SlideShare a Scribd company logo
Subject - Cyber Laws & Rights
M. tech. 3rd Sem., ISM.
By: Prashant Vats,
M.tech., Ph.D.
INDIRA GANDHI DELHI TECHNICAL UNIVERSITY
FOR WOMEN
The Cyber Law Regime
in India
“Cyber Law” is a vast study
It is not the IT Act but, It includes, and is
comprised of many Acts, legislations like
Evidence, IPC & Cr.P.C.
The IT Act in itself, is a challenging study.
Understanding the difference between http &
https is beyond the comprehensive capacity for
any Lawyer.
Cyber forensic, Cyber security, Cyber law,
anatomy of cyber attacks
Law Practice
Cyber
Forensic,
FTK, EnCase,
Helix3 etc
Cyber
Security & IT
Evidence &
Investigation
Cyber Law
regime
Introduction
5
• The Information Technology Act is the Second
Law in India governing the field of
Technology.
• The First one was in the year 1885.
• That was the Indian Telegraph Act 1885
However, The first recorded
Cyber crime incident is
believed to be recorded in
the year 1820 !
• In the year 1820, Sir Joseph-Marie Jacquard, created
an automated loom.
• This device was blended with analogical technology in
the weaving of special fabrics.
• This resulted in a fear amongst Jacquard's employees
that their traditional employment and livelihood were
being threatened.
• They committed acts of sabotage to discourage
Jacquard from further use of the new technology.
• This was the first recorded cyber crime !
But why Cyber Law ?
Because :
9
• Cyber space is a completely different sphere
of human existence.
• No regards for any Government or territory.
• To facilitate international norms.
• Cyber Law needs to be specific.
• Conventional Laws will muddle up the cyber
law structure.
Intention of the IT Act 2000
• Intention of the IT Act 2000
The Act begins with :
“An Act to provide legal recognition for
transactions carried out by means of electronic
data interchange and other means of electronic
communication, commonly referred to as
"electronic commerce", which involve the use of
alternatives to paper-based methods of
communication and storage of information, to
facilitate electronic filing of documents with the
Government agencies…”
Evolution of the Act
• Evolution of the Act
• The General Assembly of the United Nations by its resolution
A/RES/51/162, dated the 30th January, 1997 had adopted the Model Law
on E - Commerce adopted by the UNCITRAL,
• UNCITRAL Model Law on International Commercial Arbitration (1985),
with amendments as adopted in 2006. The Model Law is designed to
assist States in reforming and modernizing their laws on arbitral
procedure so as to take into account the particular features and needs of
international commercial arbitration.
• The UNCITRAL Model Law on International Commercial Arbitration was
prepared by UNCITRAL, and adopted by the United Nations Commission
on International Trade Law on 21 June 1985.
• In 2006 the model law was amended, it now includes more detailed
provisions on interim measures.
• The said resolution recommended that all member States give favourable
consideration to the said Model Law when they enact or revise their laws,
in view of the need for uniformity of the law applicable to alternatives to
paper-based methods of communication and storage of information; i.e.
amongst member nations to promote international trade and commerce
via electronic means.
• Hence, the same was adopted and enforced in India.
Cyber Law in India
• Cyber Law in India
• Aided by many other Acts and Statutes.
• 1) The Indian Penal code
• 2) The Evidence Act
• 3) the code of Criminal procedure.
• & many others
The Information Technology Act
• The Information Technology Act
• The Act can be broadly classified into 3
aspects :
IT Act 2000
Administrative Civil Issues
Criminal and
penal
IT Act of 2000
14
ADMINISTRATIVE PART :
Recognizing e-commerce
Legal enforceability and authentication of
electronic - Documents
Methodology and process.
A special adjudicating officer & Cyber Law
Appellate Tribunal
Their role and duties therein.
IT Act 2000
• The CIVIL aspect
• Runs parallel to Administrative ventures of the
IT Act.
• Describes what constitutes civil infringement
of rights.
• Prescribes civil duties
• CRIMINAL Part
• Recognizes and provides for Penal measures
against crime in cyber space, digital crimes or
crime against computer resource.
• Related issues to redress, monitor, restrict,
investigate, cyber crime is also provided
herein.
IT Act 2000
IT Act 2000
Recognizes the Cardinal Philosophy of Cyber
disputes
1 ) Computers can be abused.
2 ) Computers are weapons as well as Victims.
Definition of a Computer
 Section 2 of the Act defines :
 (i)"computer" means any electronic magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory
functions by manipulations of electronic, magnetic or optical impulses, and
includes all input, output, processing, storage, computer software, or
communication facilities which are connected or related to the computer in a
computer system or computer network.
 (j) "computer network" means the interconnection of one or more computers
through—
○ (i) the use of satellite, microwave, terrestrial line
○ or other communication media; and
○ (ii) terminals or a complex consisting of two or more interconnected
computers whether or not the interconnection is continuously maintained;
 (k) "computer resource" means computer, computer system, computer network,
data, computer data base or software;
 (l) "computer system" means a device or collection of devices, including input and
output support devices and excluding calculators which are not programmable
and capable of being used in conjunction with external files, which contain
computer programmes, electronic instructions, input data and output data, that
performs logic, arithmetic, data storage and retrieval, communication control and
other functions;
The new amendment also defines :
• The new amendment also defines :
• Cyber Café (s 2 (na))
• Electronic signature (apart from DSC)
• Communication devices. (s 2 (ha))
• Cyber security (s 2 (nb))
• Indian CERT (s 70 B (1))
• Section 4- Legal recognition of
Electronic Records
• If any information is required in printed or
written form under any law the Information
provided in electronic form, which is accessible so
as to be usable for subsequent use, shall be
deemed to satisfy the requirement of presenting
the document in writing or printed form.
• A general provision for recognizing electronic
documents
• Section 4- Legal recognition of Electronic
Records
• If any information is required in printed or written form under
any law the Information provided in electronic form, which is
accessible so as to be usable for subsequent use, shall be
deemed to satisfy the requirement of presenting the document
in writing or printed form.
• A general provision for recognizing electronic documents
• Sections 5, 6, 7, 8, 9 & 10.
 5 - Legal recognition of electronic signatures
 6 - Use of e-Records & signatures in Government & Its Agencies
 7 and 7 (a)- Retention of Electronic Records & audits
 8 - Publications of rules and regulations in the e-Gazette.
 9 - no right to claim and insist on electronic documents
 10 – Central Govt retains the power to make rules w.r.t. e-
Signatures (type, manner, format & process)
• Sections 11, 12 – Receipt & Ack.
• Sec. 11 – discuss about the attributor(sender) of
electronic record i.e. sender himself, or by a
person authorised by the other, or by an auto
response duly programmed on behalf of the
other
• Sec. 12 – discuss receipt for acknowledgement
where nothing has been stipulated
• Any communication from addressee/automated or
otherwise.
• Any conduct of the addressee that proves sufficiently.
– However conditions may be imposed by the attributor
via e mail footer and statements therein
IT Act –overview of other relevant
admin. provisions
Sec. 16 Central Government to prescribe security
procedures !!!
Sec 17-34 Appointment and Regulation of Controller and
certifying authority
Sec 35 to 39 Obtaining Digital Signature Certificate
Sec 40 to 42 Duties of Subscriber of DSC- exercise due care to
retain the private key
• Administrative character
• Sec 44 : penalty for failure to furnish
information, return etc…
• Appointment and functions of Adjudicating
officer
• Powers and functioning of the Cyber Law
Appellate Tribunal
• Sec 61 : Civil Court excluded from jurisdiction.
• Sec 46 & 2(1)(c) : Adjudicating officer.
• Offences in a Gist
Sec 43 : earlier a simple civil provision
• Now a Civil, and may amount to a penal offence
u/s 66 if a fraudulent or dishonest mens rea (the
intention or knowledge of wrongdoing that
constitutes part of a crime, as opposed to the
action or conduct of the accused) is established !
• It relates to access to computer without the
permission of the computer owner
• It penalizes any sort of unauthorized access or
assistance
• Sec 43 in a nut shell
• Whoever without permission of owner of the computer
– Secures/Disrupts access of computer ..resource..network..
– Downloads, copies, extracts any data
– Introduces or causes to be introduced any viruses or
contaminant
– Damages or causes to be damaged any computer resource
• Destroy, alter, delete, add, modify or rearrange
• Change the format of a file
– Disrupts or causes disruption of any computer resource
• Preventing normal continuance of computer
• Sec 43A : Failure to protect Data
• Examples
• An employee authorized to access Word files,
accesses internet.
• A student inadvertently spreads a virus with
his USB Drive.
• A neighbor mistakenly chops off the internet
cable, expecting it to be an electric wire.
• Sec 65 : Tampering with Computer Source documents.
• Punishment – Imprisonment upto three years or fine
upto Rs 2 Lacs or both.
• Sec 66 : Penalises any contravention u/s 43 if carried
out with a fraudulent or dishonest motive
• Punishment – Imprisonment upto three years or fine
upto Rs 5 Lacs or both.
• Sec 66 A : Punishment for sending offensive messages
through communication service etc…
• Requisites : offensive or menacing or false, or for the
purpose of annoyance, inconvenience, ill will etc…
• Punishment – Imprisonment upto three years and with
fine.
• Sec 66 B : Punishment for dishonestly
receiving stolen computer/resource etc.
• Sec 66 C : Punishes identity theft (DSC,
passwords, or such unique identification.)
• Sec 66 D : Punishes personating, by means of
Computer resource.
• Sec 66 E : Punishes violation of privacy rights.
• Sec 66 F : Punishes Cyber Terrorism
• Sec 67A : Punishment for publishing or transmitting of material
containing sexually explicit act, etc.. In the electronic form.
• Punishment :
• 1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs.
• 2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs.
• EXCEPTION
• Art, Science, literature or other interests of learning and other cases
• Sec 67B : Punishment for publishing or transmitting of material depicting
children in sexually explicit act, etc.. In the electronic form. (Readwith
other sub rules)
• Punishment :
• 1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs.
• 2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs.
• Sec 67C : Preservation & retention of information by intermediaries.
• Punishment - Imprisonment upto three years and with fine.
• Sec 68 : Provision and punishment for
violation of orders from the Controller.
• Sec 69 : Powers of the Govt. to issue
direction for monitoring, intercepting or
decrypting any information through any
Computer Resource.
• (Basically an administrative right of the Govt. and provides for
punishment to the violator, usually intermediaries who are incharge of
such database or are service providers.)
• Sec 69 A powers for blocking of public access
• Sec 69 B power to authorize monitor and collect
traffic.
• Sec 71 : Penalty for Misrepresentation before the
Controller or the Certifying Authority
• Punishment - Imprisonment upto 2 years or fine upto Rs. 1
Lac or both.
• Sec 72 : Penalty for breach of Confidentiality & privacy, the
provision applies to those persons who are empowered
under this Act with such a database or records.
• Punishment - Imprisonment upto 2 years or fine upto Rs. 1
Lac or both.
• Sec 72A : Penalty for disclosure of information in breach of
Lawful Contract –(an amendment to include even the
employees of private organizations or such intermediaries
working therein)
• Punishment - Imprisonment upto 3 years or fine upto Rs. 5
Lac or both.
• Sec 74 : Publication of Signature or signature
certificates for fraudulent purpose.
• Punishment - Imprisonment upto 2 years or
fine upto Rs. 1 Lac or both.
• Sec 76 : provides for confiscation of any
related computer accessory, system part etc if
the same is believed to be used in any
violation of this Act or rules.
• Sec 77B: Offences punishable with
imprisonment upto 3 years to be bailable.
• Sec 78 : Power to investigate offences now
available to Inspector, earlier the onus was on
the DSP rank officer or above.
• Sec 79 : Exemption of Intermediaries and
service providers if they establish that they
have exercised due diligence on their part.
• An abusive provision for the ISP’s but often
helpful !
 The 2009 notification makes it an offence to even abet
or attempt a cyber crime, earlier unsuccessful
criminals always escaped by virtue of this grey area.
 Sec 84 B : Punishment for Abetment
 Same punishment as prescribed for the offence
 Sec 84 C :Punishment for attempt
 A maximum of one-half of the term of imprisonment
provided for the offence, or with fine as prescribed for
the offence or with both.
 Sec 90: State Govt. has powers to make allied rules.
The Indian Penal Code
Vis-à-vis
The Cyber Crime
Relevant application of IPC etc…
Sending threatening
messages by email
Sec 503 IPC
Sending defamatory
messages by email
Sec 499, 500 IPC
Forging electronic
records
Sec 463, 470, 471 IPC
Bogus websites, cyber
frauds
Sec 420 IPC
Email spoofing Sec 416, 417, 463 IPC
Online sale of Drugs NDPS Act
Web - Jacking Sec. 383 IPC
Online sale of Arms Arms Act
The Evidence Act
• The Evidence Act
• Evidence Act may be divided in four questions.
• Question 1 What is the Evidence given of?
• Answer 1 of Facts ("Issue of Facts" or "Relevant Facts")
• Question 2 How the Evidence of such Facts are Given
• Answer 2 The Evidence of Such Facts is Given Either by way of "Oral
Evidence" or "Documentary Evidence'
• Question 3 On whom does the Burden of proof lie?
• Answer 3 "Burden of Proof"(of particular fact) or "Onus of proof" (to
prove whole case) lies on the Prosecution incharge
• Question 4 What are the Evaluation of the Facts.
• Answer 4 The Evaluation is "Prove" or "Presumption"(of prove); The
fact is either 'proved','disproved', or 'Not proved'; or there may be
presumption that proof of facts "may presume', 'shall presume', or
'conclusive proof'.
• Filing an FIR is easy, but not chargesheet.
• Digital evidence is extremely volatile & difficult to preserve.
• Indian criminal justice system requires guilt to be proved beyond
reasonable doubt.
Evidence Act w.r.t. IT Act
The major highlight of the Evidence Act in view
of the IT Act 2000 is that it recognises electronic
evidence.
Sec 65 is the most important provision dealing
with specific provision on digital evidence.
Sec 65B provides for a detailed process for the
analysis of the digital evidence in question.
Sec 65 B (4) requires a certificate from the
examiner of digital evidence
Evidence Act w.r.t IT Act
• The Govt. shall notify who is the gazetted
examiner for Digital evidence u/s 79 A of the
IT Act.
• The same provision is exclusive, it excludes all
other Cyber Forensic experts from entering
this field u/s 45 of the Evidence Act.
Encase/FTK
• Encase is a online software toolkit is traditionally used
in forensics to recover evidence from seized hard
drives.
• Encase allows the investigator to conduct in depth
analysis of user files to collect evidence such as
documents, pictures, internet history and Windows
Registry information. The company also
offers EnCase training and certification.
• Forensic Toolkit, or FTK, is a computer forensics
software made by AccessData. It scans a hard drive
looking for various information. It can, for example,
locate deleted emails and scan a disk for text strings to
use them as a password dictionary to crack
encryption.
Is digital evidence binding upon courts ?
• Is EnCase/FTK approved by Central govt. for
this purpose?
• Is e-mail/sms admissible as evidence?
• Is data retrieved from remote servers
acceptable?
• Is EnCase/FTK approved by Central govt. for this purpose?
• Answer : It is not required, the testimony of such an evidence is viewed as a mere
opinion of the expert. Do not be confused for NIST(USA) Policy, although a standard
approval should help.
• Why does the United States need NIST?
• Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Department
of Commerce. NIST's mission is to promote U.S. innovation and industrial
competitiveness by advancing measurement science, standards, and technology in
ways that enhance economic security and improve our quality of life.
• What are the five elements of the NIST cyber security framework?
• Overview. This learning module takes a deeper look at the Cybersecurity
Framework's five Functions: Identify, Protect, Detect, Respond, and Recover. The
information presented here builds upon the material introduced in the Components
of the Framework module.
• Who needs NIST compliant?
• The NIST 800-171 Mandate
NIST 800-171 requires compliance by all subcontractors working within the federal
supply chain, whether they are subcontractors working for a prime or subcontractors
working for another subcontractor.
• What is the difference between ISO and NIST?
• Both the National Institute of Standards and Technology (NIST) and the International
Organization for Standardization (ISO) have industry-leading approaches to
information security. ... ISO 27001, on the other hand, is less technical and more risk
focused for organizations of all shapes and sizes.
Is e-mail/sms admissible as evidence?
• The position of electronic documents in the form of SMS, MMS
and E-mail in India is well demonstrated under the law and the
interpretation provided in various cases.
• In State of Delhi v. Mohd. Afzal & Others, it was held that
electronic records are admissible as evidence.
• If someone challenges the accuracy of a computer evidence or
electronic record on the grounds of misuse of system or operating
failure or interpolation, then the person challenging it must prove
the same beyond reasonable doubt.
• The court observed that mere theoretical and general
apprehensions cannot make clear evidence defective and in
admissible. This case has well demonstrated the admissibility of
electronic evidence in various forms in Indian courts.
Is data retrieved from remote servers
acceptable?
• Are call recordings admissible in court in India?
• In conclusion, phone audio recording is admissible as evidence in Courts under
section 65B of the Indian Evidence Act, 1872
• Can WhatsApp chat be used as evidence in court in India?
• The I-T Act recognises electronic communication as proof in court. Legal notice
or messages sent through WhatsApp messaging app are valid
legal evidence under law, and the blue tick over the messaging app is a
valid proof that the respondent has accepted the physical copies of the
communication, said Bombay High Court.
• Is email admissible as evidence?
• Work e-mails often fall under the business records exception of hearsay.
Sending an e-mail from work does not automatically make the evidence
admissible under a business record exception of hearsay, but it could
be admissible if the contents are within the scope of employment.
• How can email be investigated and used as evidence?
• E-mail forensic analysis is used to study the source and content of e-mail message
as evidence, identifying the actual sender, recipient and date and time it was sent,
etc. to collect credible evidence to bring criminals to justice.
Is data retrieved from remote servers
acceptable?
• In the age of digitisation and increasing reliance on computerised records in
judicial proceedings, the Supreme Court has held that the requirement of a
certificate to make an electronic evidence admissible is not mandatory "wherever
interest of justice so justifies".
• The top court's clarification on section 65B of Indian Evidence Act, which deals
with admissibility of electronic evidence in court proceedings, will have an impact
on criminal trials, where an increasing number of call details records, CCTV
footage, mobile video recordings and CDs are being relied upon.
• Interpreting section 65B(4) of the Evidence Act, a bench of Justices A K Goel and U
U Lalit said the provision should be applied only when such electronic evidence is
presented by a person who is in a position to produce such certificate.
• Section 65(B) of Indian Evidence Act says that electronic records needs to be
certified by a person occupying a responsible official position for being admissible
as evidence in any court proceedings.
• The top court, while examining the issue of video recording of crime scene in the
country, dealt with the question if electronic evidence can be admissible for
reliance in judicial proceedings.
• It said that if a person is not in a position to produce such certificate the provision
of 65B should not be applied.
Is data retrieved from remote servers
acceptable?
• Are call recordings admissible in court in India?
• In conclusion, phone audio recording is admissible as evidence in Courts under
section 65B of the Indian Evidence Act, 1872
• Can WhatsApp chat be used as evidence in court in India?
• The I-T Act recognises electronic communication as proof in court. Legal notice
or messages sent through WhatsApp messaging app are valid
legal evidence under law, and the blue tick over the messaging app is a
valid proof that the respondent has accepted the physical copies of the
communication, said Bombay High Court.
• Is email admissible as evidence?
• Work e-mails often fall under the business records exception of hearsay.
Sending an e-mail from work does not automatically make the evidence
admissible under a business record exception of hearsay, but it could
be admissible if the contents are within the scope of employment.
• How can email be investigated and used as evidence?
• E-mail forensic analysis is used to study the source and content of e-mail message
as evidence, identifying the actual sender, recipient and date and time it was sent,
etc. to collect credible evidence to bring criminals to justice.
Need of the hour to combat
cybercrime
• To strengthen investigation mechanism by
making it a quick response cell.
• Educate the IO’s, about handling & processing,
search & seizure.
• Advanced Lab with skilled personnel.
• YOU HAVE TO join hands with IT Professionals.
• Keep upgrading.
• Remember, It’s a white collar crime.
Thank you

More Related Content

What's hot

Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Cyber crime
Cyber crimeCyber crime
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
Vibhor Agarwal
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
Shrey Patel
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
Nayana Pingle
 
It act 2000
It act 2000It act 2000
It act 2000
Himal Rustagi
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
Ritu Gautam
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
Vishni Ganepola
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 

What's hot (20)

Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act 2000
It act 2000It act 2000
It act 2000
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
It act 2000
It act 2000It act 2000
It act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 

Similar to The Cyber Law Regime in India

Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
Maruthi N.E
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
barsha2011
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
SOMASUNDARAM T
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
Dr. Prashant Vats
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
Cyber crime
Cyber crimeCyber crime
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdf
DharmendraRai32
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
drsrivanicshod
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
Nadeem Kazi
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Jahid Khan Rahat
 
law.pptx
law.pptxlaw.pptx
law.pptx
monujangir2
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
priya rana
 

Similar to The Cyber Law Regime in India (20)

Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdf
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
law.pptx
law.pptxlaw.pptx
law.pptx
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 

More from Dr. Prashant Vats

Multiplexers
MultiplexersMultiplexers
Multiplexers
Dr. Prashant Vats
 
C lab programs
C lab programsC lab programs
C lab programs
Dr. Prashant Vats
 
Financial fucntions in ms e xcel
Financial fucntions in ms e xcelFinancial fucntions in ms e xcel
Financial fucntions in ms e xcel
Dr. Prashant Vats
 
4. text functions in excel
4. text functions in excel4. text functions in excel
4. text functions in excel
Dr. Prashant Vats
 
3. lookup functions in excel
3. lookup functions in excel3. lookup functions in excel
3. lookup functions in excel
Dr. Prashant Vats
 
2. date and time function in excel
2. date and time function in excel2. date and time function in excel
2. date and time function in excel
Dr. Prashant Vats
 
1. statistical functions in excel
1. statistical functions in excel1. statistical functions in excel
1. statistical functions in excel
Dr. Prashant Vats
 
3. subtotal function in excel
3. subtotal function in excel3. subtotal function in excel
3. subtotal function in excel
Dr. Prashant Vats
 
2. mathematical functions in excel
2. mathematical functions in excel2. mathematical functions in excel
2. mathematical functions in excel
Dr. Prashant Vats
 
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIARESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
Dr. Prashant Vats
 
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewIndia: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
Dr. Prashant Vats
 
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Dr. Prashant Vats
 
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Dr. Prashant Vats
 
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIAMETHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
Dr. Prashant Vats
 
Computer Software and Related IPR Issues
Computer Software and Related IPR Issues Computer Software and Related IPR Issues
Computer Software and Related IPR Issues
Dr. Prashant Vats
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Trademark Issues in cyberspace
Trademark Issues in cyberspace Trademark Issues in cyberspace
Trademark Issues in cyberspace
Dr. Prashant Vats
 
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Dr. Prashant Vats
 
How to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright actHow to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright act
Dr. Prashant Vats
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
Dr. Prashant Vats
 

More from Dr. Prashant Vats (20)

Multiplexers
MultiplexersMultiplexers
Multiplexers
 
C lab programs
C lab programsC lab programs
C lab programs
 
Financial fucntions in ms e xcel
Financial fucntions in ms e xcelFinancial fucntions in ms e xcel
Financial fucntions in ms e xcel
 
4. text functions in excel
4. text functions in excel4. text functions in excel
4. text functions in excel
 
3. lookup functions in excel
3. lookup functions in excel3. lookup functions in excel
3. lookup functions in excel
 
2. date and time function in excel
2. date and time function in excel2. date and time function in excel
2. date and time function in excel
 
1. statistical functions in excel
1. statistical functions in excel1. statistical functions in excel
1. statistical functions in excel
 
3. subtotal function in excel
3. subtotal function in excel3. subtotal function in excel
3. subtotal function in excel
 
2. mathematical functions in excel
2. mathematical functions in excel2. mathematical functions in excel
2. mathematical functions in excel
 
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIARESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
 
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewIndia: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
 
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
 
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
 
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIAMETHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
 
Computer Software and Related IPR Issues
Computer Software and Related IPR Issues Computer Software and Related IPR Issues
Computer Software and Related IPR Issues
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Trademark Issues in cyberspace
Trademark Issues in cyberspace Trademark Issues in cyberspace
Trademark Issues in cyberspace
 
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
 
How to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright actHow to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright act
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

The Cyber Law Regime in India

  • 1. Subject - Cyber Laws & Rights M. tech. 3rd Sem., ISM. By: Prashant Vats, M.tech., Ph.D. INDIRA GANDHI DELHI TECHNICAL UNIVERSITY FOR WOMEN
  • 2. The Cyber Law Regime in India
  • 3. “Cyber Law” is a vast study It is not the IT Act but, It includes, and is comprised of many Acts, legislations like Evidence, IPC & Cr.P.C. The IT Act in itself, is a challenging study. Understanding the difference between http & https is beyond the comprehensive capacity for any Lawyer. Cyber forensic, Cyber security, Cyber law, anatomy of cyber attacks
  • 4. Law Practice Cyber Forensic, FTK, EnCase, Helix3 etc Cyber Security & IT Evidence & Investigation Cyber Law regime
  • 5. Introduction 5 • The Information Technology Act is the Second Law in India governing the field of Technology. • The First one was in the year 1885. • That was the Indian Telegraph Act 1885
  • 6. However, The first recorded Cyber crime incident is believed to be recorded in the year 1820 !
  • 7. • In the year 1820, Sir Joseph-Marie Jacquard, created an automated loom. • This device was blended with analogical technology in the weaving of special fabrics. • This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. • They committed acts of sabotage to discourage Jacquard from further use of the new technology. • This was the first recorded cyber crime !
  • 9. Because : 9 • Cyber space is a completely different sphere of human existence. • No regards for any Government or territory. • To facilitate international norms. • Cyber Law needs to be specific. • Conventional Laws will muddle up the cyber law structure.
  • 10. Intention of the IT Act 2000 • Intention of the IT Act 2000 The Act begins with : “An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies…”
  • 11. Evolution of the Act • Evolution of the Act • The General Assembly of the United Nations by its resolution A/RES/51/162, dated the 30th January, 1997 had adopted the Model Law on E - Commerce adopted by the UNCITRAL, • UNCITRAL Model Law on International Commercial Arbitration (1985), with amendments as adopted in 2006. The Model Law is designed to assist States in reforming and modernizing their laws on arbitral procedure so as to take into account the particular features and needs of international commercial arbitration. • The UNCITRAL Model Law on International Commercial Arbitration was prepared by UNCITRAL, and adopted by the United Nations Commission on International Trade Law on 21 June 1985. • In 2006 the model law was amended, it now includes more detailed provisions on interim measures. • The said resolution recommended that all member States give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information; i.e. amongst member nations to promote international trade and commerce via electronic means. • Hence, the same was adopted and enforced in India.
  • 12. Cyber Law in India • Cyber Law in India • Aided by many other Acts and Statutes. • 1) The Indian Penal code • 2) The Evidence Act • 3) the code of Criminal procedure. • & many others
  • 13. The Information Technology Act • The Information Technology Act • The Act can be broadly classified into 3 aspects : IT Act 2000 Administrative Civil Issues Criminal and penal
  • 14. IT Act of 2000 14 ADMINISTRATIVE PART : Recognizing e-commerce Legal enforceability and authentication of electronic - Documents Methodology and process. A special adjudicating officer & Cyber Law Appellate Tribunal Their role and duties therein.
  • 15. IT Act 2000 • The CIVIL aspect • Runs parallel to Administrative ventures of the IT Act. • Describes what constitutes civil infringement of rights. • Prescribes civil duties
  • 16. • CRIMINAL Part • Recognizes and provides for Penal measures against crime in cyber space, digital crimes or crime against computer resource. • Related issues to redress, monitor, restrict, investigate, cyber crime is also provided herein. IT Act 2000
  • 17. IT Act 2000 Recognizes the Cardinal Philosophy of Cyber disputes 1 ) Computers can be abused. 2 ) Computers are weapons as well as Victims.
  • 18. Definition of a Computer  Section 2 of the Act defines :  (i)"computer" means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network.  (j) "computer network" means the interconnection of one or more computers through— ○ (i) the use of satellite, microwave, terrestrial line ○ or other communication media; and ○ (ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained;  (k) "computer resource" means computer, computer system, computer network, data, computer data base or software;  (l) "computer system" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions;
  • 19. The new amendment also defines : • The new amendment also defines : • Cyber Café (s 2 (na)) • Electronic signature (apart from DSC) • Communication devices. (s 2 (ha)) • Cyber security (s 2 (nb)) • Indian CERT (s 70 B (1))
  • 20. • Section 4- Legal recognition of Electronic Records • If any information is required in printed or written form under any law the Information provided in electronic form, which is accessible so as to be usable for subsequent use, shall be deemed to satisfy the requirement of presenting the document in writing or printed form. • A general provision for recognizing electronic documents
  • 21. • Section 4- Legal recognition of Electronic Records • If any information is required in printed or written form under any law the Information provided in electronic form, which is accessible so as to be usable for subsequent use, shall be deemed to satisfy the requirement of presenting the document in writing or printed form. • A general provision for recognizing electronic documents • Sections 5, 6, 7, 8, 9 & 10.  5 - Legal recognition of electronic signatures  6 - Use of e-Records & signatures in Government & Its Agencies  7 and 7 (a)- Retention of Electronic Records & audits  8 - Publications of rules and regulations in the e-Gazette.  9 - no right to claim and insist on electronic documents  10 – Central Govt retains the power to make rules w.r.t. e- Signatures (type, manner, format & process)
  • 22. • Sections 11, 12 – Receipt & Ack. • Sec. 11 – discuss about the attributor(sender) of electronic record i.e. sender himself, or by a person authorised by the other, or by an auto response duly programmed on behalf of the other • Sec. 12 – discuss receipt for acknowledgement where nothing has been stipulated • Any communication from addressee/automated or otherwise. • Any conduct of the addressee that proves sufficiently. – However conditions may be imposed by the attributor via e mail footer and statements therein
  • 23. IT Act –overview of other relevant admin. provisions Sec. 16 Central Government to prescribe security procedures !!! Sec 17-34 Appointment and Regulation of Controller and certifying authority Sec 35 to 39 Obtaining Digital Signature Certificate Sec 40 to 42 Duties of Subscriber of DSC- exercise due care to retain the private key
  • 24. • Administrative character • Sec 44 : penalty for failure to furnish information, return etc… • Appointment and functions of Adjudicating officer • Powers and functioning of the Cyber Law Appellate Tribunal • Sec 61 : Civil Court excluded from jurisdiction. • Sec 46 & 2(1)(c) : Adjudicating officer.
  • 25. • Offences in a Gist Sec 43 : earlier a simple civil provision • Now a Civil, and may amount to a penal offence u/s 66 if a fraudulent or dishonest mens rea (the intention or knowledge of wrongdoing that constitutes part of a crime, as opposed to the action or conduct of the accused) is established ! • It relates to access to computer without the permission of the computer owner • It penalizes any sort of unauthorized access or assistance
  • 26. • Sec 43 in a nut shell • Whoever without permission of owner of the computer – Secures/Disrupts access of computer ..resource..network.. – Downloads, copies, extracts any data – Introduces or causes to be introduced any viruses or contaminant – Damages or causes to be damaged any computer resource • Destroy, alter, delete, add, modify or rearrange • Change the format of a file – Disrupts or causes disruption of any computer resource • Preventing normal continuance of computer • Sec 43A : Failure to protect Data
  • 27. • Examples • An employee authorized to access Word files, accesses internet. • A student inadvertently spreads a virus with his USB Drive. • A neighbor mistakenly chops off the internet cable, expecting it to be an electric wire.
  • 28. • Sec 65 : Tampering with Computer Source documents. • Punishment – Imprisonment upto three years or fine upto Rs 2 Lacs or both. • Sec 66 : Penalises any contravention u/s 43 if carried out with a fraudulent or dishonest motive • Punishment – Imprisonment upto three years or fine upto Rs 5 Lacs or both. • Sec 66 A : Punishment for sending offensive messages through communication service etc… • Requisites : offensive or menacing or false, or for the purpose of annoyance, inconvenience, ill will etc… • Punishment – Imprisonment upto three years and with fine.
  • 29. • Sec 66 B : Punishment for dishonestly receiving stolen computer/resource etc. • Sec 66 C : Punishes identity theft (DSC, passwords, or such unique identification.) • Sec 66 D : Punishes personating, by means of Computer resource. • Sec 66 E : Punishes violation of privacy rights. • Sec 66 F : Punishes Cyber Terrorism
  • 30. • Sec 67A : Punishment for publishing or transmitting of material containing sexually explicit act, etc.. In the electronic form. • Punishment : • 1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs. • 2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs. • EXCEPTION • Art, Science, literature or other interests of learning and other cases • Sec 67B : Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc.. In the electronic form. (Readwith other sub rules) • Punishment : • 1st conviction-Imprisonment upto 5 years and fine upto Rs 10 Lacs. • 2nd conviction-Imprisonment upto 7 years and fine upto Rs 10 Lacs. • Sec 67C : Preservation & retention of information by intermediaries. • Punishment - Imprisonment upto three years and with fine.
  • 31. • Sec 68 : Provision and punishment for violation of orders from the Controller. • Sec 69 : Powers of the Govt. to issue direction for monitoring, intercepting or decrypting any information through any Computer Resource. • (Basically an administrative right of the Govt. and provides for punishment to the violator, usually intermediaries who are incharge of such database or are service providers.) • Sec 69 A powers for blocking of public access • Sec 69 B power to authorize monitor and collect traffic.
  • 32. • Sec 71 : Penalty for Misrepresentation before the Controller or the Certifying Authority • Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac or both. • Sec 72 : Penalty for breach of Confidentiality & privacy, the provision applies to those persons who are empowered under this Act with such a database or records. • Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac or both. • Sec 72A : Penalty for disclosure of information in breach of Lawful Contract –(an amendment to include even the employees of private organizations or such intermediaries working therein) • Punishment - Imprisonment upto 3 years or fine upto Rs. 5 Lac or both.
  • 33. • Sec 74 : Publication of Signature or signature certificates for fraudulent purpose. • Punishment - Imprisonment upto 2 years or fine upto Rs. 1 Lac or both. • Sec 76 : provides for confiscation of any related computer accessory, system part etc if the same is believed to be used in any violation of this Act or rules.
  • 34. • Sec 77B: Offences punishable with imprisonment upto 3 years to be bailable. • Sec 78 : Power to investigate offences now available to Inspector, earlier the onus was on the DSP rank officer or above.
  • 35. • Sec 79 : Exemption of Intermediaries and service providers if they establish that they have exercised due diligence on their part. • An abusive provision for the ISP’s but often helpful !
  • 36.  The 2009 notification makes it an offence to even abet or attempt a cyber crime, earlier unsuccessful criminals always escaped by virtue of this grey area.  Sec 84 B : Punishment for Abetment  Same punishment as prescribed for the offence  Sec 84 C :Punishment for attempt  A maximum of one-half of the term of imprisonment provided for the offence, or with fine as prescribed for the offence or with both.  Sec 90: State Govt. has powers to make allied rules.
  • 37. The Indian Penal Code Vis-à-vis The Cyber Crime
  • 38. Relevant application of IPC etc… Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forging electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 39. The Evidence Act • The Evidence Act • Evidence Act may be divided in four questions. • Question 1 What is the Evidence given of? • Answer 1 of Facts ("Issue of Facts" or "Relevant Facts") • Question 2 How the Evidence of such Facts are Given • Answer 2 The Evidence of Such Facts is Given Either by way of "Oral Evidence" or "Documentary Evidence' • Question 3 On whom does the Burden of proof lie? • Answer 3 "Burden of Proof"(of particular fact) or "Onus of proof" (to prove whole case) lies on the Prosecution incharge • Question 4 What are the Evaluation of the Facts. • Answer 4 The Evaluation is "Prove" or "Presumption"(of prove); The fact is either 'proved','disproved', or 'Not proved'; or there may be presumption that proof of facts "may presume', 'shall presume', or 'conclusive proof'. • Filing an FIR is easy, but not chargesheet. • Digital evidence is extremely volatile & difficult to preserve. • Indian criminal justice system requires guilt to be proved beyond reasonable doubt.
  • 40. Evidence Act w.r.t. IT Act The major highlight of the Evidence Act in view of the IT Act 2000 is that it recognises electronic evidence. Sec 65 is the most important provision dealing with specific provision on digital evidence. Sec 65B provides for a detailed process for the analysis of the digital evidence in question. Sec 65 B (4) requires a certificate from the examiner of digital evidence
  • 41. Evidence Act w.r.t IT Act • The Govt. shall notify who is the gazetted examiner for Digital evidence u/s 79 A of the IT Act. • The same provision is exclusive, it excludes all other Cyber Forensic experts from entering this field u/s 45 of the Evidence Act.
  • 42. Encase/FTK • Encase is a online software toolkit is traditionally used in forensics to recover evidence from seized hard drives. • Encase allows the investigator to conduct in depth analysis of user files to collect evidence such as documents, pictures, internet history and Windows Registry information. The company also offers EnCase training and certification. • Forensic Toolkit, or FTK, is a computer forensics software made by AccessData. It scans a hard drive looking for various information. It can, for example, locate deleted emails and scan a disk for text strings to use them as a password dictionary to crack encryption.
  • 43. Is digital evidence binding upon courts ? • Is EnCase/FTK approved by Central govt. for this purpose? • Is e-mail/sms admissible as evidence? • Is data retrieved from remote servers acceptable?
  • 44. • Is EnCase/FTK approved by Central govt. for this purpose? • Answer : It is not required, the testimony of such an evidence is viewed as a mere opinion of the expert. Do not be confused for NIST(USA) Policy, although a standard approval should help. • Why does the United States need NIST? • Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. • What are the five elements of the NIST cyber security framework? • Overview. This learning module takes a deeper look at the Cybersecurity Framework's five Functions: Identify, Protect, Detect, Respond, and Recover. The information presented here builds upon the material introduced in the Components of the Framework module. • Who needs NIST compliant? • The NIST 800-171 Mandate NIST 800-171 requires compliance by all subcontractors working within the federal supply chain, whether they are subcontractors working for a prime or subcontractors working for another subcontractor. • What is the difference between ISO and NIST? • Both the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO) have industry-leading approaches to information security. ... ISO 27001, on the other hand, is less technical and more risk focused for organizations of all shapes and sizes.
  • 45. Is e-mail/sms admissible as evidence? • The position of electronic documents in the form of SMS, MMS and E-mail in India is well demonstrated under the law and the interpretation provided in various cases. • In State of Delhi v. Mohd. Afzal & Others, it was held that electronic records are admissible as evidence. • If someone challenges the accuracy of a computer evidence or electronic record on the grounds of misuse of system or operating failure or interpolation, then the person challenging it must prove the same beyond reasonable doubt. • The court observed that mere theoretical and general apprehensions cannot make clear evidence defective and in admissible. This case has well demonstrated the admissibility of electronic evidence in various forms in Indian courts.
  • 46. Is data retrieved from remote servers acceptable? • Are call recordings admissible in court in India? • In conclusion, phone audio recording is admissible as evidence in Courts under section 65B of the Indian Evidence Act, 1872 • Can WhatsApp chat be used as evidence in court in India? • The I-T Act recognises electronic communication as proof in court. Legal notice or messages sent through WhatsApp messaging app are valid legal evidence under law, and the blue tick over the messaging app is a valid proof that the respondent has accepted the physical copies of the communication, said Bombay High Court. • Is email admissible as evidence? • Work e-mails often fall under the business records exception of hearsay. Sending an e-mail from work does not automatically make the evidence admissible under a business record exception of hearsay, but it could be admissible if the contents are within the scope of employment. • How can email be investigated and used as evidence? • E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice.
  • 47. Is data retrieved from remote servers acceptable? • In the age of digitisation and increasing reliance on computerised records in judicial proceedings, the Supreme Court has held that the requirement of a certificate to make an electronic evidence admissible is not mandatory "wherever interest of justice so justifies". • The top court's clarification on section 65B of Indian Evidence Act, which deals with admissibility of electronic evidence in court proceedings, will have an impact on criminal trials, where an increasing number of call details records, CCTV footage, mobile video recordings and CDs are being relied upon. • Interpreting section 65B(4) of the Evidence Act, a bench of Justices A K Goel and U U Lalit said the provision should be applied only when such electronic evidence is presented by a person who is in a position to produce such certificate. • Section 65(B) of Indian Evidence Act says that electronic records needs to be certified by a person occupying a responsible official position for being admissible as evidence in any court proceedings. • The top court, while examining the issue of video recording of crime scene in the country, dealt with the question if electronic evidence can be admissible for reliance in judicial proceedings. • It said that if a person is not in a position to produce such certificate the provision of 65B should not be applied.
  • 48. Is data retrieved from remote servers acceptable? • Are call recordings admissible in court in India? • In conclusion, phone audio recording is admissible as evidence in Courts under section 65B of the Indian Evidence Act, 1872 • Can WhatsApp chat be used as evidence in court in India? • The I-T Act recognises electronic communication as proof in court. Legal notice or messages sent through WhatsApp messaging app are valid legal evidence under law, and the blue tick over the messaging app is a valid proof that the respondent has accepted the physical copies of the communication, said Bombay High Court. • Is email admissible as evidence? • Work e-mails often fall under the business records exception of hearsay. Sending an e-mail from work does not automatically make the evidence admissible under a business record exception of hearsay, but it could be admissible if the contents are within the scope of employment. • How can email be investigated and used as evidence? • E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice.
  • 49. Need of the hour to combat cybercrime • To strengthen investigation mechanism by making it a quick response cell. • Educate the IO’s, about handling & processing, search & seizure. • Advanced Lab with skilled personnel. • YOU HAVE TO join hands with IT Professionals. • Keep upgrading. • Remember, It’s a white collar crime.