SlideShare a Scribd company logo
1 of 12
Objectives:
 To provide a general awareness of Cybercrime
 To understand Cybercrime methods
 To identify Internet scams
 to learn how to keep from being a victim
 What is Cybercrime?
Cybercrime is any illegal act committed by using a
computer network.
Cybercrime is a subset of computer crime
 Examples of Cybercrime
 Web defacement
 Unauthorized network access
 Cyber-Stalking
 Internet fraud
 Identity theft
 Child pornography
 Interception and fabrication of emails
 Theft of passwords
Who are the cyber victims?
 Companies
 No security awareness
 Individuals
 Society
 OFFENCES OF CYBER CRIME COVERED UNDER IPC AND
SPECIAL LAW
 Cyber crimes under the IT Act:-
 Penalty and Compensation for damage to computer,
computer system, etc (sec. 43 IT act)
 Compensation for failure to protect data (sec. 43A IT Act)
 Tampering with computer source Documents (sec. 65 IT Act)
 Hacking with computer systems, Data Alteration (sec. 66 IT
Act)
 Sending offensive messages through communication service,
etc (sec. 66A IT Act)
 Identity theft (sec. 66C IT Act)
 Cheating by personating by using computer resource (sec.
66D IT Act)
 Violation of privacy (sec. 66E IT Act)
 Cyber terrorism (sec. 66F IT Act)
 Offences by Companies (sec. 85 IT Act)
 Cyber crime under IPC and special law:-
 Sending threatening messages by e-mail (Sec .503 IPC)
 Word, gesture or act intended to insult the modesty of a
woman (Sec.509 IPC)
 Sending defamatory messages by e-mail (Sec .499 IPC)
 Bogus websites , Cyber Frauds (Sec .420 IPC)
 E-mail Spoofing (Sec .463 IPC )
 Making a false document (Sec.464 IPC)
 Forgery for purpose of cheating (Sec.468 IPC)
 Forgery for purpose of harming reputation (Sec.469 IPC)
 Web-Jacking (Sec .383 IPC)
 E-mail Abuse (Sec .500 IPC)
 Theft of Computer Hardware (Sec. 378 )
 Punishment for theft (Sec.379 )
 Cyber Crimes under the Special Acts:-
 Online Sale of Drugs (NDPS Act )
 Online Sale of Arms (Arms Act ).
 In India there are number of cases filed under these IPC
and IT ACT provisions related to the cyber crime.
According to the report of Home Ministry, in 2012 there
are 601 cases filed under the various provisions of IPC
and 2876 cases filed under the various provisions of IT
act.
 There are several loopholes in IT Act as:-
Lack of awareness
Raising a cyber army
Hesitation to report offences
Dynamic form of cyber crime
Cyber savvy bench
 SURVEY ON CYBER CRIME UNDER CYBER CELL OF
SILIGURI METROPOLITAN POLICE:-
 Establishment of cyber cell in siliguri
Metropolitan Area:-
 On 01/03/2015 cyber Cell in Siliguri Metropolitan
Area established.
 And only one cyber cell in North Bengal.
 Jurisdiction of cyber cell:-
 Entire Siliguri Commissioner Zone.
 Other police station may also assist some cases
over.
 OTHER DATA:-
In Northern India mostly affected areas of cyber crime
are:-
 Delhi.
 Uttar Pradesh (Noida).
 Jharkhand.
• TYPES OF CRIMES:
phishing crime: - means crime done by phone call (like
SMS, Fake interview in phone). These types of crime are
especially in Jharkhand.
Net Banking and Online Job fraud: - are especially in
U.P and DELHI.
Conclusion
The key to protecting yourself is being
aware.
Not all cybercriminals are “hackers.”
There is a whole other world that exists in
cyberspace…make sure that your
information travels safely.

More Related Content

What's hot

Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 

What's hot (20)

Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
IT Act
IT ActIT Act
IT Act
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Pre itact
Pre itactPre itact
Pre itact
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Similar to presentation

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityVivek Gupta
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 

Similar to presentation (20)

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
 
My presentation
My presentationMy presentation
My presentation
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
it act
it actit act
it act
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 

Recently uploaded

Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 

Recently uploaded (20)

Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 

presentation

  • 1.
  • 2. Objectives:  To provide a general awareness of Cybercrime  To understand Cybercrime methods  To identify Internet scams  to learn how to keep from being a victim
  • 3.  What is Cybercrime? Cybercrime is any illegal act committed by using a computer network. Cybercrime is a subset of computer crime
  • 4.  Examples of Cybercrime  Web defacement  Unauthorized network access  Cyber-Stalking  Internet fraud  Identity theft  Child pornography  Interception and fabrication of emails  Theft of passwords
  • 5. Who are the cyber victims?  Companies  No security awareness  Individuals  Society
  • 6.  OFFENCES OF CYBER CRIME COVERED UNDER IPC AND SPECIAL LAW  Cyber crimes under the IT Act:-  Penalty and Compensation for damage to computer, computer system, etc (sec. 43 IT act)  Compensation for failure to protect data (sec. 43A IT Act)  Tampering with computer source Documents (sec. 65 IT Act)  Hacking with computer systems, Data Alteration (sec. 66 IT Act)  Sending offensive messages through communication service, etc (sec. 66A IT Act)  Identity theft (sec. 66C IT Act)  Cheating by personating by using computer resource (sec. 66D IT Act)  Violation of privacy (sec. 66E IT Act)  Cyber terrorism (sec. 66F IT Act)  Offences by Companies (sec. 85 IT Act)
  • 7.  Cyber crime under IPC and special law:-  Sending threatening messages by e-mail (Sec .503 IPC)  Word, gesture or act intended to insult the modesty of a woman (Sec.509 IPC)  Sending defamatory messages by e-mail (Sec .499 IPC)  Bogus websites , Cyber Frauds (Sec .420 IPC)  E-mail Spoofing (Sec .463 IPC )  Making a false document (Sec.464 IPC)  Forgery for purpose of cheating (Sec.468 IPC)  Forgery for purpose of harming reputation (Sec.469 IPC)  Web-Jacking (Sec .383 IPC)  E-mail Abuse (Sec .500 IPC)  Theft of Computer Hardware (Sec. 378 )  Punishment for theft (Sec.379 )
  • 8.  Cyber Crimes under the Special Acts:-  Online Sale of Drugs (NDPS Act )  Online Sale of Arms (Arms Act ).  In India there are number of cases filed under these IPC and IT ACT provisions related to the cyber crime. According to the report of Home Ministry, in 2012 there are 601 cases filed under the various provisions of IPC and 2876 cases filed under the various provisions of IT act.
  • 9.  There are several loopholes in IT Act as:- Lack of awareness Raising a cyber army Hesitation to report offences Dynamic form of cyber crime Cyber savvy bench
  • 10.  SURVEY ON CYBER CRIME UNDER CYBER CELL OF SILIGURI METROPOLITAN POLICE:-  Establishment of cyber cell in siliguri Metropolitan Area:-  On 01/03/2015 cyber Cell in Siliguri Metropolitan Area established.  And only one cyber cell in North Bengal.  Jurisdiction of cyber cell:-  Entire Siliguri Commissioner Zone.  Other police station may also assist some cases over.
  • 11.  OTHER DATA:- In Northern India mostly affected areas of cyber crime are:-  Delhi.  Uttar Pradesh (Noida).  Jharkhand. • TYPES OF CRIMES: phishing crime: - means crime done by phone call (like SMS, Fake interview in phone). These types of crime are especially in Jharkhand. Net Banking and Online Job fraud: - are especially in U.P and DELHI.
  • 12. Conclusion The key to protecting yourself is being aware. Not all cybercriminals are “hackers.” There is a whole other world that exists in cyberspace…make sure that your information travels safely.