Cyber law governs the use of computers, the internet, and digital technology. It defines illegal access to computer systems and digital content as well as crimes like hacking and distributing obscene materials online. The Information Technology Act of 2000 is the primary law regulating cyber activity in India and outlines offenses and penalties. For example, unauthorized access to a computer system or downloading copyrighted content without permission can result in fines of up to 1 crore rupees. The act also prohibits hacking, publishing obscene materials electronically, and contributory infringement of copyright.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
In todays world every 2nd company must have suffered some form of Cyber Crime at some point of time. Should it be ignored or should it be dealt with Iron Hands. Is there anything a company can or must do to prevent this? Yes, where there are problems, there are solutions and our IT Act give you such solutions. What is required is awareness and this presentation is just an attempt to sensitize todays corporates to arise to this issue and deal with it effectively.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
2. Introduction to Cyber world
● Vinton Cerf is hailed as the Father of the
Internet, and earned this nickname when he co-
authorized with Dr. Robert Kahn in 1973, a
paper that gave the world TCP & IP.
● On 4th July 1996, Sabeer Bhatia & Jack Smith
launched Hotmail. In 1997, they sold it to
Microsoft for an estimated price of $385
Million.
3. ● Infosys was the first Indian company to
release its annual report in CD-ROM
format.
● In 1971, the world’s first speech
recognition software, called Hearsay, was
developed in India.
Introduction to Cyber world
4. What is Cyber law?
● Cyber Law has been defined as the “Law
governing Cyberspace” or “Internet Law”
5. Information Technology Act
● The act has been passed in the
Parliament of India on 9th June 2000.
● The Act has 94 Sections divided 13
chapters.
MORE INFO...
Former Law & Justice Minister Mr. Arun Jetly has put the bill in the
parliament of India in the year 2000.
6. As an I.T. Professional, I.T. student
● In depth understanding of technology issues in
light of the legal aspects.
● Make organizational security policies that
would comply with legal procedure.
● Understand legal terms for use of technology
within organization.
● Adopt best legal practices for use of
E-commerce Technology.
7. Cyber Law governs:
● Cyberspace
– Computer
– Computer system
– Computer software
– Internet
– Computer data
8. E-governance
● Chapter III, Sections 4 to 10.
● Every Govt. Office/Dept. should have
their own web site. E.g. pmcpune.com,
ourpune.com
● Section 4 provides that the information
required to be in written can be in
electronic form. E.g. GR.
MORE INFO...
Now you can pay your income tax, service tax as well as municipal
taxes via internet.
9. Information Security
● Digital Signature – Authentication of
electronic records.
● Cryptography - Science of using maths
to encrypt & decrypt data. E.g. shift by 3
E.g. For India Lqgld
Cryptography
Cryptography : Samartha Ramdas has also use a
cryptography to make a communication with Shivaji Maharaja.
10. Some of the important Sections in It Act
● Sec. 43 : Unauthorized Access
– If any person without permission of the owner
accesses or secures access to computer he shall
be liable to pay damages upto Rs. 1 Crore.
(Access is defied as gaining entry into, instructing or
communicating with the logical, arithmetical, or
memory function of computer…..)
In simple word access mean:
Switching on a computer, Using a software programme ( e.g. MS Word), Viewing
the contents of floppy of CD, Turning off, Taking Computer printout, Logging on to
the internet.
11. Unauthorized Downloading
● Section 43 (b):
– If any person without permission of the
owner downloads, copies, or extracts any
data, database holds or stores in any
removable storage medium shall be liable to
pay damages upto Rs. 1 Crore
12. Hacking with computer system
● Sec. 66 : hacking
– Whoever with the intent to cause wrongful
loss or damage to the public or any person
destroys or deletes or alters any information
or diminishes its value or utility commits
hacking & shall be punished with
imprisonment upto 3 Yrs. Or with the fine
upto Rs. 2 Lakh or with the both.
13. Recent News in hacking
● Maharashtra State Govt.’s official
website has been hacked by the Hackers.
● Website displays Black colored
Homepage with sign of Forehand &
Hacker’s internet address.
● The Hackers are From Saudi Arabia.
Sakal: 19th Sept. 2007 Page no.2
14. Publishing of information, which is
obscene in Electronic Form
● Section 67: Pornography
– Whoever publishes or transmits or causes to
be published in electronic form, any material
which is lascivious or appeals to the prurient
interest he shall be punished on 1st
conviction with imprisonment upto 5 yrs. &
fine upto 1 lakh and on 2nd conviction
imprisonment upto 10 Yrs. & fine upto 2
laks.
15. Recent case in Pune regarding
Pornography
● Kulkarni case: Set a video camera in his
rented room which is given to the girls on
rental basis and stores the video
recording on CD.
● Orkut, You Tube, Blogging
MORE INFO...
While accessing internet pornography IP Addresses are the
most important feature used by police to find the person.
16. Investigation Procedure
● Former NSUI Pune Leader has been arrested
under this section as causing to publish the
lascivious material.
●Sec. 80 :
– Any police officer, not below the rank of
Deputy Superintendent of police may enter
any public place & search & arrest without
warrant any person who is reasonably
suspected of having committed or being
committed any offence under this Act.
17. Copyright & Contributory
Infringement
● Contributory infringement is a theory whereby
a third-party may be held liable for
contributing to another’s infringing activities.
● E.g.: If A has any copyrighted material with
him in electronic form and wants to give to B. A
has given it to C and requested him to give B.
– In above situation A & B has violated copyright Act.
– Even C has also violated Copyright as contributory.
– So C is also liable to pay a liability.
18. ● Urban India stands in top 10 in terms of
internet penetration, with a rate of more
than 19%
● In 1998, online pornography accounted
for 80% of all e-commerce. However, the
figure has today fallen to 20%
By the Way
19. ● An average of 40 million Hotmail emails
are sent each day, and MSN has
estimated that their services saves 500
trees-about 72,720Kg. of paper per day.
● In 2003, Software companies lost $5.5
billion due to a piracy in Asia.
By the Way
20. Find out More ?
● Can the It Act find guilty Google for causing to be published
pornography when we request Google to search
pornographic WebPages / images ?
● Downloading A copyrighted material from internet can also
attract Penalties under Copyright Act Or only attract
provisions in IT Act ?
● Name the country who has banned pornography and
successfully blocked pornographic material.
● Whether Softwares are patented in India ?