SlideShare a Scribd company logo
Cyber laws
Seminar topic Report
NAME: Anirudh.R
Roll no: 19MEL004
I year M.sc Applied Electronics
Introduction:
This Topic deals with Cyber law and its need in today’s era ,where everything has become ‘I.T’. Cyber Law is
the law governing cyberspace .Cyber space includes computers ,networks, software’s ,Data storage devices(hard disks,
USB disks etc),Internet,(Websites ,e-mails) even electronic devices such as cell phones, ATM machines etc.
Contents:
 NEED FOR CYBERLAW
 CYBER CRIMES
 INTRODUCTION TO CYBERLAW
 IT ACT -2000
 IT ACT AMENDMENT-2008
 WORLD &CYBER LAW
 IMPORTANCE OF CYBER LAW IN PRESENT ERA
Need For Cyber law:
 Internet has changed the way we think , govern ,commerce and perceive ourselves.
 Information technology is encompassing all walks of life all over the world. Cyber space creates moral ,civil and
criminal wrongs. It has now given a new way to express criminal tendencies.
 Cyberspace is open to participation by all, “IT” has brought Transition from paper to paperless world.
 The laws of real world cannot be interpreted in light of emerging cyberspace to include all aspects relating to
different activities in cyberspace.
 Internet requires an enabling and supportive legal infrastructure in tune with the times.
Cyber law Deals with:
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
What is Cyber crime?
 Any crime with the help of computer and telecommunication technology.
 Any crime with either the computer is used as an object or subject.
Categories of Cyber Crimes:
 Against a Person: Cyber stalking, Impersonation, Loss of privacy, Transmission of obscene material(Harassment
with the use of computer).
 Against a Property: Unauthorized Computer Trespassing, Computer vandalism, Transmission of harmful
programs , Siphoning of funds from financial institutions ,Stealing secret information & data, Copy Right.
 Against a Government: Hacking of government websites, Cyber Extortion, Cyber Terrorism, Computer viruses.
I.T Act-2000:
The information Technology Act ,2000(IT Act),came into force on 17October 2000.
 The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of
electronic records with Government.
 Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
I.T Act -2000 (Objectives):
 To provide legal recognition for transactions.
 To facilitate electronic filing of documents with the Government agencies.
 To amend the Indian Penal Code ,The Indian Evidence Act,1872,The Banker’s Book Evidence Act,1891 and
Reserve Bank of India Act ,1934
 Aims to provide the legal framework to all electronic records.
Snapshots of I.T Act -2000:
Offence section under IT Act
Tampering of Computer source sec.43
Documents(without permission of in charge)
Hacking with computer systems ,Data alteration sec.66
Publishing obscene information sec.67
Un-authorized access to protected system sec.70
Breach of confidentiality and privacy sec.72
Publishing false digital signature certificates sec. 73
Crimes under Indian Penal code and Special Laws:
Offence sections
Sending threatening& sec.503&409 IPC
Defamatory messages by email
Forgery of electronic records sec.463 IPC
Bogus websites , cyber frauds sec.420 IPC
E-mail spoofing &Abuse sec.463 &500 IPC
Web-jacking sec.383 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
I.T Amendment Act-2008:
 The Information Technology AmendmentAct,2008(IT Act 2008) has been passed by parliament on
23rd
December, 2008.
 It received the assent of President of India on 5th
February, 2009.
The IT Act 2008 has been notified on October 27,2009.
Salient Features:
 ITA-2008,is a new version of IT Act 2000.
 Provides additional focus on Information security.
 Added several new sections on offences including Cyber Terrorism and Data Protection.
 124 sections and 14chapters.
 Schedule I and II have been replaced &Schedule III and IV are deleted.
 Amended section 69 gives power to state.
 Section 69A and B, grant power to state to direct blocking for public access of any information through any
computer resource.
Worlds and Cyber laws:
 The Great firewall of China monitors every movement in cyberspace and protect to publish any offensive
content.
 China have a hold on every content which is harmful of dangerous for the government of china.
 Brazil is considered world’s biggest airports for Hackers.
 Iran is also a dangerous country for the Netizens. They also have a crime Police unit for crime in Cyberspace.
Importance of Cyber laws in Today’s Era:
 We are living in highly digitalized world.
 All companies depend upon their computer networks and keep their valuable data in electronic form.
 Government forms including income tax returns, company law forms etc are now filled in electronic form.
 Consumers are increasingly using debit and credit cards and other online mode for shopping.
 Most people are using email, cell phones and SMS messages for communication.
 Even in “ non-cyber crime” cases, important evidence is found in computers/cell phones e.g.
in cases of divorce, murder, kidnapping, organized crimes, terrorist operations, counterfeit currency etc.
 Since it touches all aspects of transactions and activities on and concerning the Internet, the World Wide Web
and Cyberspace therefore Cyber Law is extremely important.

More Related Content

What's hot

IT Act
IT ActIT Act
Information Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notesInformation Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notes
ayushigupta300
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
Omkar Walavalkar
 
Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
cyberjure
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Hacking Activities in Canada
Hacking Activities in CanadaHacking Activities in Canada
Hacking Activities in CanadaIrem Kaya
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
SheikhFiroz1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
Dr. Ajith Sundaram
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
Willislwhite12
 
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
Shakeel Ahmed
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
FAST NUCES
 
Definition of key words
Definition of key wordsDefinition of key words
Definition of key words
Gab and Fascinate Services Ltd
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 

What's hot (20)

IT Act
IT ActIT Act
IT Act
 
Information Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notesInformation Technoogy Act UGC NET Summary notes
Information Technoogy Act UGC NET Summary notes
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Hacking Activities in Canada
Hacking Activities in CanadaHacking Activities in Canada
Hacking Activities in Canada
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
 
Definition of key words
Definition of key wordsDefinition of key words
Definition of key words
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 

Similar to Cyberlaws report

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
Harini Sai
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
mohdadil02912
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
Kanhaiya Kumar
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 

Similar to Cyberlaws report (20)

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
It act 2000
It act 2000It act 2000
It act 2000
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 

Recently uploaded

1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 

Recently uploaded (20)

1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 

Cyberlaws report

  • 1. Cyber laws Seminar topic Report NAME: Anirudh.R Roll no: 19MEL004 I year M.sc Applied Electronics
  • 2. Introduction: This Topic deals with Cyber law and its need in today’s era ,where everything has become ‘I.T’. Cyber Law is the law governing cyberspace .Cyber space includes computers ,networks, software’s ,Data storage devices(hard disks, USB disks etc),Internet,(Websites ,e-mails) even electronic devices such as cell phones, ATM machines etc. Contents:  NEED FOR CYBERLAW  CYBER CRIMES  INTRODUCTION TO CYBERLAW  IT ACT -2000  IT ACT AMENDMENT-2008  WORLD &CYBER LAW  IMPORTANCE OF CYBER LAW IN PRESENT ERA Need For Cyber law:  Internet has changed the way we think , govern ,commerce and perceive ourselves.  Information technology is encompassing all walks of life all over the world. Cyber space creates moral ,civil and criminal wrongs. It has now given a new way to express criminal tendencies.  Cyberspace is open to participation by all, “IT” has brought Transition from paper to paperless world.  The laws of real world cannot be interpreted in light of emerging cyberspace to include all aspects relating to different activities in cyberspace.  Internet requires an enabling and supportive legal infrastructure in tune with the times. Cyber law Deals with:  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy What is Cyber crime?  Any crime with the help of computer and telecommunication technology.  Any crime with either the computer is used as an object or subject. Categories of Cyber Crimes:  Against a Person: Cyber stalking, Impersonation, Loss of privacy, Transmission of obscene material(Harassment with the use of computer).  Against a Property: Unauthorized Computer Trespassing, Computer vandalism, Transmission of harmful programs , Siphoning of funds from financial institutions ,Stealing secret information & data, Copy Right.  Against a Government: Hacking of government websites, Cyber Extortion, Cyber Terrorism, Computer viruses.
  • 3. I.T Act-2000: The information Technology Act ,2000(IT Act),came into force on 17October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters. I.T Act -2000 (Objectives):  To provide legal recognition for transactions.  To facilitate electronic filing of documents with the Government agencies.  To amend the Indian Penal Code ,The Indian Evidence Act,1872,The Banker’s Book Evidence Act,1891 and Reserve Bank of India Act ,1934  Aims to provide the legal framework to all electronic records. Snapshots of I.T Act -2000: Offence section under IT Act Tampering of Computer source sec.43 Documents(without permission of in charge) Hacking with computer systems ,Data alteration sec.66 Publishing obscene information sec.67 Un-authorized access to protected system sec.70 Breach of confidentiality and privacy sec.72 Publishing false digital signature certificates sec. 73 Crimes under Indian Penal code and Special Laws: Offence sections Sending threatening& sec.503&409 IPC Defamatory messages by email Forgery of electronic records sec.463 IPC Bogus websites , cyber frauds sec.420 IPC E-mail spoofing &Abuse sec.463 &500 IPC Web-jacking sec.383 IPC Online sale of Drugs NDPS Act Online sale of Arms Arms Act I.T Amendment Act-2008:  The Information Technology AmendmentAct,2008(IT Act 2008) has been passed by parliament on 23rd December, 2008.  It received the assent of President of India on 5th February, 2009. The IT Act 2008 has been notified on October 27,2009.
  • 4. Salient Features:  ITA-2008,is a new version of IT Act 2000.  Provides additional focus on Information security.  Added several new sections on offences including Cyber Terrorism and Data Protection.  124 sections and 14chapters.  Schedule I and II have been replaced &Schedule III and IV are deleted.  Amended section 69 gives power to state.  Section 69A and B, grant power to state to direct blocking for public access of any information through any computer resource. Worlds and Cyber laws:  The Great firewall of China monitors every movement in cyberspace and protect to publish any offensive content.  China have a hold on every content which is harmful of dangerous for the government of china.  Brazil is considered world’s biggest airports for Hackers.  Iran is also a dangerous country for the Netizens. They also have a crime Police unit for crime in Cyberspace. Importance of Cyber laws in Today’s Era:  We are living in highly digitalized world.  All companies depend upon their computer networks and keep their valuable data in electronic form.  Government forms including income tax returns, company law forms etc are now filled in electronic form.  Consumers are increasingly using debit and credit cards and other online mode for shopping.  Most people are using email, cell phones and SMS messages for communication.  Even in “ non-cyber crime” cases, important evidence is found in computers/cell phones e.g. in cases of divorce, murder, kidnapping, organized crimes, terrorist operations, counterfeit currency etc.  Since it touches all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace therefore Cyber Law is extremely important.