SlideShare a Scribd company logo
Seminar on Information
Technology Act
Presented By Presented To
Divesh Mewara Mr. Pankaj Dadheech
11ESKCS045 Reader
Contents
 Cyber Crime
 Cyber Crime in India
 Cyber Crime in USA
 Cyber Crime in UK
 IT Act
 Positive Initiatives & Recommendations
 Intellectual Property
 Patents and Trademarks
 Copyrights
Cyber Crime
• Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a
tool to commit an offence (child pornography, hate crimes).
• Cybercriminals may use computer technology to access personal
information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use
computers for communication and document or data storage.
• It mainly consists of unauthorized access to computer systems,
data alteration, data destruction, data theft etc.
• The first recorded cyber crime took place in the year 1820.
Types of Cybercrime
1.HACKING :
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as
CRACKING. Government websites are the hot targets of the
hackers due to the press coverage, it receives. Hackers enjoy
the media coverage.
2.CHILD PORNOGRAPHY:
The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. . As more homes have
access to internet, more children would be using the internet
and more are the chances of falling victim to the aggression of
pedophiles.
Types of Cybercrime
3.COMPUTER VANDALISM:
Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting virus: These are
programs that attach themselves to a file and then circulate .
They usually affect the data on a computer, either by altering or
deleting it against properties.
Types of Cybercrim
4.SOFTWARE PIRACY:
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
Cyber Crime in India
• The major Cyber Crimes reported, in India,
are phishing, Spam, hacking, Computer Virus
and Worms, Denial of Services, Defacement of
websites.
• Nearly $4 billion in direct financial losses
country every year.
• 29.9 million people fell victim to cybercrime.
• 3 in 5 online adults (60%) have been a victim
of Cybercrime.
Cyber cell office in India
Cyber cell offices are
situated in india's major
cities like
1.chennai
2.Banglore
3Delhi
4Mumbai
5.Hyderabad
6.pune
Charges of solving of
cyber crimes
•Charges of solving of different cyber crime in india
varies according to their complexities.
•Because there are different kind of cyber crimes are
exist in india.
For ex:- credit card fraud
Atm card fraud
Identity theft
Password stealing.
Cyber Crime in USA
• USA is the most targeted country for cyber
attacks.
• Social networks as well as ecommerce sites are
major targets.
• 14,348 website defacements in 2011.
• 4,150 .com domains were defaced during 2012.
• 15,000 sites hacked in 2012.
• USA is the number 1 country in the world for
generating spam.
Cyber Crime in European Union
• UK is the one of the most targeted country
for cyber attacks after USA.
• 71 Million Internet Users .
• 35 Million Active Internet Users, up by 28%
from 26 million in 2010.
• 20 Million users shop online on Online
Shopping Sites.
Cyber security
 Cyber security involves protection of sensitive personal and
business information through prevention, detection, and
response to different online attacks.
 Cyber security actually protects your personal information by
responding, detecting and preventing the attacks. Cyber
security
Privacy policy :
 Before submitting your name, email address, or other personal
information on a web site, look for the site's privacy policy.
 Many sites use SSL or secure sockets layer, to encrypt
information. Protecting your privacy.
Keep software up to date:
If the seller releases patches for the software
operating your device, install them as soon as possible.
Installing them will prevent attackers from being able to take
advantage. Use good passwords: Select passwords that will
be difficult for thieves to guess. Do not choose options that
allow your computer to remember your passwords. How
can we protect?
Disable remote connectivity:
Some PDA’s and phones are equipped with wireless
technologies, such as Bluetooth, that can be used to connect
to other devices or computers. You should disable these
features when they are not in use.
Advantages of cyber security
 It will defend us from critical attacks.
 It helps us to browse the safe website.
 Internet security process all the incoming and outgoing data on our
computer.
Challenges of cyber security
Challenges of cyber security Explosion of computer and
broadband internet availability .
Low priority of security for software developers.
Challenge of timely patching vulnerabilities on all systems.
Safety tips to cyber Crime
Use antivirus software’s
insert firewalls
 uninstall unnecessary software
check security settings
IT Act,2000
 Enacted on 17th May 2000- India is 12th
nation in the world to adopt cyber laws. It
was amended in 2008.
 It involve the use of alternatives to paper-
based methods of communication and
storage of information, to facilitate
electronic filing of documents with the
Government agencies and further to
amend the Indian Penal Code and other
Acts.
Cyber Law of European Union
Cyber crimes can involve criminal activities that are traditional
in nature, such as theft, fraud, forgery, defamation and
mischief.
In Simple way we can say that cyber crime is unlawful acts
wherein the computer is either a tool or a target or both .
The abuse of computers has also given birth to a gamut of
new age crimes that are addressed by the Information
Technology Act, 2000.
European Union criminal law
Article 2 – Illegal access
Article 3 – Illegal interception
Article 4 – Data interference
DesigArticle 5 – System interference
Article 6 – Misuse of devices
Article 7 – Computer-related forgery
Article 8 – Computer-related fraud
Case Study-1
Case of Child Pornography:-
Culprit: David.v.mazinta
Year: In 2001
Article: under Article 8
• Offences related to child pornography
The case is related to cyber crime as the internet is being
highly used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access to
internet, more children would be using the internet and
more are the chances of falling victim to the aggression of
pedophiles.
Caught by Inter Pole
Punishment: Sent to jail for 5 years.
Case Study-2
Case: SWEDEN Citibank Call Center Fraud
€ 3,50,000 from accounts of four customers were dishonestly transferred
to bogus accounts
Contd..
. In such cases, preliminary investigations do not
reveal that the criminals had any crime history.
Customer education is very important so
customers do not get taken for a ride.
So , under the EUROPEAN ACT 227-24,
Those employees were punished and were
imprisoned for 7 years.
Positive Initiatives &
Recommendations
 Mumbai Cyber lab is a joint initiative of
Mumbai police and NASSCOM has been set
up.
 Stricter provisions for online offences
required as compared to offline mode.
 More Public awareness campaigns
 Training of police officers to effectively
combat cyber crimes.
Intellectual
property
Intellectual property (IP)
refers to creations of the
mind: inventions, literary
and artistic works, and
symbols, names, images,
and designs used in
commerce.
Meaning
Categories of Intellectual Property
Industrial property, which includes
inventions (patents), trademarks,
industrial designs, and geographic
indications of source
Copyright, which includes literary
and artistic works such as novels,
poems and plays, films, musical
works, dance, artistic works such as
drawings, paintings, photographs ,
sculptures, and architectural designs
Rights related to copyright
include those of performing
artists in their performances,
producers of phonograms in
their recordings, and those
of broadcasters in their radio
and television programs.
Cont…
 Intellectual Property rights provide an
exclusive right to stop others.
 Intellectual Property right holder may
provide licenses to others.
Intellectual Property Right
Intellectual Property
Rights, by providing
exclusive rights to the
inventor or creator,
encourages more and
more people to invest
time, efforts and
money in such
innovations and
creations.
Patents and Trademarks
 Patents are the primary means of protecting an
original invention/design.
 The right to exclusively produce, use and /or
market a product, process or any improvement.
 Invention is patentable if its new, useful and not
obvious.
 Any symbol, logo, word, sound, color, design, or
other device that is used to identify a business
or a product is TRADEMARK.
 It has a longer life than a patent.
What is “copyright”?
Copyright is a legal term
describing rights given to
creators for their literary
and artistic works.
Cont…
“The statutory privilege extended
to creators of works that are fixed
in a tangible medium of
expression.”
(Bruwelheide, 1995)
Copyrights
• Copyright is a form of protection given to
authors/creators of original works.
• This property right can be sold or transferred to
others.
• Copyright is a legal protection for the authors of
“original works of authorship”.
• Copyright protects a creator’s work from being
copied, distributed, or adapted without the
permission of the copyright holder
What is covered by copyright?
literary works such as novels,
poems, plays, reference works,
newspapers and computer
programs; databases;
films, musical compositions, and
choreography;
artistic works such as paintings,
drawings, photographs and
sculpture; architecture;
and advertisements, maps and
technical drawings.
What is covered by copyright?
literary works such as novels,
poems, plays, reference works,
newspapers and computer
programs; databases;
films, musical compositions, and
choreography;
artistic works such as paintings,
drawings, photographs and
sculpture; architecture;
and advertisements, maps and
technical drawings.
What is not covered by copyright?
•ideas
•facts
•recipes
•blank forms
•stock literary devices
•works lacking
originality (e.g. the
phone book)
•names, titles or short
phrases
•works from the federal
government
Limitations on Copyright
Library and classroom exemptions
Fair use
Duration of Copyright
Copyright in a literary work, lasts for the-
Author’s lifetime plus 50 years from the
end of
The calendar year in which the author
dies
 50 years for films and sound recordings
 25 years for typographical arrangements
of a published edition
Cont…
Moral rights last for as long as
Copyright and can not be assigned
An author may waive his/her
moral rights by signing an
agreement to that effect
Importance of copyright
Respect intellectual rights of creators
of information
Reward creativity of authors, artists,
musicians, etc.
Legal mandate
Model proper behavior for students,
teachers, and other members of
educational community
Conclusion
Cybercrime is indeed getting the recognition it deserves. However,
it is not going to restricted that easily. In fact, it is highly likely that
cybercrime and its hackers will continue developing and upgrading
to stay ahead of the law. So, to make us a safer we must need
cyber security.
Intellectual Property Rights, by providing exclusive rights to the
inventor or creator, encourages more and more people to invest
time, efforts and money in such innovations and creations.
Copyright is a form of protection given to authors/creators of original works.
Copyright protects a creator’s work from being copied, distributed, or
adapted without the permission of the copyright holder.
References
 http://www.ipindia.nic.in
 http://www.itrlwaw.com
 http://www.fbi.nic.in
 -CyberCrime@IPA (Council of
Europe) 2012: Article 15 –
conditions and safeguards
http://www.coe.int/
Information Technology and IT act

More Related Content

What's hot

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
Cyber law
Cyber lawCyber law
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
pattok
 
it act
it act it act
it act
9535814851
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
Amlin David
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
Rodney D. Ryder
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Rahul Bharati
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Network Intelligence India
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 

What's hot (20)

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber law
Cyber lawCyber law
Cyber law
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
it act
it act it act
it act
 
It act 2000
It act 2000It act 2000
It act 2000
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 

Similar to Information Technology and IT act

Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
Syangba132
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
Nithin Raj
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
ijfcstjournal
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 

Similar to Information Technology and IT act (20)

Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
it act
it actit act
it act
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Information Technology and IT act

  • 1. Seminar on Information Technology Act Presented By Presented To Divesh Mewara Mr. Pankaj Dadheech 11ESKCS045 Reader
  • 2. Contents  Cyber Crime  Cyber Crime in India  Cyber Crime in USA  Cyber Crime in UK  IT Act  Positive Initiatives & Recommendations  Intellectual Property  Patents and Trademarks  Copyrights
  • 3. Cyber Crime • Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offence (child pornography, hate crimes). • Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. • It mainly consists of unauthorized access to computer systems, data alteration, data destruction, data theft etc. • The first recorded cyber crime took place in the year 1820.
  • 4. Types of Cybercrime 1.HACKING : Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. 2.CHILD PORNOGRAPHY: The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. . As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 5. Types of Cybercrime 3.COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it against properties.
  • 6. Types of Cybercrim 4.SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 7. Cyber Crime in India • The major Cyber Crimes reported, in India, are phishing, Spam, hacking, Computer Virus and Worms, Denial of Services, Defacement of websites. • Nearly $4 billion in direct financial losses country every year. • 29.9 million people fell victim to cybercrime. • 3 in 5 online adults (60%) have been a victim of Cybercrime.
  • 8. Cyber cell office in India Cyber cell offices are situated in india's major cities like 1.chennai 2.Banglore 3Delhi 4Mumbai 5.Hyderabad 6.pune
  • 9. Charges of solving of cyber crimes •Charges of solving of different cyber crime in india varies according to their complexities. •Because there are different kind of cyber crimes are exist in india. For ex:- credit card fraud Atm card fraud Identity theft Password stealing.
  • 10. Cyber Crime in USA • USA is the most targeted country for cyber attacks. • Social networks as well as ecommerce sites are major targets. • 14,348 website defacements in 2011. • 4,150 .com domains were defaced during 2012. • 15,000 sites hacked in 2012. • USA is the number 1 country in the world for generating spam.
  • 11. Cyber Crime in European Union • UK is the one of the most targeted country for cyber attacks after USA. • 71 Million Internet Users . • 35 Million Active Internet Users, up by 28% from 26 million in 2010. • 20 Million users shop online on Online Shopping Sites.
  • 12. Cyber security  Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks.  Cyber security actually protects your personal information by responding, detecting and preventing the attacks. Cyber security Privacy policy :  Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy.  Many sites use SSL or secure sockets layer, to encrypt information. Protecting your privacy.
  • 13. Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage. Use good passwords: Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords. How can we protect? Disable remote connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 14. Advantages of cyber security  It will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.
  • 15. Challenges of cyber security Challenges of cyber security Explosion of computer and broadband internet availability . Low priority of security for software developers. Challenge of timely patching vulnerabilities on all systems.
  • 16. Safety tips to cyber Crime Use antivirus software’s insert firewalls  uninstall unnecessary software check security settings
  • 17. IT Act,2000  Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws. It was amended in 2008.  It involve the use of alternatives to paper- based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code and other Acts.
  • 18.
  • 19. Cyber Law of European Union Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief. In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both . The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
  • 20. European Union criminal law Article 2 – Illegal access Article 3 – Illegal interception Article 4 – Data interference DesigArticle 5 – System interference Article 6 – Misuse of devices Article 7 – Computer-related forgery Article 8 – Computer-related fraud
  • 21. Case Study-1 Case of Child Pornography:- Culprit: David.v.mazinta Year: In 2001 Article: under Article 8 • Offences related to child pornography
  • 22. The case is related to cyber crime as the internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. Caught by Inter Pole Punishment: Sent to jail for 5 years.
  • 23. Case Study-2 Case: SWEDEN Citibank Call Center Fraud € 3,50,000 from accounts of four customers were dishonestly transferred to bogus accounts
  • 24. Contd.. . In such cases, preliminary investigations do not reveal that the criminals had any crime history. Customer education is very important so customers do not get taken for a ride. So , under the EUROPEAN ACT 227-24, Those employees were punished and were imprisoned for 7 years.
  • 25. Positive Initiatives & Recommendations  Mumbai Cyber lab is a joint initiative of Mumbai police and NASSCOM has been set up.  Stricter provisions for online offences required as compared to offline mode.  More Public awareness campaigns  Training of police officers to effectively combat cyber crimes.
  • 27. Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Meaning
  • 28. Categories of Intellectual Property Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, dance, artistic works such as drawings, paintings, photographs , sculptures, and architectural designs
  • 29. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs. Cont…
  • 30.  Intellectual Property rights provide an exclusive right to stop others.  Intellectual Property right holder may provide licenses to others.
  • 31. Intellectual Property Right Intellectual Property Rights, by providing exclusive rights to the inventor or creator, encourages more and more people to invest time, efforts and money in such innovations and creations.
  • 32. Patents and Trademarks  Patents are the primary means of protecting an original invention/design.  The right to exclusively produce, use and /or market a product, process or any improvement.  Invention is patentable if its new, useful and not obvious.  Any symbol, logo, word, sound, color, design, or other device that is used to identify a business or a product is TRADEMARK.  It has a longer life than a patent.
  • 33. What is “copyright”? Copyright is a legal term describing rights given to creators for their literary and artistic works.
  • 34. Cont… “The statutory privilege extended to creators of works that are fixed in a tangible medium of expression.” (Bruwelheide, 1995)
  • 35. Copyrights • Copyright is a form of protection given to authors/creators of original works. • This property right can be sold or transferred to others. • Copyright is a legal protection for the authors of “original works of authorship”. • Copyright protects a creator’s work from being copied, distributed, or adapted without the permission of the copyright holder
  • 36. What is covered by copyright? literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture; and advertisements, maps and technical drawings.
  • 37. What is covered by copyright? literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture; and advertisements, maps and technical drawings.
  • 38. What is not covered by copyright? •ideas •facts •recipes •blank forms •stock literary devices •works lacking originality (e.g. the phone book) •names, titles or short phrases •works from the federal government
  • 39. Limitations on Copyright Library and classroom exemptions Fair use
  • 40. Duration of Copyright Copyright in a literary work, lasts for the- Author’s lifetime plus 50 years from the end of The calendar year in which the author dies  50 years for films and sound recordings  25 years for typographical arrangements of a published edition
  • 41. Cont… Moral rights last for as long as Copyright and can not be assigned An author may waive his/her moral rights by signing an agreement to that effect
  • 42. Importance of copyright Respect intellectual rights of creators of information Reward creativity of authors, artists, musicians, etc. Legal mandate Model proper behavior for students, teachers, and other members of educational community
  • 43. Conclusion Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security. Intellectual Property Rights, by providing exclusive rights to the inventor or creator, encourages more and more people to invest time, efforts and money in such innovations and creations. Copyright is a form of protection given to authors/creators of original works. Copyright protects a creator’s work from being copied, distributed, or adapted without the permission of the copyright holder.
  • 44. References  http://www.ipindia.nic.in  http://www.itrlwaw.com  http://www.fbi.nic.in  -CyberCrime@IPA (Council of Europe) 2012: Article 15 – conditions and safeguards http://www.coe.int/