SlideShare a Scribd company logo
LAW
DIGITAL AGE
IN
CYBERCRIMEANDITS TYPES
• WHAT IS CYBER CRIME?
CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE
INTERNET.
• WHAT ARE THE TYPES?
1. HACKING.
2. THEFT.
3. CYBER STALKING.
4. IDENTITY THEFT.
5. MALICIOUS SOFTWARE.
6. CHILD SOLICITING AND ABUSE.
CATERGORIES
• CYBER CRIMES ARE BROADLY CATEGORIZED INTO THREE
CATEGORIES, NAMELY CRIME AGAINST -
1. INDIVIDUAL
2. PROPERTY
3. SOCIETY
4. ORGANISATION &
5. GOVERNMENT.
CAUSES
1. EASY EARNING BUSINESS.
2. ACCESS TO CONFIDENTIAL AND PRIVATE INFORMATION OF
INDIVIDUAL AND GOVERNMENT.
3. PASSION OF TEENAGERS.
4. TO TAKE REVENGE.
- LAW BREAKERS
TO BEAT A HACKER YOU HAVE TO BECOME
ONE
CYBER CRIMEININDIA
• THE MAJORITY OF THE CYBER CRIMES ARE CENTERED ON FORGERY, FRAUD AND
PHISHING.
• INDIA IS THE THIRD MOST TARGETED COUNTRY FOR CYBER ATTACKS AFTER US AND UK.
• 4 IN 5 ONLINE ADULTS HAVE BEEN A VICTIM OF CYBER CRIME
• AVERAGELY 14350 WEBSITE DEFACEMENTS ARE FOUND EVERY YEAR.
• INDIA IS THE NUMBER ONE COUNTRY IN THE WORLD FOR GENERATING SPAM.
WIKILEAKS
 INITATED IN 2006

 JULIAN ASSANGE -FOUNDER
 “WE OPEN GOVERNMENTS”
THE IT ACT
• The Information Technology Act, 2000 Is An Act Of The indian parliament Notified On 17 October 2000.
• It Is Also Known As IT ACT.
• It Can Be Against : Individual, Organisation Or Society At Large.
• Many Amendments Are Made Till Now.
CYBER SECURITY
• India Has No Dedicated Cyber Security Regulation Framed Under The Information Technology
Act 2000.
• National Cyber Security Policy Of India 2013 : Remained Ineffective And Non-implementable.
• Indian Cyber Security Policy : Failed In Protecting Civil Liberties & Privacy Rights.
• Cyber Security Of India : Grossly Weak With No Legal Obligation For Cyber Security.
CASE STUDYS
CURIOUS CASE OF JONATHAN JAMES
CASE OF KEVIN MITNICK
USE OFSOCIAL WEBSITE/APPS
• CASE RELATED TO YAKUB MENON’S ARREST
Salman had tweeted, “Get tiger, hang him. Parade him not his brother’’.
• MUMBAI GIRLS JAILED AFTER FACEBOOK POST ABOUT BAL
THACKERAY WHICH 'HURT RELIGIOUS SENTIMENTS‘.
Shaheen had reportedly written on her Facebook wall that "People like Thackeray are born and die
daily, and one should not observe a 'bandh' for that".
CONCLUSION
• PREVENTIVE MEASURES
BY INDIVIDUAL .
BY ORGANISATION
BY SOCIETY.
PRECAUTIONS
BY GOVERNMENT.
THANK YOU
-RUSHABH
BROUGHT TO YOU BY

More Related Content

What's hot

psychological theories of crime.pptx
psychological theories of crime.pptxpsychological theories of crime.pptx
psychological theories of crime.pptx
research gate
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
FM Consulting International
 
Crime and Deviance - Interactionist Approach
Crime and Deviance - Interactionist ApproachCrime and Deviance - Interactionist Approach
Crime and Deviance - Interactionist Approach
Rachel Jones
 
Censorship
CensorshipCensorship
Censorship
Tim Musgrave
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Ronald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpointRonald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpoint
lakers24123
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINTmattyp99
 
Marxism On Crime and Deviance
Marxism On Crime and DevianceMarxism On Crime and Deviance
Marxism On Crime and Deviance
Beth Lee
 
Matthew spangler john wayne gacy jr.
Matthew spangler john wayne gacy jr.Matthew spangler john wayne gacy jr.
Matthew spangler john wayne gacy jr.
mabrandt
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
Rabita Rejwana
 
Social control theory
Social control theorySocial control theory
Social control theoryrplatos
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
BTRC
BTRCBTRC
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
Welmoed Verhagen
 

What's hot (20)

James Hicky
James HickyJames Hicky
James Hicky
 
psychological theories of crime.pptx
psychological theories of crime.pptxpsychological theories of crime.pptx
psychological theories of crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Globalisation
GlobalisationGlobalisation
Globalisation
 
Crime and Deviance - Interactionist Approach
Crime and Deviance - Interactionist ApproachCrime and Deviance - Interactionist Approach
Crime and Deviance - Interactionist Approach
 
Censorship
CensorshipCensorship
Censorship
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Ronald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpointRonald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpoint
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
Marxism On Crime and Deviance
Marxism On Crime and DevianceMarxism On Crime and Deviance
Marxism On Crime and Deviance
 
Matthew spangler john wayne gacy jr.
Matthew spangler john wayne gacy jr.Matthew spangler john wayne gacy jr.
Matthew spangler john wayne gacy jr.
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social control theory
Social control theorySocial control theory
Social control theory
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
BTRC
BTRCBTRC
BTRC
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
 

Viewers also liked

Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship
12mk
 
digital law
digital lawdigital law
digital law11tsk
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointTala
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnesspakkwok
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnessPat Bruinsma
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
DLRUDO01
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
mdhague
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Anti bullying Philippines
Anti bullying Philippines Anti bullying Philippines
Anti bullying Philippines Ricky Fancubit
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
Michael Roa
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
 

Viewers also liked (18)

Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship
 
digital law
digital lawdigital law
digital law
 
Digital law
Digital lawDigital law
Digital law
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital law
Digital lawDigital law
Digital law
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Anti bullying Philippines
Anti bullying Philippines Anti bullying Philippines
Anti bullying Philippines
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.

Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JASJIT SINGH
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
RoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
RoshelleBonDacara
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
rashidirazali
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Cyber laws
Cyber lawsCyber laws
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
Best Online Paper Writing Service
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
YUSRA FERNANDO
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
SumandeepKaur733500
 

Similar to LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA. (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 

Recently uploaded

Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 

Recently uploaded (20)

Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 

LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.

  • 2. CYBERCRIMEANDITS TYPES • WHAT IS CYBER CRIME? CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE INTERNET. • WHAT ARE THE TYPES? 1. HACKING. 2. THEFT. 3. CYBER STALKING. 4. IDENTITY THEFT. 5. MALICIOUS SOFTWARE. 6. CHILD SOLICITING AND ABUSE.
  • 3. CATERGORIES • CYBER CRIMES ARE BROADLY CATEGORIZED INTO THREE CATEGORIES, NAMELY CRIME AGAINST - 1. INDIVIDUAL 2. PROPERTY 3. SOCIETY 4. ORGANISATION & 5. GOVERNMENT.
  • 4. CAUSES 1. EASY EARNING BUSINESS. 2. ACCESS TO CONFIDENTIAL AND PRIVATE INFORMATION OF INDIVIDUAL AND GOVERNMENT. 3. PASSION OF TEENAGERS. 4. TO TAKE REVENGE.
  • 5. - LAW BREAKERS TO BEAT A HACKER YOU HAVE TO BECOME ONE
  • 6.
  • 7. CYBER CRIMEININDIA • THE MAJORITY OF THE CYBER CRIMES ARE CENTERED ON FORGERY, FRAUD AND PHISHING. • INDIA IS THE THIRD MOST TARGETED COUNTRY FOR CYBER ATTACKS AFTER US AND UK. • 4 IN 5 ONLINE ADULTS HAVE BEEN A VICTIM OF CYBER CRIME • AVERAGELY 14350 WEBSITE DEFACEMENTS ARE FOUND EVERY YEAR. • INDIA IS THE NUMBER ONE COUNTRY IN THE WORLD FOR GENERATING SPAM.
  • 8. WIKILEAKS  INITATED IN 2006   JULIAN ASSANGE -FOUNDER  “WE OPEN GOVERNMENTS”
  • 9. THE IT ACT • The Information Technology Act, 2000 Is An Act Of The indian parliament Notified On 17 October 2000. • It Is Also Known As IT ACT. • It Can Be Against : Individual, Organisation Or Society At Large. • Many Amendments Are Made Till Now.
  • 10. CYBER SECURITY • India Has No Dedicated Cyber Security Regulation Framed Under The Information Technology Act 2000. • National Cyber Security Policy Of India 2013 : Remained Ineffective And Non-implementable. • Indian Cyber Security Policy : Failed In Protecting Civil Liberties & Privacy Rights. • Cyber Security Of India : Grossly Weak With No Legal Obligation For Cyber Security.
  • 11. CASE STUDYS CURIOUS CASE OF JONATHAN JAMES CASE OF KEVIN MITNICK
  • 12. USE OFSOCIAL WEBSITE/APPS • CASE RELATED TO YAKUB MENON’S ARREST Salman had tweeted, “Get tiger, hang him. Parade him not his brother’’. • MUMBAI GIRLS JAILED AFTER FACEBOOK POST ABOUT BAL THACKERAY WHICH 'HURT RELIGIOUS SENTIMENTS‘. Shaheen had reportedly written on her Facebook wall that "People like Thackeray are born and die daily, and one should not observe a 'bandh' for that".
  • 13. CONCLUSION • PREVENTIVE MEASURES BY INDIVIDUAL . BY ORGANISATION BY SOCIETY. PRECAUTIONS BY GOVERNMENT.