SlideShare a Scribd company logo
Cyber Law
Presentation By : Ambar Deo
Introduction to Cyber world
● Vinton Cerf is hailed as the Father of the
Internet, and earned this nickname when he co-
authorized with Dr. Robert Kahn in 1973, a
paper that gave the world TCP & IP.
● On 4th July 1996, Sabeer Bhatia & Jack Smith
launched Hotmail. In 1997, they sold it to
Microsoft for an estimated price of $385
Million.
● Infosys was the first Indian company to
release its annual report in CD-ROM
format.
● In 1971, the world’s first speech
recognition software, called Hearsay, was
developed in India.
Introduction to Cyber world
What is Cyber law?
● Cyber Law has been defined as the “Law
governing Cyberspace” or “Internet Law”
Information Technology Act
● The act has been passed in the
Parliament of India on 9th June 2000.
● The Act has 94 Sections divided 13
chapters.
MORE INFO...
Former Law & Justice Minister Mr. Arun Jetly has put the bill in the
parliament of India in the year 2000.
As an I.T. Professional, I.T. student
● In depth understanding of technology issues in
light of the legal aspects.
● Make organizational security policies that
would comply with legal procedure.
● Understand legal terms for use of technology
within organization.
● Adopt best legal practices for use of
E-commerce Technology.
Cyber Law governs:
● Cyberspace
– Computer
– Computer system
– Computer software
– Internet
– Computer data
E-governance
● Chapter III, Sections 4 to 10.
● Every Govt. Office/Dept. should have
their own web site. E.g. pmcpune.com,
ourpune.com
● Section 4 provides that the information
required to be in written can be in
electronic form. E.g. GR.
MORE INFO...
Now you can pay your income tax, service tax as well as municipal
taxes via internet.
Information Security
● Digital Signature – Authentication of
electronic records.
● Cryptography - Science of using maths
to encrypt & decrypt data. E.g. shift by 3
E.g. For India Lqgld
Cryptography
Cryptography : Samartha Ramdas has also use a
cryptography to make a communication with Shivaji Maharaja.
Some of the important Sections in It Act
● Sec. 43 : Unauthorized Access
– If any person without permission of the owner
accesses or secures access to computer he shall
be liable to pay damages upto Rs. 1 Crore.
(Access is defied as gaining entry into, instructing or
communicating with the logical, arithmetical, or
memory function of computer…..)
In simple word access mean:
Switching on a computer, Using a software programme ( e.g. MS Word), Viewing
the contents of floppy of CD, Turning off, Taking Computer printout, Logging on to
the internet.
Unauthorized Downloading
● Section 43 (b):
– If any person without permission of the
owner downloads, copies, or extracts any
data, database holds or stores in any
removable storage medium shall be liable to
pay damages upto Rs. 1 Crore
Hacking with computer system
● Sec. 66 : hacking
– Whoever with the intent to cause wrongful
loss or damage to the public or any person
destroys or deletes or alters any information
or diminishes its value or utility commits
hacking & shall be punished with
imprisonment upto 3 Yrs. Or with the fine
upto Rs. 2 Lakh or with the both.
Recent News in hacking
● Maharashtra State Govt.’s official
website has been hacked by the Hackers.
● Website displays Black colored
Homepage with sign of Forehand &
Hacker’s internet address.
● The Hackers are From Saudi Arabia.
Sakal: 19th Sept. 2007 Page no.2
Publishing of information, which is
obscene in Electronic Form
● Section 67: Pornography
– Whoever publishes or transmits or causes to
be published in electronic form, any material
which is lascivious or appeals to the prurient
interest he shall be punished on 1st
conviction with imprisonment upto 5 yrs. &
fine upto 1 lakh and on 2nd conviction
imprisonment upto 10 Yrs. & fine upto 2
laks.
Recent case in Pune regarding
Pornography
● Kulkarni case: Set a video camera in his
rented room which is given to the girls on
rental basis and stores the video
recording on CD.
● Orkut, You Tube, Blogging
MORE INFO...
While accessing internet pornography IP Addresses are the
most important feature used by police to find the person.
Investigation Procedure
● Former NSUI Pune Leader has been arrested
under this section as causing to publish the
lascivious material.
●Sec. 80 :
– Any police officer, not below the rank of
Deputy Superintendent of police may enter
any public place & search & arrest without
warrant any person who is reasonably
suspected of having committed or being
committed any offence under this Act.
Copyright & Contributory
Infringement
● Contributory infringement is a theory whereby
a third-party may be held liable for
contributing to another’s infringing activities.
● E.g.: If A has any copyrighted material with
him in electronic form and wants to give to B. A
has given it to C and requested him to give B.
– In above situation A & B has violated copyright Act.
– Even C has also violated Copyright as contributory.
– So C is also liable to pay a liability.
● Urban India stands in top 10 in terms of
internet penetration, with a rate of more
than 19%
● In 1998, online pornography accounted
for 80% of all e-commerce. However, the
figure has today fallen to 20%
By the Way
● An average of 40 million Hotmail emails
are sent each day, and MSN has
estimated that their services saves 500
trees-about 72,720Kg. of paper per day.
● In 2003, Software companies lost $5.5
billion due to a piracy in Asia.
By the Way
Find out More ?
● Can the It Act find guilty Google for causing to be published
pornography when we request Google to search
pornographic WebPages / images ?
● Downloading A copyrighted material from internet can also
attract Penalties under Copyright Act Or only attract
provisions in IT Act ?
● Name the country who has banned pornography and
successfully blocked pornographic material.
● Whether Softwares are patented in India ?
Thank You.
ambarpune@gmail.com
Mobile: 9420861810

More Related Content

What's hot

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 

What's hot (20)

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 

Viewers also liked

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Erp notes-by-hemant sir-readonly
Erp notes-by-hemant sir-readonlyErp notes-by-hemant sir-readonly
Erp notes-by-hemant sir-readonly
Ezhil Vendhaan
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Enterprise resource planning by alexis leon (mohit)
Enterprise resource planning by alexis leon (mohit)Enterprise resource planning by alexis leon (mohit)
Enterprise resource planning by alexis leon (mohit)silvygoldy
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planningALTANAI BISHT
 
Management information system
Management information system Management information system
Management information system
Manish Kaushik
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
Harish Chand
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Tirthankar Sutradhar
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
TeamOneI1MBA11
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 

Viewers also liked (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Erp notes-by-hemant sir-readonly
Erp notes-by-hemant sir-readonlyErp notes-by-hemant sir-readonly
Erp notes-by-hemant sir-readonly
 
ICT Cybe laws
ICT Cybe lawsICT Cybe laws
ICT Cybe laws
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Enterprise resource planning by alexis leon (mohit)
Enterprise resource planning by alexis leon (mohit)Enterprise resource planning by alexis leon (mohit)
Enterprise resource planning by alexis leon (mohit)
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 
Drafting of a patent specification
Drafting of a patent specificationDrafting of a patent specification
Drafting of a patent specification
 
Management information system
Management information system Management information system
Management information system
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
it act 2000
it act 2000it act 2000
it act 2000
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 

Similar to Introduction to Cyber law (IT Act 2000)

cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
manojnd
 
Cyber
CyberCyber
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
utkarshjani
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
senguptasouvik99
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law

Similar to Introduction to Cyber law (IT Act 2000) (20)

cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
Cyber
CyberCyber
Cyber
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 

Recently uploaded (20)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 

Introduction to Cyber law (IT Act 2000)

  • 2. Introduction to Cyber world ● Vinton Cerf is hailed as the Father of the Internet, and earned this nickname when he co- authorized with Dr. Robert Kahn in 1973, a paper that gave the world TCP & IP. ● On 4th July 1996, Sabeer Bhatia & Jack Smith launched Hotmail. In 1997, they sold it to Microsoft for an estimated price of $385 Million.
  • 3. ● Infosys was the first Indian company to release its annual report in CD-ROM format. ● In 1971, the world’s first speech recognition software, called Hearsay, was developed in India. Introduction to Cyber world
  • 4. What is Cyber law? ● Cyber Law has been defined as the “Law governing Cyberspace” or “Internet Law”
  • 5. Information Technology Act ● The act has been passed in the Parliament of India on 9th June 2000. ● The Act has 94 Sections divided 13 chapters. MORE INFO... Former Law & Justice Minister Mr. Arun Jetly has put the bill in the parliament of India in the year 2000.
  • 6. As an I.T. Professional, I.T. student ● In depth understanding of technology issues in light of the legal aspects. ● Make organizational security policies that would comply with legal procedure. ● Understand legal terms for use of technology within organization. ● Adopt best legal practices for use of E-commerce Technology.
  • 7. Cyber Law governs: ● Cyberspace – Computer – Computer system – Computer software – Internet – Computer data
  • 8. E-governance ● Chapter III, Sections 4 to 10. ● Every Govt. Office/Dept. should have their own web site. E.g. pmcpune.com, ourpune.com ● Section 4 provides that the information required to be in written can be in electronic form. E.g. GR. MORE INFO... Now you can pay your income tax, service tax as well as municipal taxes via internet.
  • 9. Information Security ● Digital Signature – Authentication of electronic records. ● Cryptography - Science of using maths to encrypt & decrypt data. E.g. shift by 3 E.g. For India Lqgld Cryptography Cryptography : Samartha Ramdas has also use a cryptography to make a communication with Shivaji Maharaja.
  • 10. Some of the important Sections in It Act ● Sec. 43 : Unauthorized Access – If any person without permission of the owner accesses or secures access to computer he shall be liable to pay damages upto Rs. 1 Crore. (Access is defied as gaining entry into, instructing or communicating with the logical, arithmetical, or memory function of computer…..) In simple word access mean: Switching on a computer, Using a software programme ( e.g. MS Word), Viewing the contents of floppy of CD, Turning off, Taking Computer printout, Logging on to the internet.
  • 11. Unauthorized Downloading ● Section 43 (b): – If any person without permission of the owner downloads, copies, or extracts any data, database holds or stores in any removable storage medium shall be liable to pay damages upto Rs. 1 Crore
  • 12. Hacking with computer system ● Sec. 66 : hacking – Whoever with the intent to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information or diminishes its value or utility commits hacking & shall be punished with imprisonment upto 3 Yrs. Or with the fine upto Rs. 2 Lakh or with the both.
  • 13. Recent News in hacking ● Maharashtra State Govt.’s official website has been hacked by the Hackers. ● Website displays Black colored Homepage with sign of Forehand & Hacker’s internet address. ● The Hackers are From Saudi Arabia. Sakal: 19th Sept. 2007 Page no.2
  • 14. Publishing of information, which is obscene in Electronic Form ● Section 67: Pornography – Whoever publishes or transmits or causes to be published in electronic form, any material which is lascivious or appeals to the prurient interest he shall be punished on 1st conviction with imprisonment upto 5 yrs. & fine upto 1 lakh and on 2nd conviction imprisonment upto 10 Yrs. & fine upto 2 laks.
  • 15. Recent case in Pune regarding Pornography ● Kulkarni case: Set a video camera in his rented room which is given to the girls on rental basis and stores the video recording on CD. ● Orkut, You Tube, Blogging MORE INFO... While accessing internet pornography IP Addresses are the most important feature used by police to find the person.
  • 16. Investigation Procedure ● Former NSUI Pune Leader has been arrested under this section as causing to publish the lascivious material. ●Sec. 80 : – Any police officer, not below the rank of Deputy Superintendent of police may enter any public place & search & arrest without warrant any person who is reasonably suspected of having committed or being committed any offence under this Act.
  • 17. Copyright & Contributory Infringement ● Contributory infringement is a theory whereby a third-party may be held liable for contributing to another’s infringing activities. ● E.g.: If A has any copyrighted material with him in electronic form and wants to give to B. A has given it to C and requested him to give B. – In above situation A & B has violated copyright Act. – Even C has also violated Copyright as contributory. – So C is also liable to pay a liability.
  • 18. ● Urban India stands in top 10 in terms of internet penetration, with a rate of more than 19% ● In 1998, online pornography accounted for 80% of all e-commerce. However, the figure has today fallen to 20% By the Way
  • 19. ● An average of 40 million Hotmail emails are sent each day, and MSN has estimated that their services saves 500 trees-about 72,720Kg. of paper per day. ● In 2003, Software companies lost $5.5 billion due to a piracy in Asia. By the Way
  • 20. Find out More ? ● Can the It Act find guilty Google for causing to be published pornography when we request Google to search pornographic WebPages / images ? ● Downloading A copyrighted material from internet can also attract Penalties under Copyright Act Or only attract provisions in IT Act ? ● Name the country who has banned pornography and successfully blocked pornographic material. ● Whether Softwares are patented in India ?

Editor's Notes

  1. <number>
  2. <number>
  3. <number>
  4. <number>
  5. <number>
  6. <number>
  7. <number>
  8. <number>
  9. <number>
  10. <number>
  11. <number>
  12. <number>
  13. <number>
  14. <number>
  15. <number>
  16. <number>
  17. <number>
  18. <number>
  19. <number>
  20. <number>
  21. <number>