SlideShare a Scribd company logo
1 of 12
Objectives:
 To provide a general awareness of Cybercrime
 To understand Cybercrime methods
 To identify Internet scams
 to learn how to keep from being a victim
 What is Cybercrime?
Cybercrime is any illegal act committed by using a
computer network.
Cybercrime is a subset of computer crime
 Examples of Cybercrime
 Web defacement
 Unauthorized network access
 Cyber-Stalking
 Internet fraud
 Identity theft
 Child pornography
 Interception and fabrication of emails
 Theft of passwords
Who are the cyber victims?
 Companies
 No security awareness
 Individuals
 Society
 OFFENCES OF CYBER CRIME COVERED UNDER IPC AND
SPECIAL LAW
 Cyber crimes under the IT Act:-
 Penalty and Compensation for damage to computer,
computer system, etc (sec. 43 IT act)
 Compensation for failure to protect data (sec. 43A IT Act)
 Tampering with computer source Documents (sec. 65 IT Act)
 Hacking with computer systems, Data Alteration (sec. 66 IT
Act)
 Sending offensive messages through communication service,
etc (sec. 66A IT Act)
 Identity theft (sec. 66C IT Act)
 Cheating by personating by using computer resource (sec.
66D IT Act)
 Violation of privacy (sec. 66E IT Act)
 Cyber terrorism (sec. 66F IT Act)
 Offences by Companies (sec. 85 IT Act)
 Cyber crime under IPC and special law:-
 Sending threatening messages by e-mail (Sec .503 IPC)
 Word, gesture or act intended to insult the modesty of a
woman (Sec.509 IPC)
 Sending defamatory messages by e-mail (Sec .499 IPC)
 Bogus websites , Cyber Frauds (Sec .420 IPC)
 E-mail Spoofing (Sec .463 IPC )
 Making a false document (Sec.464 IPC)
 Forgery for purpose of cheating (Sec.468 IPC)
 Forgery for purpose of harming reputation (Sec.469 IPC)
 Web-Jacking (Sec .383 IPC)
 E-mail Abuse (Sec .500 IPC)
 Theft of Computer Hardware (Sec. 378 )
 Punishment for theft (Sec.379 )
 Cyber Crimes under the Special Acts:-
 Online Sale of Drugs (NDPS Act )
 Online Sale of Arms (Arms Act ).
 In India there are number of cases filed under these IPC
and IT ACT provisions related to the cyber crime.
According to the report of Home Ministry, in 2012 there
are 601 cases filed under the various provisions of IPC
and 2876 cases filed under the various provisions of IT
act.
 There are several loopholes in IT Act as:-
Lack of awareness
Raising a cyber army
Hesitation to report offences
Dynamic form of cyber crime
Cyber savvy bench
 SURVEY ON CYBER CRIME UNDER CYBER CELL OF
SILIGURI METROPOLITAN POLICE:-
 Establishment of cyber cell in siliguri
Metropolitan Area:-
 On 01/03/2015 cyber Cell in Siliguri Metropolitan
Area established.
 And only one cyber cell in North Bengal.
 Jurisdiction of cyber cell:-
 Entire Siliguri Commissioner Zone.
 Other police station may also assist some cases
over.
 OTHER DATA:-
In Northern India mostly affected areas of cyber crime
are:-
 Delhi.
 Uttar Pradesh (Noida).
 Jharkhand.
• TYPES OF CRIMES:
phishing crime: - means crime done by phone call (like
SMS, Fake interview in phone). These types of crime are
especially in Jharkhand.
Net Banking and Online Job fraud: - are especially in
U.P and DELHI.
Conclusion
The key to protecting yourself is being
aware.
Not all cybercriminals are “hackers.”
There is a whole other world that exists in
cyberspace…make sure that your
information travels safely.

More Related Content

What's hot

Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 

What's hot (20)

Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
IT Act
IT ActIT Act
IT Act
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Pre itact
Pre itactPre itact
Pre itact
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Similar to presentation

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityVivek Gupta
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 

Similar to presentation (20)

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
 
My presentation
My presentationMy presentation
My presentation
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
it act
it actit act
it act
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 

Recently uploaded

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 

Recently uploaded (20)

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 

presentation

  • 1.
  • 2. Objectives:  To provide a general awareness of Cybercrime  To understand Cybercrime methods  To identify Internet scams  to learn how to keep from being a victim
  • 3.  What is Cybercrime? Cybercrime is any illegal act committed by using a computer network. Cybercrime is a subset of computer crime
  • 4.  Examples of Cybercrime  Web defacement  Unauthorized network access  Cyber-Stalking  Internet fraud  Identity theft  Child pornography  Interception and fabrication of emails  Theft of passwords
  • 5. Who are the cyber victims?  Companies  No security awareness  Individuals  Society
  • 6.  OFFENCES OF CYBER CRIME COVERED UNDER IPC AND SPECIAL LAW  Cyber crimes under the IT Act:-  Penalty and Compensation for damage to computer, computer system, etc (sec. 43 IT act)  Compensation for failure to protect data (sec. 43A IT Act)  Tampering with computer source Documents (sec. 65 IT Act)  Hacking with computer systems, Data Alteration (sec. 66 IT Act)  Sending offensive messages through communication service, etc (sec. 66A IT Act)  Identity theft (sec. 66C IT Act)  Cheating by personating by using computer resource (sec. 66D IT Act)  Violation of privacy (sec. 66E IT Act)  Cyber terrorism (sec. 66F IT Act)  Offences by Companies (sec. 85 IT Act)
  • 7.  Cyber crime under IPC and special law:-  Sending threatening messages by e-mail (Sec .503 IPC)  Word, gesture or act intended to insult the modesty of a woman (Sec.509 IPC)  Sending defamatory messages by e-mail (Sec .499 IPC)  Bogus websites , Cyber Frauds (Sec .420 IPC)  E-mail Spoofing (Sec .463 IPC )  Making a false document (Sec.464 IPC)  Forgery for purpose of cheating (Sec.468 IPC)  Forgery for purpose of harming reputation (Sec.469 IPC)  Web-Jacking (Sec .383 IPC)  E-mail Abuse (Sec .500 IPC)  Theft of Computer Hardware (Sec. 378 )  Punishment for theft (Sec.379 )
  • 8.  Cyber Crimes under the Special Acts:-  Online Sale of Drugs (NDPS Act )  Online Sale of Arms (Arms Act ).  In India there are number of cases filed under these IPC and IT ACT provisions related to the cyber crime. According to the report of Home Ministry, in 2012 there are 601 cases filed under the various provisions of IPC and 2876 cases filed under the various provisions of IT act.
  • 9.  There are several loopholes in IT Act as:- Lack of awareness Raising a cyber army Hesitation to report offences Dynamic form of cyber crime Cyber savvy bench
  • 10.  SURVEY ON CYBER CRIME UNDER CYBER CELL OF SILIGURI METROPOLITAN POLICE:-  Establishment of cyber cell in siliguri Metropolitan Area:-  On 01/03/2015 cyber Cell in Siliguri Metropolitan Area established.  And only one cyber cell in North Bengal.  Jurisdiction of cyber cell:-  Entire Siliguri Commissioner Zone.  Other police station may also assist some cases over.
  • 11.  OTHER DATA:- In Northern India mostly affected areas of cyber crime are:-  Delhi.  Uttar Pradesh (Noida).  Jharkhand. • TYPES OF CRIMES: phishing crime: - means crime done by phone call (like SMS, Fake interview in phone). These types of crime are especially in Jharkhand. Net Banking and Online Job fraud: - are especially in U.P and DELHI.
  • 12. Conclusion The key to protecting yourself is being aware. Not all cybercriminals are “hackers.” There is a whole other world that exists in cyberspace…make sure that your information travels safely.