SlideShare a Scribd company logo
Introduction to Cyber
Law
Intellectual Property Rights
Unit-6
Professor & Lawyer P. Guru Prasad
M.B.A., M.Com., M.Phil., PGDFTM., APSET.,
PhD at JNTUK
World Wide Web
Invented By : Tim Berners-
Lee
 Is a system of
interlinked hypertext documents
 Accessed via the Internet with
a web browser
 Web pages contain text,
images, videos, and
other multimedia.
Internet
 The Internet is a
global system of
interconnected
computer networks.
 Its access is provided
by ISPs.
 It runs applications
like www, ftp, html etc
World Wide Web
 Web is collection of
text documents and
other resources,
linked by hyperlinks
and URLs
 Usually accessed
by web browsers
 Its an application
running on Internet
IT ACT PROVISIONS
 email would now be a valid and legal form
of communication in our country that can be
duly produced and approved in a court of
law.
 Companies shall now be able to carry out
electronic commerce using the legal
infrastructure provided by the Act.
 Digital signatures have been given legal
validity and sanction in the Act.
IT ACT PROVISIONS
 The Act now allows Government to
issue notification on the web thus
heralding e-governance
 statutory remedy in case if anyone
breaks into companies computer
systems or network and causes
damages or copies data
CYBER CRIMES
 CYBER CRIMES AGAINST
PERSONS
eg ‘melissa’and ‘lovebug’
virus
 CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
 CYBER CRIMES AGAINST
GOVERNMENT
 eg ‘Al-Qaeda’
Cyber Squatting
 Cyber squatting is a type of crime
where in the hackers register sells and
uses domain name of some company
with the aim of gaining profit from the
goodwill of its trademark.
 It is the practice of buying the Domain
Names of popular business names
with the intention of selling it to the
actual owner to earn profit.
The salient features of IT
Act,2000
 Sec 65- Tampering with computer source
document.
 Sec 66- Computer related offences
 Sec 67- Punishment for Publishing or transmitting
Obscene Material in Electronic form.
 Sec 71- Penalty for Misrepresentation
 Sec 72- Penalty for Breach of confidentiality and
Privacy
 Sec 73- Penalty for publishing Digital
signature Certificate False in certain particulars
 Sec 74- Publications for Fraudulent Purpose
Cyber crime and E-commerce
 A cyber crime can defined as a criminal
activity doing using computer. They make
use of computer technology in order to steal
the personal information of the user,
business secrets for the malicious purpose.
 Cyber space
 Cyber squatting
 Cyber punk
 Cyber warfare
 Cyber Terrorism
Various Cyber Crimes
 Cyber crime against Persons
 Cyber crime against Property
 Cyber crime against Organizations
 Cyber crime against Society
 Cyber crime against user group.
 Apart from this, they also perform other
criminal activities, like child pornography,
credit card frauds, cyber stalking,
defaming, ignoring copy right and
software licensing.
 Connectivity via the Internet has greatly
abridged geographical distances and made
communication even more rapid. While
activities in this limitless new universe are
increasing incessantly, the need for laws to be
formulated to govern all spheres of this new
revolution was felt.
 In order to keep pace with the changing
generation the Indian Parliament passed
Information Technology (IT) Act, 2000. The IT
Act has been conceptualized on the United
Nations Commission on International Trade
Law (UNCITRAL) Model Law
INFORMATION
TECHNOLOGY ACT,2000
 The Act aims at providing legal
recognition for transactions carried out
by means of electronic data interchange
and other means of electronic
communications commonly referred to
as "electronic commerce"
 which involve the use of alternative to
paper based methods of communication
and storage of information and aims at
facilitating electronic filing of documents
with the government agencies.
INFORMATION TECHNOLOGY
ACT,2000
Information Technology
Act,2000 in a capsule
 Called the Information Technology
Act, 2000.
 Came into force in June,2000
 Extends to whole of India and also
to people who contravene the
provisions of the act outside India.
 Shall come into force as per
notification by the Central govt.
 The Act applies to the whole of India.
It also applies to any offence
committed outside India by any
person.
 It does not apply to the following.
 a negotiable instrument as defined in
section 13 of the Negotiable
Instruments Act, 1881;
 a power-of-attorney as defined in
section 1A of the Power-of-attorney
Information Technology Act,2000 in a
capsule
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 The Act has adopted the Public Key
Infrastructure (PKI) for securing
electronic transactions. A digital
signature means an authentication of
any electronic record by a subscriber
by means of an electronic method or
procedure in accordance with the
other provisions of the Act.
 Thus a subscriber can authenticate an
electronic record by affixing his digital
signature.
 A private key is used to create a digital
signature whereas a public key is used
to verify the digital signature and
electronic record.
 They both are unique for each
subscriber and together form a
functioning key pair.
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 Further, the Act provides that when any
information or other matter needs to be
authenticated by the signature of a
person, the same can be authenticated
by means of the digital signature affixed
in a manner prescribed by the Central
Government.
 The Act also gives the Central
Government powers:
 a) to make rules prescribing the digital
signature
DIGITAL SIGNATURES:
LEGITIMACY AND USE
b) the manner in which it shall be
affixed
c) the procedure to identify the person
affixing the signature
d) the maintenance of integrity, security
and confidentiality of records or
e) payments and rules regarding any
other appropriate matters
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 These signatures are to be
authenticated by Certifying Authorities
(CAs) appointed under the Act. These
authorities would inter alia, have the
license to issue Digital Signature
Certificates (DSCs).
 The applicant must have a private key
that can create a digital signature. This
private key and the public key listed on
the DSC must form the functioning key
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 Once the subscriber has accepted
the DSC, he shall generate the key
pair by applying the security
procedure.
 Every subscriber is under an
obligation to exercise reasonable
care and caution to retain control of
the private key corresponding to the
public key listed in his DSC.
DIGITAL SIGNATURES:
LEGITIMACY AND USE
List of Organizations that control
Internet
 ISOC
 IETF
 IAB
 IANA
 IRTF
 IESG
 IEEE
 W3C
Introduction to cyber law.

More Related Content

What's hot

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Elijah Ezendu
 
E contract
E  contractE  contract
E contract
Benita Ezeigbo
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
Amber Gupta
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
atuljaybhaye
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
Ritu Gautam
 

What's hot (20)

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
E contract
E  contractE  contract
E contract
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
 

Similar to Introduction to cyber law.

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
Cyber
CyberCyber
It act 2000
It act 2000It act 2000
It act 2000
pranjalya123
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
SOMASUNDARAM T
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
ATHULYARAJDS
 

Similar to Introduction to cyber law. (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act
Information technology actInformation technology act
Information technology act
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Cyber
CyberCyber
Cyber
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 

More from PROF. PUTTU GURU PRASAD

Jagat Seth family.pdf
Jagat Seth family.pdfJagat Seth family.pdf
Jagat Seth family.pdf
PROF. PUTTU GURU PRASAD
 
3 Filter Test pgp.ppt
3 Filter Test pgp.ppt3 Filter Test pgp.ppt
3 Filter Test pgp.ppt
PROF. PUTTU GURU PRASAD
 
Bills-of-Exchange.pptx
Bills-of-Exchange.pptxBills-of-Exchange.pptx
Bills-of-Exchange.pptx
PROF. PUTTU GURU PRASAD
 
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdfJAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
PROF. PUTTU GURU PRASAD
 
JAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptxJAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptx
PROF. PUTTU GURU PRASAD
 
Comparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space xComparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space x
PROF. PUTTU GURU PRASAD
 
Informal communication pgp viva vvit
Informal communication pgp viva vvitInformal communication pgp viva vvit
Informal communication pgp viva vvit
PROF. PUTTU GURU PRASAD
 
Improving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVITImproving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Importance of communicaton pgp
Importance of communicaton pgpImportance of communicaton pgp
Importance of communicaton pgp
PROF. PUTTU GURU PRASAD
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Formal communication pgp VIVA VVIT
Formal communication pgp VIVA VVITFormal communication pgp VIVA VVIT
Formal communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Barriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVITBarriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Partnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVITPartnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Merits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVITMerits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Joint Hindu Family Business
Joint Hindu Family BusinessJoint Hindu Family Business
Joint Hindu Family Business
PROF. PUTTU GURU PRASAD
 
Elements of Directing PGP viva VVIT
Elements of Directing  PGP viva VVITElements of Directing  PGP viva VVIT
Elements of Directing PGP viva VVIT
PROF. PUTTU GURU PRASAD
 
Leadership PGP VIVA VVIT
Leadership PGP VIVA VVITLeadership PGP VIVA VVIT
Leadership PGP VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT
PROF. PUTTU GURU PRASAD
 
Sole proprietorship 1
Sole proprietorship 1Sole proprietorship 1
Sole proprietorship 1
PROF. PUTTU GURU PRASAD
 

More from PROF. PUTTU GURU PRASAD (20)

Jagat Seth family.pdf
Jagat Seth family.pdfJagat Seth family.pdf
Jagat Seth family.pdf
 
3 Filter Test pgp.ppt
3 Filter Test pgp.ppt3 Filter Test pgp.ppt
3 Filter Test pgp.ppt
 
Bills-of-Exchange.pptx
Bills-of-Exchange.pptxBills-of-Exchange.pptx
Bills-of-Exchange.pptx
 
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdfJAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
 
JAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptxJAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptx
 
Comparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space xComparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space x
 
Informal communication pgp viva vvit
Informal communication pgp viva vvitInformal communication pgp viva vvit
Informal communication pgp viva vvit
 
Improving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVITImproving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVIT
 
Importance of communicaton pgp
Importance of communicaton pgpImportance of communicaton pgp
Importance of communicaton pgp
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
 
Formal communication pgp VIVA VVIT
Formal communication pgp VIVA VVITFormal communication pgp VIVA VVIT
Formal communication pgp VIVA VVIT
 
Barriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVITBarriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVIT
 
Partnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVITPartnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVIT
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
 
Merits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVITMerits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVIT
 
Joint Hindu Family Business
Joint Hindu Family BusinessJoint Hindu Family Business
Joint Hindu Family Business
 
Elements of Directing PGP viva VVIT
Elements of Directing  PGP viva VVITElements of Directing  PGP viva VVIT
Elements of Directing PGP viva VVIT
 
Leadership PGP VIVA VVIT
Leadership PGP VIVA VVITLeadership PGP VIVA VVIT
Leadership PGP VIVA VVIT
 
Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT
 
Sole proprietorship 1
Sole proprietorship 1Sole proprietorship 1
Sole proprietorship 1
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 

Introduction to cyber law.

  • 1. Introduction to Cyber Law Intellectual Property Rights Unit-6 Professor & Lawyer P. Guru Prasad M.B.A., M.Com., M.Phil., PGDFTM., APSET., PhD at JNTUK
  • 2. World Wide Web Invented By : Tim Berners- Lee
  • 3.  Is a system of interlinked hypertext documents  Accessed via the Internet with a web browser  Web pages contain text, images, videos, and other multimedia.
  • 4. Internet  The Internet is a global system of interconnected computer networks.  Its access is provided by ISPs.  It runs applications like www, ftp, html etc World Wide Web  Web is collection of text documents and other resources, linked by hyperlinks and URLs  Usually accessed by web browsers  Its an application running on Internet
  • 5. IT ACT PROVISIONS  email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act.
  • 6. IT ACT PROVISIONS  The Act now allows Government to issue notification on the web thus heralding e-governance  statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 7. CYBER CRIMES  CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus  CYBER CRIMES AGAINST PROPERTY eg computer vandalism  CYBER CRIMES AGAINST GOVERNMENT  eg ‘Al-Qaeda’
  • 8. Cyber Squatting  Cyber squatting is a type of crime where in the hackers register sells and uses domain name of some company with the aim of gaining profit from the goodwill of its trademark.  It is the practice of buying the Domain Names of popular business names with the intention of selling it to the actual owner to earn profit.
  • 9. The salient features of IT Act,2000  Sec 65- Tampering with computer source document.  Sec 66- Computer related offences  Sec 67- Punishment for Publishing or transmitting Obscene Material in Electronic form.  Sec 71- Penalty for Misrepresentation  Sec 72- Penalty for Breach of confidentiality and Privacy  Sec 73- Penalty for publishing Digital signature Certificate False in certain particulars  Sec 74- Publications for Fraudulent Purpose
  • 10. Cyber crime and E-commerce  A cyber crime can defined as a criminal activity doing using computer. They make use of computer technology in order to steal the personal information of the user, business secrets for the malicious purpose.  Cyber space  Cyber squatting  Cyber punk  Cyber warfare  Cyber Terrorism
  • 11. Various Cyber Crimes  Cyber crime against Persons  Cyber crime against Property  Cyber crime against Organizations  Cyber crime against Society  Cyber crime against user group.  Apart from this, they also perform other criminal activities, like child pornography, credit card frauds, cyber stalking, defaming, ignoring copy right and software licensing.
  • 12.  Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities in this limitless new universe are increasing incessantly, the need for laws to be formulated to govern all spheres of this new revolution was felt.  In order to keep pace with the changing generation the Indian Parliament passed Information Technology (IT) Act, 2000. The IT Act has been conceptualized on the United Nations Commission on International Trade Law (UNCITRAL) Model Law INFORMATION TECHNOLOGY ACT,2000
  • 13.  The Act aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communications commonly referred to as "electronic commerce"  which involve the use of alternative to paper based methods of communication and storage of information and aims at facilitating electronic filing of documents with the government agencies. INFORMATION TECHNOLOGY ACT,2000
  • 14. Information Technology Act,2000 in a capsule  Called the Information Technology Act, 2000.  Came into force in June,2000  Extends to whole of India and also to people who contravene the provisions of the act outside India.  Shall come into force as per notification by the Central govt.
  • 15.  The Act applies to the whole of India. It also applies to any offence committed outside India by any person.  It does not apply to the following.  a negotiable instrument as defined in section 13 of the Negotiable Instruments Act, 1881;  a power-of-attorney as defined in section 1A of the Power-of-attorney Information Technology Act,2000 in a capsule
  • 16. DIGITAL SIGNATURES: LEGITIMACY AND USE  The Act has adopted the Public Key Infrastructure (PKI) for securing electronic transactions. A digital signature means an authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the other provisions of the Act.
  • 17.  Thus a subscriber can authenticate an electronic record by affixing his digital signature.  A private key is used to create a digital signature whereas a public key is used to verify the digital signature and electronic record.  They both are unique for each subscriber and together form a functioning key pair. DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 18.  Further, the Act provides that when any information or other matter needs to be authenticated by the signature of a person, the same can be authenticated by means of the digital signature affixed in a manner prescribed by the Central Government.  The Act also gives the Central Government powers:  a) to make rules prescribing the digital signature DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 19. b) the manner in which it shall be affixed c) the procedure to identify the person affixing the signature d) the maintenance of integrity, security and confidentiality of records or e) payments and rules regarding any other appropriate matters DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 20.  These signatures are to be authenticated by Certifying Authorities (CAs) appointed under the Act. These authorities would inter alia, have the license to issue Digital Signature Certificates (DSCs).  The applicant must have a private key that can create a digital signature. This private key and the public key listed on the DSC must form the functioning key DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 21.  Once the subscriber has accepted the DSC, he shall generate the key pair by applying the security procedure.  Every subscriber is under an obligation to exercise reasonable care and caution to retain control of the private key corresponding to the public key listed in his DSC. DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 22. List of Organizations that control Internet  ISOC  IETF  IAB  IANA  IRTF  IESG  IEEE  W3C