SlideShare a Scribd company logo
Introduction to CyberIntroduction to Cyber
LawLaw
Intellectual Property RightsIntellectual Property Rights
Unit-6Unit-6
Professor & Lawyer P. Guru Prasad
M.B.A., M.Com., M.Phil., PGDFTM.,APSET.,
PhD at JNTUK
World Wide WebWorld Wide Web
Invented By :Tim Berners-Lee
Is a system of
interlinked hypertext documents
Accessed via the Internet with
a web browser
Web pages contain text, images,
videos, and other multimedia.
Internet
The Internet is a global
system of
interconnected
computer networks.
Its access is provided
by ISPs.
It runs applications like
www, ftp, html etc
World Wide Web
Web is collection of
text documents and
other resources, linked
by hyperlinks and URLs
 Usually accessed
by web browsers
Its an application
running on Internet
IT ACT PROVISIONSIT ACT PROVISIONS
email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
Companies shall now be able to carry out
electronic commerce using the legal
infrastructure provided by the Act.
Digital signatures have been given legal validity
and sanction in the Act.
 
IT ACT PROVISIONSIT ACT PROVISIONS
The Act now allows Government to
issue notification on the web thus
heralding e-governance
statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies
data
CYBER CRIMESCYBER CRIMES
CYBER CRIMES AGAINST
PERSONS
eg ‘melissa’and ‘lovebug’ virus
CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
CYBER CRIMES AGAINST
GOVERNMENT
eg ‘Al-Qaeda’
Cyber SquattingCyber Squatting
Cyber squatting is a type of crime where
in the hackers register sells and uses
domain name of some company with the
aim of gaining profit from the goodwill of
its trademark.
It is the practice of buying the Domain
Names of popular business names with
the intention of selling it to the actual
owner to earn profit.
The salient features of IT Act,2000The salient features of IT Act,2000
Sec 65- Tampering with computer source
document.
Sec 66- Computer related offences
Sec 67- Punishment for Publishing or transmitting Obscene
Material in Electronic form.
Sec 71- Penalty for Misrepresentation
Sec 72- Penalty for Breach of confidentiality and Privacy
Sec 73- Penalty for publishing Digital signature
Certificate False in certain particulars
Sec 74- Publications for Fraudulent Purpose
Cyber crime and E-commerceCyber crime and E-commerce
A cyber crime can defined as a criminal activity
doing using computer. They make use of
computer technology in order to steal the
personal information of the user, business
secrets for the malicious purpose.
Cyber space
Cyber squatting
Cyber punk
Cyber warfare
Cyber Terrorism
Various Cyber CrimesVarious Cyber Crimes
Cyber crime against Persons
Cyber crime against Property
Cyber crime against Organizations
Cyber crime against Society
Cyber crime against user group.
Apart from this, they also perform other
criminal activities, like child pornography,
credit card frauds, cyber stalking, defaming,
ignoring copy right and software licensing.
Connectivity via the Internet has greatly abridged
geographical distances and made communication
even more rapid. While activities in this limitless
new universe are increasing incessantly, the need for
laws to be formulated to govern all spheres of this
new revolution was felt.
 In order to keep pace with the changing generation
the Indian Parliament passed Information
Technology (IT) Act, 2000. The IT Act has been
conceptualized on the United Nations Commission
on International Trade Law (UNCITRAL) Model
Law
INFORMATIONINFORMATION
TECHNOLOGY ACT,2000TECHNOLOGY ACT,2000
The Act aims at providing legal recognition
for transactions carried out by means of
electronic data interchange and other means
of electronic communications commonly
referred to as "electronic commerce"
which involve the use of alternative to paper
based methods of communication and
storage of information and aims at
facilitating electronic filing of documents
with the government agencies.
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
ACT,2000ACT,2000
Information Technology Act,2000Information Technology Act,2000
in a capsulein a capsule
Called the Information Technology Act,
2000.
Came into force in June,2000
Extends to whole of India and also to
people who contravene the provisions
of the act outside India.
Shall come into force as per
notification by the Central govt.
The Act applies to the whole of India.
It also applies to any offence
committed outside India by any
person.
It does not apply to the following.
a negotiable instrument as defined in
section 13 of the Negotiable
Instruments Act, 1881;
a power-of-attorney as defined in
section 1A of the Power-of-attorney
Act, 1882;
Information Technology Act,2000 in aInformation Technology Act,2000 in a
capsulecapsule
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
The Act has adopted the Public Key
Infrastructure (PKI) for securing
electronic transactions.
A digital signature means an
authentication of any electronic record
by a subscriber by means of an electronic
method or procedure in accordance with
the other provisions of the Act.
Thus a subscriber can authenticate an
electronic record by affixing his digital
signature.
A private key is used to create a digital
signature whereas a public key is used to
verify the digital signature and electronic
record.
They both are unique for each subscriber
and together form a functioning key pair.
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
Further, the Act provides that when any
information or other matter needs to be
authenticated by the signature of a person,
the same can be authenticated by means of
the digital signature affixed in a manner
prescribed by the Central Government.
The Act also gives the Central Government
powers:
a) to make rules prescribing the digital
signature
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
b) the manner in which it shall be affixed
c) the procedure to identify the person
affixing the signature
d) the maintenance of integrity, security
and confidentiality of records or
e) payments and rules regarding any other
appropriate matters
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
These signatures are to be authenticated by
Certifying Authorities (CAs) appointed
under the Act.These authorities would inter
alia, have the license to issue Digital
Signature Certificates (DSCs).
The applicant must have a private key that
can create a digital signature. This private
key and the public key listed on the DSC
must form the functioning key pair.
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
Once the subscriber has accepted the
DSC, he shall generate the key pair by
applying the security procedure.
Every subscriber is under an obligation
to exercise reasonable care and caution
to retain control of the private key
corresponding to the public key listed in
his DSC.
DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY
AND USEAND USE
List of Organizations that controlList of Organizations that control
InternetInternet
ISOC
IETF
IAB
IANA
IRTF
IESG
IEEE
W3C
Common cyber crimesCommon cyber crimes
Un authorized duplication of software
Staling a company’s proprietary data
Un authorized access
Cyber related frauds
Password stealing.
UNCITRAL MODEL LAW
OBJECTIVES OF IT ACT,2000OBJECTIVES OF IT ACT,2000
To respond and give effect to the UN
Call.
To provide legal recognition for the
transactions carried out by electronic
data.
To facilitate E-Filing of documents
The act is based on the UNCITRAL
MODEL LAW , UN
Cyber EtiquetteCyber Etiquette
It refers to a set of manners or rules
which users are advised to follow when
using the internet.
Too much of any thing is unhealthy, so
don’t let cyberspace consume your life.
Learn to use and not ‘abuse’ computer
technology.
Top ten Etiquette tipsTop ten Etiquette tips
Be polite
Avoid posting things which may embarrass
you, your near and dear ones.
Don’t use all caps
Speak kindly
Don’t post things when you are angry
Be secure
Avoid using silly email addresses
Don’t share very personal pictures
Don’t chat with the strangers
Avoid sharing confidential details
Concluding remarksConcluding remarks
Computer have become a part of our lives and
surroundings. As the use of computers has
increased, so has the abuse. While creative
efforts are protected by Intellectual Property
laws, the abuse of computers is not.
It requires a different set of laws called CYBER
LAWS.
Violation of Information security whether
deliberately or accidentally can have very
undesirable consequences and in extreme cases
may result in loss of job and even imposition of
penalty
Thanking youThanking you
Professor & LawyerProfessor & Lawyer
Puttu Guru PrasadPuttu Guru Prasad
M.B.A., M.Com., M.Phil., PGDFTM., APSET., DFTM.,
PhD at JNTUK.,
pgpjntuk@gmail.com., puttuvvit@gmail.com.,
pgp4149@gmail.com
9394969898, 7674060336, 9059457336,
9059714336, 9885192716
VVIT, Nambur, A.P

More Related Content

What's hot

Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
Tushar Rajput
 
It act 2000
It act 2000It act 2000
It act 2000
Vidhu Arora
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Sreelekshmi Mohan
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
atuljaybhaye
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Copyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in CyberspaceCopyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in Cyberspace
MacMillan, Sobanski and Todd, LLC.
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 
Cyber law
Cyber lawCyber law
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
Panjab University
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
Manish Singh
 

What's hot (20)

Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Copyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in CyberspaceCopyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in Cyberspace
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cyber law
Cyber lawCyber law
Cyber law
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 

Similar to Introduction to cyber law.

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
Cyber
CyberCyber
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
Vikas Saw
 
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
Harini Sai
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
mohdadil02912
 

Similar to Introduction to cyber law. (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber
CyberCyber
Cyber
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 

More from PROF. PUTTU GURU PRASAD

Jagat Seth family.pdf
Jagat Seth family.pdfJagat Seth family.pdf
Jagat Seth family.pdf
PROF. PUTTU GURU PRASAD
 
3 Filter Test pgp.ppt
3 Filter Test pgp.ppt3 Filter Test pgp.ppt
3 Filter Test pgp.ppt
PROF. PUTTU GURU PRASAD
 
Bills-of-Exchange.pptx
Bills-of-Exchange.pptxBills-of-Exchange.pptx
Bills-of-Exchange.pptx
PROF. PUTTU GURU PRASAD
 
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdfJAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
PROF. PUTTU GURU PRASAD
 
JAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptxJAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptx
PROF. PUTTU GURU PRASAD
 
Comparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space xComparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space x
PROF. PUTTU GURU PRASAD
 
Informal communication pgp viva vvit
Informal communication pgp viva vvitInformal communication pgp viva vvit
Informal communication pgp viva vvit
PROF. PUTTU GURU PRASAD
 
Improving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVITImproving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Importance of communicaton pgp
Importance of communicaton pgpImportance of communicaton pgp
Importance of communicaton pgp
PROF. PUTTU GURU PRASAD
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Formal communication pgp VIVA VVIT
Formal communication pgp VIVA VVITFormal communication pgp VIVA VVIT
Formal communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Barriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVITBarriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Partnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVITPartnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Merits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVITMerits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Joint Hindu Family Business
Joint Hindu Family BusinessJoint Hindu Family Business
Joint Hindu Family Business
PROF. PUTTU GURU PRASAD
 
Elements of Directing PGP viva VVIT
Elements of Directing  PGP viva VVITElements of Directing  PGP viva VVIT
Elements of Directing PGP viva VVIT
PROF. PUTTU GURU PRASAD
 
Leadership PGP VIVA VVIT
Leadership PGP VIVA VVITLeadership PGP VIVA VVIT
Leadership PGP VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Sole proprietorship 1
Sole proprietorship 1Sole proprietorship 1
Sole proprietorship 1
PROF. PUTTU GURU PRASAD
 

More from PROF. PUTTU GURU PRASAD (20)

Jagat Seth family.pdf
Jagat Seth family.pdfJagat Seth family.pdf
Jagat Seth family.pdf
 
3 Filter Test pgp.ppt
3 Filter Test pgp.ppt3 Filter Test pgp.ppt
3 Filter Test pgp.ppt
 
Bills-of-Exchange.pptx
Bills-of-Exchange.pptxBills-of-Exchange.pptx
Bills-of-Exchange.pptx
 
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdfJAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
 
JAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptxJAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptx
 
Comparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space xComparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space x
 
Informal communication pgp viva vvit
Informal communication pgp viva vvitInformal communication pgp viva vvit
Informal communication pgp viva vvit
 
Improving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVITImproving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVIT
 
Importance of communicaton pgp
Importance of communicaton pgpImportance of communicaton pgp
Importance of communicaton pgp
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
 
Formal communication pgp VIVA VVIT
Formal communication pgp VIVA VVITFormal communication pgp VIVA VVIT
Formal communication pgp VIVA VVIT
 
Barriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVITBarriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVIT
 
Partnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVITPartnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVIT
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
 
Merits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVITMerits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVIT
 
Joint Hindu Family Business
Joint Hindu Family BusinessJoint Hindu Family Business
Joint Hindu Family Business
 
Elements of Directing PGP viva VVIT
Elements of Directing  PGP viva VVITElements of Directing  PGP viva VVIT
Elements of Directing PGP viva VVIT
 
Leadership PGP VIVA VVIT
Leadership PGP VIVA VVITLeadership PGP VIVA VVIT
Leadership PGP VIVA VVIT
 
Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT
 
Sole proprietorship 1
Sole proprietorship 1Sole proprietorship 1
Sole proprietorship 1
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 

Introduction to cyber law.

  • 1. Introduction to CyberIntroduction to Cyber LawLaw Intellectual Property RightsIntellectual Property Rights Unit-6Unit-6 Professor & Lawyer P. Guru Prasad M.B.A., M.Com., M.Phil., PGDFTM.,APSET., PhD at JNTUK
  • 2. World Wide WebWorld Wide Web Invented By :Tim Berners-Lee
  • 3. Is a system of interlinked hypertext documents Accessed via the Internet with a web browser Web pages contain text, images, videos, and other multimedia.
  • 4. Internet The Internet is a global system of interconnected computer networks. Its access is provided by ISPs. It runs applications like www, ftp, html etc World Wide Web Web is collection of text documents and other resources, linked by hyperlinks and URLs  Usually accessed by web browsers Its an application running on Internet
  • 5. IT ACT PROVISIONSIT ACT PROVISIONS email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. Digital signatures have been given legal validity and sanction in the Act.  
  • 6. IT ACT PROVISIONSIT ACT PROVISIONS The Act now allows Government to issue notification on the web thus heralding e-governance statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 7. CYBER CRIMESCYBER CRIMES CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus CYBER CRIMES AGAINST PROPERTY eg computer vandalism CYBER CRIMES AGAINST GOVERNMENT eg ‘Al-Qaeda’
  • 8. Cyber SquattingCyber Squatting Cyber squatting is a type of crime where in the hackers register sells and uses domain name of some company with the aim of gaining profit from the goodwill of its trademark. It is the practice of buying the Domain Names of popular business names with the intention of selling it to the actual owner to earn profit.
  • 9. The salient features of IT Act,2000The salient features of IT Act,2000 Sec 65- Tampering with computer source document. Sec 66- Computer related offences Sec 67- Punishment for Publishing or transmitting Obscene Material in Electronic form. Sec 71- Penalty for Misrepresentation Sec 72- Penalty for Breach of confidentiality and Privacy Sec 73- Penalty for publishing Digital signature Certificate False in certain particulars Sec 74- Publications for Fraudulent Purpose
  • 10. Cyber crime and E-commerceCyber crime and E-commerce A cyber crime can defined as a criminal activity doing using computer. They make use of computer technology in order to steal the personal information of the user, business secrets for the malicious purpose. Cyber space Cyber squatting Cyber punk Cyber warfare Cyber Terrorism
  • 11. Various Cyber CrimesVarious Cyber Crimes Cyber crime against Persons Cyber crime against Property Cyber crime against Organizations Cyber crime against Society Cyber crime against user group. Apart from this, they also perform other criminal activities, like child pornography, credit card frauds, cyber stalking, defaming, ignoring copy right and software licensing.
  • 12. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities in this limitless new universe are increasing incessantly, the need for laws to be formulated to govern all spheres of this new revolution was felt.  In order to keep pace with the changing generation the Indian Parliament passed Information Technology (IT) Act, 2000. The IT Act has been conceptualized on the United Nations Commission on International Trade Law (UNCITRAL) Model Law INFORMATIONINFORMATION TECHNOLOGY ACT,2000TECHNOLOGY ACT,2000
  • 13. The Act aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communications commonly referred to as "electronic commerce" which involve the use of alternative to paper based methods of communication and storage of information and aims at facilitating electronic filing of documents with the government agencies. INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY ACT,2000ACT,2000
  • 14. Information Technology Act,2000Information Technology Act,2000 in a capsulein a capsule Called the Information Technology Act, 2000. Came into force in June,2000 Extends to whole of India and also to people who contravene the provisions of the act outside India. Shall come into force as per notification by the Central govt.
  • 15. The Act applies to the whole of India. It also applies to any offence committed outside India by any person. It does not apply to the following. a negotiable instrument as defined in section 13 of the Negotiable Instruments Act, 1881; a power-of-attorney as defined in section 1A of the Power-of-attorney Act, 1882; Information Technology Act,2000 in aInformation Technology Act,2000 in a capsulecapsule
  • 16. DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY AND USEAND USE The Act has adopted the Public Key Infrastructure (PKI) for securing electronic transactions. A digital signature means an authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the other provisions of the Act.
  • 17. Thus a subscriber can authenticate an electronic record by affixing his digital signature. A private key is used to create a digital signature whereas a public key is used to verify the digital signature and electronic record. They both are unique for each subscriber and together form a functioning key pair. DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY AND USEAND USE
  • 18. Further, the Act provides that when any information or other matter needs to be authenticated by the signature of a person, the same can be authenticated by means of the digital signature affixed in a manner prescribed by the Central Government. The Act also gives the Central Government powers: a) to make rules prescribing the digital signature DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY AND USEAND USE
  • 19. b) the manner in which it shall be affixed c) the procedure to identify the person affixing the signature d) the maintenance of integrity, security and confidentiality of records or e) payments and rules regarding any other appropriate matters DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY AND USEAND USE
  • 20. These signatures are to be authenticated by Certifying Authorities (CAs) appointed under the Act.These authorities would inter alia, have the license to issue Digital Signature Certificates (DSCs). The applicant must have a private key that can create a digital signature. This private key and the public key listed on the DSC must form the functioning key pair. DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY AND USEAND USE
  • 21. Once the subscriber has accepted the DSC, he shall generate the key pair by applying the security procedure. Every subscriber is under an obligation to exercise reasonable care and caution to retain control of the private key corresponding to the public key listed in his DSC. DIGITAL SIGNATURES: LEGITIMACYDIGITAL SIGNATURES: LEGITIMACY AND USEAND USE
  • 22. List of Organizations that controlList of Organizations that control InternetInternet ISOC IETF IAB IANA IRTF IESG IEEE W3C
  • 23. Common cyber crimesCommon cyber crimes Un authorized duplication of software Staling a company’s proprietary data Un authorized access Cyber related frauds Password stealing. UNCITRAL MODEL LAW
  • 24. OBJECTIVES OF IT ACT,2000OBJECTIVES OF IT ACT,2000 To respond and give effect to the UN Call. To provide legal recognition for the transactions carried out by electronic data. To facilitate E-Filing of documents The act is based on the UNCITRAL MODEL LAW , UN
  • 25. Cyber EtiquetteCyber Etiquette It refers to a set of manners or rules which users are advised to follow when using the internet. Too much of any thing is unhealthy, so don’t let cyberspace consume your life. Learn to use and not ‘abuse’ computer technology.
  • 26. Top ten Etiquette tipsTop ten Etiquette tips Be polite Avoid posting things which may embarrass you, your near and dear ones. Don’t use all caps Speak kindly Don’t post things when you are angry Be secure Avoid using silly email addresses Don’t share very personal pictures Don’t chat with the strangers Avoid sharing confidential details
  • 27. Concluding remarksConcluding remarks Computer have become a part of our lives and surroundings. As the use of computers has increased, so has the abuse. While creative efforts are protected by Intellectual Property laws, the abuse of computers is not. It requires a different set of laws called CYBER LAWS. Violation of Information security whether deliberately or accidentally can have very undesirable consequences and in extreme cases may result in loss of job and even imposition of penalty
  • 28. Thanking youThanking you Professor & LawyerProfessor & Lawyer Puttu Guru PrasadPuttu Guru Prasad M.B.A., M.Com., M.Phil., PGDFTM., APSET., DFTM., PhD at JNTUK., pgpjntuk@gmail.com., puttuvvit@gmail.com., pgp4149@gmail.com 9394969898, 7674060336, 9059457336, 9059714336, 9885192716 VVIT, Nambur, A.P