This document provides an overview of cyber law and introduces key concepts. It defines the internet and world wide web, outlines provisions of the Information Technology Act 2000 regarding electronic commerce and digital signatures, describes common cyber crimes and cyber etiquette, and concludes with remarks about the importance of cyber security law given increased computer usage and potential for abuse.
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
Intellectual Property in Cyberspace, Linking, In lining and Framing, P2P Networking,
Webtesting, Domain Names, Management of IPRs in cyberspace, Liabilities of Internet Services Providers, Digital Rights Management, Search Engines and their
Abuse, Non-original Database
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Covers the basic concepts of copyright law and trademark law with an emphasis on the ways in which they have been adapted to and applied in cyberspace. Also coveres some important considerations in selecting and registering domain names, as well as some basic approaches to fighting predatory and unfair domain name registration by competitors.
This ppt contains the statistics of current trends in cyber crime.
in this ppt you will get the statistics of current trending cyber crime like phising,ransomware,banking frauds etc
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
Intellectual Property in Cyberspace, Linking, In lining and Framing, P2P Networking,
Webtesting, Domain Names, Management of IPRs in cyberspace, Liabilities of Internet Services Providers, Digital Rights Management, Search Engines and their
Abuse, Non-original Database
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Covers the basic concepts of copyright law and trademark law with an emphasis on the ways in which they have been adapted to and applied in cyberspace. Also coveres some important considerations in selecting and registering domain names, as well as some basic approaches to fighting predatory and unfair domain name registration by competitors.
This ppt contains the statistics of current trends in cyber crime.
in this ppt you will get the statistics of current trending cyber crime like phising,ransomware,banking frauds etc
An appreciation of the ancient traders and Indigenous Bankers commercial merchants of Bengal and India before British colonization. The Marwadi Jain Family from Nagaur came to Murshidabad and became the Banker to Alvardi Khan of Bengal Nawabs. Fateh Chand Seth conspires against Siraj ud-dhaula of Bengal and supports the British army to dethrone the nawab of Bengal for his business prospects.
formal, informal communication, barriers to communication, effective communication, grapevine, rumors, gossips, personal, organizational, and semantic barriers of communication
Effective Communication in the organization, Barriers to Communication, personal barriers, cultural barriers, semantic barriers, organizational barriers
Types of Partners, Partner by Holding out, Mutual Agency, Contract of Agency, 3 Musketeers by Dumas, One for all, all for one, Merits of the Partnership in comparing with Sole Proprietory
Formal & Informal Communication, Effective Communication, Process of Communication, Barriers to Communication, Noise in the Communication, How to overcome barriers of Communication,
Types of Partners, Partnership Merits and Demerits, Partner by Holding out, Parter by estoppel, Registration of Partnership, The difference between a sole proprietorship and Partnership, features of Partnership act 1932, Mutual consent of Partners, Mutual agency
Hindu Undivided Family Business, Kartha, Copercenres, unlimited liability to Karta, Business ownership, the unique feature of Indian business professional communities
Best Indian Business Leaders, 6 best Leadership qualities, Sacrifice, Courage, leading, influencing, encouraging, Employer leadership qualities, Mrs. Meera H Sanyal, Ankita Bose is the co-founder and CEO of Zilingo, Microsoft without Bill Gates, Reliance Industries without Ambani's, Infosys without Narayana Murthy, Tata without J.R.D. Tata or Wipro without Azim Premji.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
1. Introduction to CyberIntroduction to Cyber
LawLaw
Intellectual Property RightsIntellectual Property Rights
Unit-6Unit-6
Professor & Lawyer P. Guru Prasad
M.B.A., M.Com., M.Phil., PGDFTM.,APSET.,
PhD at JNTUK
4. Internet
The Internet is a global
system of
interconnected
computer networks.
Its access is provided
by ISPs.
It runs applications like
www, ftp, html etc
World Wide Web
Web is collection of
text documents and
other resources, linked
by hyperlinks and URLs
Usually accessed
by web browsers
Its an application
running on Internet
5. IT ACT PROVISIONSIT ACT PROVISIONS
email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
Companies shall now be able to carry out
electronic commerce using the legal
infrastructure provided by the Act.
Digital signatures have been given legal validity
and sanction in the Act.
6. IT ACT PROVISIONSIT ACT PROVISIONS
The Act now allows Government to
issue notification on the web thus
heralding e-governance
statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies
data
7. CYBER CRIMESCYBER CRIMES
CYBER CRIMES AGAINST
PERSONS
eg ‘melissa’and ‘lovebug’ virus
CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
CYBER CRIMES AGAINST
GOVERNMENT
eg ‘Al-Qaeda’
8. Cyber SquattingCyber Squatting
Cyber squatting is a type of crime where
in the hackers register sells and uses
domain name of some company with the
aim of gaining profit from the goodwill of
its trademark.
It is the practice of buying the Domain
Names of popular business names with
the intention of selling it to the actual
owner to earn profit.
9. The salient features of IT Act,2000The salient features of IT Act,2000
Sec 65- Tampering with computer source
document.
Sec 66- Computer related offences
Sec 67- Punishment for Publishing or transmitting Obscene
Material in Electronic form.
Sec 71- Penalty for Misrepresentation
Sec 72- Penalty for Breach of confidentiality and Privacy
Sec 73- Penalty for publishing Digital signature
Certificate False in certain particulars
Sec 74- Publications for Fraudulent Purpose
10. Cyber crime and E-commerceCyber crime and E-commerce
A cyber crime can defined as a criminal activity
doing using computer. They make use of
computer technology in order to steal the
personal information of the user, business
secrets for the malicious purpose.
Cyber space
Cyber squatting
Cyber punk
Cyber warfare
Cyber Terrorism
11. Various Cyber CrimesVarious Cyber Crimes
Cyber crime against Persons
Cyber crime against Property
Cyber crime against Organizations
Cyber crime against Society
Cyber crime against user group.
Apart from this, they also perform other
criminal activities, like child pornography,
credit card frauds, cyber stalking, defaming,
ignoring copy right and software licensing.
12. Connectivity via the Internet has greatly abridged
geographical distances and made communication
even more rapid. While activities in this limitless
new universe are increasing incessantly, the need for
laws to be formulated to govern all spheres of this
new revolution was felt.
In order to keep pace with the changing generation
the Indian Parliament passed Information
Technology (IT) Act, 2000. The IT Act has been
conceptualized on the United Nations Commission
on International Trade Law (UNCITRAL) Model
Law
INFORMATIONINFORMATION
TECHNOLOGY ACT,2000TECHNOLOGY ACT,2000
13. The Act aims at providing legal recognition
for transactions carried out by means of
electronic data interchange and other means
of electronic communications commonly
referred to as "electronic commerce"
which involve the use of alternative to paper
based methods of communication and
storage of information and aims at
facilitating electronic filing of documents
with the government agencies.
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
ACT,2000ACT,2000
14. Information Technology Act,2000Information Technology Act,2000
in a capsulein a capsule
Called the Information Technology Act,
2000.
Came into force in June,2000
Extends to whole of India and also to
people who contravene the provisions
of the act outside India.
Shall come into force as per
notification by the Central govt.
15. The Act applies to the whole of India.
It also applies to any offence
committed outside India by any
person.
It does not apply to the following.
a negotiable instrument as defined in
section 13 of the Negotiable
Instruments Act, 1881;
a power-of-attorney as defined in
section 1A of the Power-of-attorney
Act, 1882;
Information Technology Act,2000 in aInformation Technology Act,2000 in a
capsulecapsule
16. DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
The Act has adopted the Public Key
Infrastructure (PKI) for securing
electronic transactions.
A digital signature means an
authentication of any electronic record
by a subscriber by means of an electronic
method or procedure in accordance with
the other provisions of the Act.
17. Thus a subscriber can authenticate an
electronic record by affixing his digital
signature.
A private key is used to create a digital
signature whereas a public key is used to
verify the digital signature and electronic
record.
They both are unique for each subscriber
and together form a functioning key pair.
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
18. Further, the Act provides that when any
information or other matter needs to be
authenticated by the signature of a person,
the same can be authenticated by means of
the digital signature affixed in a manner
prescribed by the Central Government.
The Act also gives the Central Government
powers:
a) to make rules prescribing the digital
signature
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
19. b) the manner in which it shall be affixed
c) the procedure to identify the person
affixing the signature
d) the maintenance of integrity, security
and confidentiality of records or
e) payments and rules regarding any other
appropriate matters
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
20. These signatures are to be authenticated by
Certifying Authorities (CAs) appointed
under the Act.These authorities would inter
alia, have the license to issue Digital
Signature Certificates (DSCs).
The applicant must have a private key that
can create a digital signature. This private
key and the public key listed on the DSC
must form the functioning key pair.
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
21. Once the subscriber has accepted the
DSC, he shall generate the key pair by
applying the security procedure.
Every subscriber is under an obligation
to exercise reasonable care and caution
to retain control of the private key
corresponding to the public key listed in
his DSC.
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
22. List of Organizations that controlList of Organizations that control
InternetInternet
ISOC
IETF
IAB
IANA
IRTF
IESG
IEEE
W3C
23. Common cyber crimesCommon cyber crimes
Un authorized duplication of software
Staling a company’s proprietary data
Un authorized access
Cyber related frauds
Password stealing.
UNCITRAL MODEL LAW
24. OBJECTIVES OF IT ACT,2000OBJECTIVES OF IT ACT,2000
To respond and give effect to the UN
Call.
To provide legal recognition for the
transactions carried out by electronic
data.
To facilitate E-Filing of documents
The act is based on the UNCITRAL
MODEL LAW , UN
25. Cyber EtiquetteCyber Etiquette
It refers to a set of manners or rules
which users are advised to follow when
using the internet.
Too much of any thing is unhealthy, so
don’t let cyberspace consume your life.
Learn to use and not ‘abuse’ computer
technology.
26. Top ten Etiquette tipsTop ten Etiquette tips
Be polite
Avoid posting things which may embarrass
you, your near and dear ones.
Don’t use all caps
Speak kindly
Don’t post things when you are angry
Be secure
Avoid using silly email addresses
Don’t share very personal pictures
Don’t chat with the strangers
Avoid sharing confidential details
27. Concluding remarksConcluding remarks
Computer have become a part of our lives and
surroundings. As the use of computers has
increased, so has the abuse. While creative
efforts are protected by Intellectual Property
laws, the abuse of computers is not.
It requires a different set of laws called CYBER
LAWS.
Violation of Information security whether
deliberately or accidentally can have very
undesirable consequences and in extreme cases
may result in loss of job and even imposition of
penalty
28. Thanking youThanking you
Professor & LawyerProfessor & Lawyer
Puttu Guru PrasadPuttu Guru Prasad
M.B.A., M.Com., M.Phil., PGDFTM., APSET., DFTM.,
PhD at JNTUK.,
pgpjntuk@gmail.com., puttuvvit@gmail.com.,
pgp4149@gmail.com
9394969898, 7674060336, 9059457336,
9059714336, 9885192716
VVIT, Nambur, A.P