SlideShare a Scribd company logo
Legal Structure for
CYBER GOVERNANCE
 Laws in general (such as constitutional,
administrative, contract and criminal laws)
are applicable
 Specific Laws –
IP Law, Computer Crime Law and Electronic
Transactions Law etc.
IP Act No: 36 of 2003
Electronic Transactions Act. No: 19 0f 2006
Computer Crime Act No: 24 of 2007
(Information and Communication Technology
Act No: 27 of 2003 -policy and Evidence
(Special Provisions) Act No: 14 of 1995 -
computer evidence).
 Computer : an electronic or similar device
having information processing capabilities
(IP Act and ET Act)
 Computer program: A set of
instructions expressed in words, codes,
schemes or in any other form which is
capable, when incorporated in a medium
that the computer can read, of causing a
computer to perform or achieve a
particular task or result.
(IP Act and Computer Crime Act)
 Computer programs : Copyright Law
 Protected as a literary work
(source code & object code)
 Protected rights – moral & economic
 Owner of rights: author, employer &
person who commissioned
 Duration – Life time & 70 years
 Acquisition – purchase/license
 Databases – Copyright Law
 Infringement : acts that violate protected
rights
 Civil/criminal liability
Hardware
- Patent law (inventions)
- Trademark law ( Business)
- Layout designs
- Information
Undisclosed information (secret, kept
secret & financial value), Law of
contracts
 Electronic documents, e-records data messages and other e-
communication are legally valid (offer & acceptance)
 Requirement in writing & e-documents, etc., (electronic form)
valid if the contained information is accessible so as to be
usable for subsequent reference.
 Original forms of information in writing – can be in e-form (
reliability of the integrity of information and availability of
information for subsequent reference)
 Information retention e-form
 Electronic signatures
 E-records/signatures in govt. forms, licences, permits, receipts
( as may be specified by the relevant govt. agency)
 Regulations
 E-contracts – valid unless otherwise agreed (formation,
originator, time, etc.,)
 Unauthorized & intentional access to a computer – (computer/information held in
computer) (hacking)
 An act done in order to secure access to computer /information held in computer
(turning on of a computer) (cracking)
 Unauthorized & intentional act of causing a computer to perform any function that
will result in unauthorized modification or damage or potential damage to a
computer, computer system or computer program (eg. deleting information)
 Intentionally causing a computer to perform a function adversely affecting national
security, national economy or public order.
 Obtaining (unauthorized & intentional) information from a computer or a storage
medium of a computer – buys. receives, sells or (deals with) ,offers for sale,
downloads, uploads, copies, acquires, etc.,
 Intercepting data or communication to, from or within a computer or
electromagnetic emissions from a computer carrying information
 Illegal devices (for committing an offence) produces, sells, imports, procures, etc.,
 Unauthorized disclosure of information (entrusted) which enables access to any
service provided by means of a computer
 Attempt, abetment & conspiring
 Survives
only adoptable, not strongest

More Related Content

Similar to Legal Structure for Cyber Governance.ppt

The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
MarkFredderickAbejo
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
anthonywong
 
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmmMidwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
Woodard, Emhardt, Henry, Reeves & Wagner, LLP
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
LawPlus Ltd.
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
Wulax37
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
Maruthi N.E
 
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPIntellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
BananaIP Counsels
 
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Jamil Salem
 
It legislation
It legislationIt legislation
It legislation
doogstone
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
Nadeem Kazi
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
MarkDennielMontiano
 
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
mrcox
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Aditya Gurav
 

Similar to Legal Structure for Cyber Governance.ppt (20)

The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
 
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmmMidwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPIntellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
 
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
 
It legislation
It legislationIt legislation
It legislation
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

More from JOHN BABATUNDE LEE

PRAYER AS OF OLD - End of The Year Chain Prayer
PRAYER AS OF OLD - End of The Year Chain PrayerPRAYER AS OF OLD - End of The Year Chain Prayer
PRAYER AS OF OLD - End of The Year Chain Prayer
JOHN BABATUNDE LEE
 
The scheme of prayers for all who want to pray to God
The scheme of prayers for all who want to pray to GodThe scheme of prayers for all who want to pray to God
The scheme of prayers for all who want to pray to God
JOHN BABATUNDE LEE
 
Revelation of King ELBA about the Abode of God and deep things you can never ...
Revelation of King ELBA about the Abode of God and deep things you can never ...Revelation of King ELBA about the Abode of God and deep things you can never ...
Revelation of King ELBA about the Abode of God and deep things you can never ...
JOHN BABATUNDE LEE
 
The Angel Among us : Gracious man with God's mantle
The Angel Among us : Gracious man with God's mantleThe Angel Among us : Gracious man with God's mantle
The Angel Among us : Gracious man with God's mantle
JOHN BABATUNDE LEE
 
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdfCORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
JOHN BABATUNDE LEE
 
Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
JOHN BABATUNDE LEE
 
Educational Philosophy in Prison / Correctional Facilities
Educational Philosophy in Prison / Correctional FacilitiesEducational Philosophy in Prison / Correctional Facilities
Educational Philosophy in Prison / Correctional Facilities
JOHN BABATUNDE LEE
 
Strategies for Leading and Communicating Effective Across Diverse Cultures
Strategies for Leading and Communicating Effective  Across  Diverse CulturesStrategies for Leading and Communicating Effective  Across  Diverse Cultures
Strategies for Leading and Communicating Effective Across Diverse Cultures
JOHN BABATUNDE LEE
 
Intro To Church History and Manpower Management
Intro To Church History and Manpower ManagementIntro To Church History and Manpower Management
Intro To Church History and Manpower Management
JOHN BABATUNDE LEE
 
Go, preach, teach and disciple the nations!
Go, preach, teach and disciple the nations!Go, preach, teach and disciple the nations!
Go, preach, teach and disciple the nations!
JOHN BABATUNDE LEE
 
American People and their Culture : 2009
American People and their Culture : 2009American People and their Culture : 2009
American People and their Culture : 2009
JOHN BABATUNDE LEE
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.ppt
JOHN BABATUNDE LEE
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.pptE-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
JOHN BABATUNDE LEE
 

More from JOHN BABATUNDE LEE (14)

PRAYER AS OF OLD - End of The Year Chain Prayer
PRAYER AS OF OLD - End of The Year Chain PrayerPRAYER AS OF OLD - End of The Year Chain Prayer
PRAYER AS OF OLD - End of The Year Chain Prayer
 
The scheme of prayers for all who want to pray to God
The scheme of prayers for all who want to pray to GodThe scheme of prayers for all who want to pray to God
The scheme of prayers for all who want to pray to God
 
Revelation of King ELBA about the Abode of God and deep things you can never ...
Revelation of King ELBA about the Abode of God and deep things you can never ...Revelation of King ELBA about the Abode of God and deep things you can never ...
Revelation of King ELBA about the Abode of God and deep things you can never ...
 
The Angel Among us : Gracious man with God's mantle
The Angel Among us : Gracious man with God's mantleThe Angel Among us : Gracious man with God's mantle
The Angel Among us : Gracious man with God's mantle
 
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdfCORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
 
Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
 
Educational Philosophy in Prison / Correctional Facilities
Educational Philosophy in Prison / Correctional FacilitiesEducational Philosophy in Prison / Correctional Facilities
Educational Philosophy in Prison / Correctional Facilities
 
Strategies for Leading and Communicating Effective Across Diverse Cultures
Strategies for Leading and Communicating Effective  Across  Diverse CulturesStrategies for Leading and Communicating Effective  Across  Diverse Cultures
Strategies for Leading and Communicating Effective Across Diverse Cultures
 
Intro To Church History and Manpower Management
Intro To Church History and Manpower ManagementIntro To Church History and Manpower Management
Intro To Church History and Manpower Management
 
Go, preach, teach and disciple the nations!
Go, preach, teach and disciple the nations!Go, preach, teach and disciple the nations!
Go, preach, teach and disciple the nations!
 
American People and their Culture : 2009
American People and their Culture : 2009American People and their Culture : 2009
American People and their Culture : 2009
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.ppt
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.pptE-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
E-COMMERCE ADMINISTRATION & MANAGEMENT - Australia Perspective.ppt
 

Recently uploaded

在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 

Recently uploaded (20)

在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 

Legal Structure for Cyber Governance.ppt

  • 2.  Laws in general (such as constitutional, administrative, contract and criminal laws) are applicable  Specific Laws – IP Law, Computer Crime Law and Electronic Transactions Law etc.
  • 3. IP Act No: 36 of 2003 Electronic Transactions Act. No: 19 0f 2006 Computer Crime Act No: 24 of 2007 (Information and Communication Technology Act No: 27 of 2003 -policy and Evidence (Special Provisions) Act No: 14 of 1995 - computer evidence).
  • 4.  Computer : an electronic or similar device having information processing capabilities (IP Act and ET Act)  Computer program: A set of instructions expressed in words, codes, schemes or in any other form which is capable, when incorporated in a medium that the computer can read, of causing a computer to perform or achieve a particular task or result. (IP Act and Computer Crime Act)
  • 5.  Computer programs : Copyright Law  Protected as a literary work (source code & object code)  Protected rights – moral & economic  Owner of rights: author, employer & person who commissioned  Duration – Life time & 70 years  Acquisition – purchase/license  Databases – Copyright Law
  • 6.  Infringement : acts that violate protected rights  Civil/criminal liability Hardware - Patent law (inventions) - Trademark law ( Business) - Layout designs - Information Undisclosed information (secret, kept secret & financial value), Law of contracts
  • 7.  Electronic documents, e-records data messages and other e- communication are legally valid (offer & acceptance)  Requirement in writing & e-documents, etc., (electronic form) valid if the contained information is accessible so as to be usable for subsequent reference.  Original forms of information in writing – can be in e-form ( reliability of the integrity of information and availability of information for subsequent reference)  Information retention e-form  Electronic signatures  E-records/signatures in govt. forms, licences, permits, receipts ( as may be specified by the relevant govt. agency)  Regulations  E-contracts – valid unless otherwise agreed (formation, originator, time, etc.,)
  • 8.  Unauthorized & intentional access to a computer – (computer/information held in computer) (hacking)  An act done in order to secure access to computer /information held in computer (turning on of a computer) (cracking)  Unauthorized & intentional act of causing a computer to perform any function that will result in unauthorized modification or damage or potential damage to a computer, computer system or computer program (eg. deleting information)  Intentionally causing a computer to perform a function adversely affecting national security, national economy or public order.  Obtaining (unauthorized & intentional) information from a computer or a storage medium of a computer – buys. receives, sells or (deals with) ,offers for sale, downloads, uploads, copies, acquires, etc.,  Intercepting data or communication to, from or within a computer or electromagnetic emissions from a computer carrying information  Illegal devices (for committing an offence) produces, sells, imports, procures, etc.,  Unauthorized disclosure of information (entrusted) which enables access to any service provided by means of a computer  Attempt, abetment & conspiring