SlideShare a Scribd company logo
1 of 29
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali   [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law  &  IPR Expert Email Crimes & Indian Cyber Law
INTRODUCTION  ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
DIFFERENT TYPES OF CYBERCRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
E-MAIL RELATED CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount  of  $8000000 USD
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable  Section 415,416, 417 420 of IPC  
2. Sending Malicious Codes through email  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
3.  Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber  jams your inbox continuously with same emails
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b)  If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability :  Compensation to be paid Section(66)  :  Imprisonment upto 3yrs  OR   Fine up to 5 Lakhs OR Both Also Applicable  Section 379,405,420 of IPC
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist  Javed Akhtar  has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section  66-A   Punishment for sending offensive messages through  communication service, etc.      Any person who sends, by means of a computer resource or a communication device,- a) any   information  that is grossly offensive or has menacing character; or b) any   information  which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred,  or ill will, persistently makes  by making  use of such computer resource or a  communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with  imprisonment for a term which may extend to two three years  and with fine.
6. Emails containing sexually explicit act etc w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 66 and 43(d)  :  DATA DIDDLING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines  Cyber Terrorism and  Section 66-F(2) Specifies Punishment of imprisonment  which may extend to imprisonment for life
Section 66C:  IDENTITY THEFT ,[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section 66C: IDENTITY THEFT- CASE STUDY ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section(66) : CREDIT CARD FRAUD ,[object Object],[object Object],[object Object]
Section(66) :  PHISHING  ,[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section(66) :  PHISHING Case Study ,[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
EMAIL  DEFAMATION CASE  ,[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Tata Sons v. Greenpeace International  Delhi HC  IA 9089/2010 in CS (OS) 1407/2010 ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You   Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell:  9821763157

More Related Content

What's hot

Cyber assignment
Cyber assignmentCyber assignment
Cyber assignmentsparun
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)Pruthvi Prince
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)Pruthvi Prince
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law casesSnavi
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)santoshdkamat
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber lawPrakash Masagi
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Ezra Paul
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sectionsvijayjituri
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentvishalhp123
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdam Varn
 

What's hot (16)

Cyber assignment
Cyber assignmentCyber assignment
Cyber assignment
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law cases and sections (1)
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
 
It act
It actIt act
It act
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber law cases and sections(1)
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber
CyberCyber
Cyber
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases.
 
Cyber law cases and sections
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 

Similar to Email crimes and IT Law-Nasscom cyber safe 2010

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 

Similar to Email crimes and IT Law-Nasscom cyber safe 2010 (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Shilpa
ShilpaShilpa
Shilpa
 
Hacking laws in india
Hacking laws in indiaHacking laws in india
Hacking laws in india
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 

More from Adv Prashant Mali

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant maliAdv Prashant Mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliAdv Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summitAdv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 

More from Adv Prashant Mali (15)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

Recently uploaded

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 

Recently uploaded (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 

Email crimes and IT Law-Nasscom cyber safe 2010

  • 1. Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law & IPR Expert Email Crimes & Indian Cyber Law
  • 2.
  • 3.
  • 4.
  • 5. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount of $8000000 USD
  • 6. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 7. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 8. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 9. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 10. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable Section 415,416, 417 420 of IPC  
  • 11. 2. Sending Malicious Codes through email w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
  • 12. 3. Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber jams your inbox continuously with same emails
  • 13. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 14. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 15. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 16. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b) If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability : Compensation to be paid Section(66) : Imprisonment upto 3yrs OR Fine up to 5 Lakhs OR Both Also Applicable Section 379,405,420 of IPC
  • 17. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist Javed Akhtar has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
  • 18. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-A   Punishment for sending offensive messages through communication service, etc.     Any person who sends, by means of a computer resource or a communication device,- a) any  information that is grossly offensive or has menacing character; or b) any  information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with imprisonment for a term which may extend to two three years and with fine.
  • 19.
  • 20.
  • 21. 7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines Cyber Terrorism and Section 66-F(2) Specifies Punishment of imprisonment which may extend to imprisonment for life
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell: 9821763157