RBI guidelines in case of fraudulent transactions. Also highlights on liability of customer i.e. when customer has zero liability in fraudulent transaction, limited liability of customer in fraudulent transactions.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
Presentation on Cybercrime as a socio-legal issue. Involves every necessary detail required alongside amazing visuals that makes this PPT stand out among others.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
1. Presentation On
Cyber Laws in India
Presented By
Saumya Srivastava
Shivani Choudhary
Poorva Chaudhary
2. CONTENTS
Cyber Crime-Introduction
Classification of cyber Crimes
Cyber Law-Introduction
Need of Cyber Laws
Indian Crime Scene
IT Act,2000
ITAA,2008
Counter Measures
Future of Cyber Crime in India
Case Study
Conclusion
References
3. CYBER CRIME
It refers to any crime that involves a computer or network. Cyber Crime is technically defined as : "Offences that
are committed against individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)".
4. CLASSIFICATION OF CYBER CRIMES
Against Person
Harassment Cyber Stalking Defamation
Hacking Carding Child Pornography
Against Property
Intellectual Property Crimes Cyber Squatting
Hacking Computer System Cyber Trespass
Against Government
Cyber Terrorism Distribution of Pirated Softwares
Possession of Unauthorised
Information
5. CYBER LAW
Cyber Law is a term that encapsulates the legal issues related to use of the
internet.
• It refers to the legal and regulatory
aspects of internet and world wide web.
• Thus Cyber Space is governed by a
system of laws and regulations called cyber law.
6. WHY SHOULD I KNOW
ABOUT CYBER LAWS?????
As the nature of Internet is changing and this new medium is being seen as the
ultimate medium ever evolved in human history, every activity of yours in
Cyberspace can and will have a Cyber-legal perspective.
At every point of time, there are various Cyber law issues involved. You may
not be bothered about these issues today because you may feel that they are
very distant from you and that they do not have an impact on your Cyber
activities. But sooner or later, you will have to tighten your belts and take note
of Cyber law for your own benefit.
7. INDIAN CRIME SCENE
The major Cyber Crimes reported, in India, are Denial of Services, Defacement
of Websites, Spam, Computer Virus and Worms, Pornography, Cyber
Squatting, Cyber Stalking and Phishing.
8.
9. NEED OF CYBER LAWS IN INDIA
India has a rapidly growing online user base with
121 Million Internet Users
65 Million Active Internet Users
50 Million users shop online on Ecommerce Sites
46+ Million Social Network Users
Today, there are many disturbing things happening in cyberspace. Due to the
anonymous nature of the Internet, it is possible to engage into a variety of criminal
activities with impunity and people with intelligence, have been grossly misusing this
aspect of the Internet to perpetuate criminal activities in cyberspace. Hence the need
for Cyber laws in India.
10. IT ACT,2000
The Information Technology Act, 2000 is the legislation that deals with issues related to Internet.
It attempts to change the outdated laws and provides ways to deal with cyber crimes. The Act
offers the much-needed legal framework so that information is not denied legal effect, validity or
enforceability, solely on the ground that it is in the form of electronic records.
Enacted on 17th May,2000
India is the 12th nation in the world to adopt Cyber Laws
The main purpose of this act is to provide legal recognition to e-commerce and to facilitate filing
of electronic records with the government.
IT Act 2000 consisted of 94 sections segregated into 13 chapters.
11. CHAPTER XI – OFFENCES – 66. Hacking with computer system.
(1)Whoever, intentionally or unintentionally risks the security of a
computer system or network, commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years,
or with fine which may extend up to two lakh rupees, or with both.
Section – 43
Deals with cyber trespassing
“If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with
imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees
or with both.” [S.66]
12. S.66A - Punishment for sending offensive messages through
communication service, etc.
Any person who sends, by means of a computer resource or a communication device;
Any information that is grossly offensive or has menacing character
Shall be punishable with imprisonment for a term which may extend to three years and with fine.
S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other
unique identification feature of any other person, shall be punished with imprisonment of either description
for a term which may extend to three years and shall also be liable to fine which may extend to rupees one
lakh”
13. S. 66D - Punishment for cheating by personation by using computer resource
“Whoever, by means of any communication device or computer resource cheats by personation, shall
be punished with imprisonment of either description for a term which may extend to three years and shall
also be liable to fine which may extend to one lakh rupees. “
S. 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any
person without his or her consent, under circumstances violating the privacy of that person, shall be
punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or
with both”
S. 67 A - Punishment for publishing or transmitting of material containing
sexually explicit act, etc. in electronic form
“Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material
which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of
either description for a term which may extend to five years and with fine which may extend to ten lakh
rupees”
14. S. 67 C - Preservation and Retention of information by intermediaries.
“(1) Intermediary shall preserve and retain such information as may be specified for such duration and in
such manner and format as the Central Government may prescribe.
(2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.”
15. IT AMENDMENT ACT,2008
It has added several new sections on offences including cyber terrorism and data
production
IT Amendment act 2008 has been passed by the parliament on 23rd december,2008
and came into force from October 27,2009 onwards.
FEATURES OF ITAA,2008
• Focusing on data privacy
• Focusing on information security
• Making digital signature technology neutral
• Defining reasonable security practices to be followed by corporate
• Penalty for securing access to a protected system.
• Tampering with computer source documents
• Punishment for sending offensive or have menacing character
• Punishment for violation of privacy.
16. Arrests and Reports under IT Act
Under the IT Act, 966 cybercrime cases were filed in
2010 (420 in 2009)
Geographic breakdown of cases reported:
153 from Karnataka,
148 from Kerala
142 from Maharashtra
105 Andhra Pradesh
52 Rajasthan
52 Punjab
233 persons were arrested in 2010
33% of the cases registered were related to
hacking
Arrests and Reports Under IPC
Under the IPC, 356 cybercrime cases were
registered in 2010 (276 cases in 2009)
Geographic breakdown of cases reported --
104 from Maharashtra
66 Andhra Pradesh
46 Chhattisgarh
The majority of these crimes were either forgery or
fraud cases.
Source: National Crime Records Bureau
17. Counter Measures
An important question arises that how can these crimes be prevented. A number of techniques and
solutions have been presented but the problems still exists and are increasing day by day.
Anti Virus
Firewalls
Cryptography
Cyber Laws
18. The Future of Cyber-Crimes in India
Continued Website Hacks and Defacements
Data and Information theft
Increasing phishing attacks on Ecommerce and Financial Websites
Cybercriminals targeting Social and Professional Networks
Threats directed at the Mobile Platform: Smartphones and Tablets
19. CASE STUDY
October 2, 2014
Unable to challenge the might of Google with his potent search engine tezguru.com in the want
of funds in 2009, a teenaged techno genius Shivendu Madhav turned into an alleged cyber
criminal five years later.
The 22-year-old techno whizkid from Siwan district of Bihar, Shivendu was arrested by the UP STF
on October 1 in Lucknow, for allegedly being the tech brain of a Varanasi-based racket of
youths, who had allegedly created the fake portal of the Railway Recruitment Board
tezguru.com, had even won accolades from former president Dr APJ Abdul Kalam in 2009 at a
techno exhibition in Bihar
Duped large number of job aspirants nationwide in the name of railway jobs, spanning from
track men to ticket collector
The young fraudsters had not only developed the fake RRB-Bhopal website, but also gave
hypertext links to RRB's official website http://www.rrbbpl.nic.in/so that anybody logging on to
the fake site and clicking on a link was taken to the official site, adding credibility to the
fraudsters' claims
Processing fees of Rs 300 and Rs 500
20. Police came to know about Shivendu through a Mumbai-based internet payment gateway which was
being used by him and aides and subsequently located the racket to be based in Varanasi.
To ensure that duped job aspirants get their money back, Rs 13 lakh sum earned by fraudsters has been
blocked with the internet payment gateway being used by them and the money will soon be
reimbursed to job aspirants
SHIVENDU MADHAV
21. CONCLUSION
As internet technology advances so does the threat of cyber crime. In times like these
we must protect ourselves from cyber crime. Anti-virus software, firewalls and
security patches are just the beginning.
Though a crime free society exists only in a dream- land, it should be constant
endeavour of rules to keep the crimes lowest. Technology is always a double-edged
sword and can be used for both the purposes – good or bad. But, it should be the
persistent efforts of rulers and law makers to ensure that technology grows in a
healthy manner and is used for legal and ethical business growth and not for
committing crimes.
The enforcement agencies are required to be well versed with the changing
technologies and Laws.”