SlideShare a Scribd company logo
1 of 54
Download to read offline
1
INTRODUCTION TO
INTRODUCTION TO
CYBER LAW
CYBER LAW
MODULE NO 4
The Concept of Cyberspace
BY
UMAKANT BHASKAR GOHATRE
Smt. Indira Gandhi College of Engineering
INTR ODUC TION
 Pre 1990: People are not connected
Pre 1990: People are not connected
 1990: Connecting People to Information
1990: Connecting People to Information
 2000: Connecting People to People
2000: Connecting People to People
 2010: Everything is connected
2010: Everything is connected
 We are now living in e-world… dominated by
numbers of “e”.
 e-friend…e-music…e-network…e-ticket…e-
commerce… and very soon e-service of notice in
commercial matters of our supreme court.
 Recently, our Supreme Court had decided to serve
email notice in commercial matters in addition to
the regular notice by R. P. A. D. in order to cut
down the delay in the servicing notice.
 In my opinion, right to life includes right to e-life.
 Technology is growing at lightening speed. While
the technology brings lot of good things, it also
brings equal amount of risks and challenges.
 Every day, we read in the newspapers about the
various cyber crimes, like Credit card cloning,
spoofing, phishing, stalking, etc.
 Some of the youngsters indulge in misusing the
technology and get caught by the Police
Authorities.
 A recent study revealed that 80 percent of the
cyber crimes in the Corporate Houses are
committed by the ‘insiders’.
 More than 95 percent of the cases do not get
reported to the Police Authorities.
 Only 3% of cyber crime complaints filed in
Mumbai are being converted in FIR.
CYBERSPACE
 Cyberspace is the electronic medium of
computer networks, in which online
communication takes place.
 It is readily identified with the interconnected
information technology required to achieve the
wide range of system capabilities associated with
the transport of communication and control
products and services.
 The term “cyberspace” was first used by
the cyberpunk science fiction author William
Gibson.
 Now, the term has become a conventional means
to describe anything associated with computers,
information technology, the internet and the
diverse internet culture.
 Cyberspace includes
Cyberspace includes
◦ The Internet, websites
The Internet, websites
◦ computers, networks
computers, networks
◦ software, data storage devices, emails
software, data storage devices, emails
◦ electronic devices (cell phones, ATM machines etc)
electronic devices (cell phones, ATM machines etc)
 Cyber Law governs cyberspace
Cyber Law governs cyberspace
 Cyber space is an intangible and provides
Cyber space is an intangible and provides
an extreme mobility
an extreme mobility
◦ events taking place on the internet are not happening in
events taking place on the internet are not happening in
the locations where participants or servers are physically
the locations where participants or servers are physically
located, but "in cyberspace".
located, but "in cyberspace".
 Cyber space offers great economic
Cyber space offers great economic
efficiency.
efficiency.
◦ Billions of dollars worth of software can be traded over
the Internet without the need for any government
licenses, shipping and handling charges and without
paying any customs duty.
 Cyber space has Complete disrespect for
Cyber space has Complete disrespect for
national boundaries.
national boundaries.
◦ A person in India could break into a bank’s electronic
vault hosted on a computer in USA and transfer millions
of Rupees to another bank in Switzerland, all within
minutes. All he would need is a laptop computer and a
cell phone.
 Cyber space is absolutely open to
Cyber space is absolutely open to
participation by all.
participation by all.
◦ A ten year-old to an eighty year-old grand mother
without any regard for the distance or the anonymity
between them.
 Cyber space offers enormous potential for
Cyber space offers enormous potential for
anonymity to its members.
anonymity to its members.
◦ "On the Internet, nobody knows you're a dog" is an
adage which began as the caption of a cartoon by Peter
Steiner published by The New Yorker on July 5, 1993.
◦ The cartoon features two dogs: one sitting on a chair in
front of a computer, speaking the caption to a second
dog sitting on the floor.
◦ http://www.unc.edu/depts/jomc/academics/dri/idog.html
 On the Internet, it is very easier to create several
On the Internet, it is very easier to create several
copies and transmitting the same in different
copies and transmitting the same in different
locations of world in few minutes. For these
locations of world in few minutes. For these
reasons, the Internet has been described as “the
reasons, the Internet has been described as “the
world’s biggest copy machine”.
world’s biggest copy machine”.
 “
“It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
 The IT Act gives legal recognition to electronic records
and digital and electronic signature.
 Where any law provides that information or any other
matter shall be authenticated by affixing the signature or
any document should be signed or bear the signature of
any person then, notwithstanding anything contained in
such law, such requirement shall be deemed to have been
satisfied, if such information or matter is authenticated by
means of electronic/digital signature affixed in such
manner as may be prescribed by the Central Government.
 Use of Electronic Records and Electronic Signature in
Government and its agencies
Penalty, C ompensation
and Offences
22
 If any person without permission of the owner
or any other person who is in charge of a
computer, computer system or computer
network -
◦ (a) to (j)
 Then he shall be liable to pay unlimited
damages to affected the person.
If any person, dishonestly or fraudulently, does any
act referred to in section 43,
Punishment: Jailed upto three years and/or fine upto five
lakh rupees.
Dishonestly- the intention of causing wrongful gain to
one person or wrongful loss to another person
Fraudulently – the intention to defraud but not
otherwise
 If any person without permission of the owner or any
other person who is in charge of a computer, computer
system or computer network -
◦(a) accesses or secures access
to such computer, computer system
or computer network or computer
resource
 Access means
 Gaining entry into,
 Instructing with the logical, arithmetical, or
memory function resources of
 Communicating with the logical,
arithmetical, or memory function resources
of
a computer, computer system or computer
network (widely defined to cover every with a
 Access means
 Gaining entry into a computer, computer
system or computer network (widely defined
to cover
 Applies to physical access too
 Examples
 Unauthorized access to a room storing a
server/super computers
 Unscrews the cabinet of computer
 Access means
 Instructing or communicating with the
logical, arithmetical, or memory function
resources of a computer, computer system
or computer network (widely defined to cover
 Instructing means giving order or directing
(one way process)
 Communicating means exchange of
information (one way process)
 Examples (instructing or communicating )
 Remotely shutting down computer by sending SMS
 Port scanning??
A port scanner is a software application designed to
probe a server or host for open ports. This is often used
by administrators to verify security policies of
their networks and by attackers to identify running
services on a host with the view to compromise it.
 Section 43 (a) covers access or secures access
◦ Secure means to make certain
 To make certain that access can be achieved as
and when desired by the person seeking to
access.
 Example
 X, network administrator of ABC Limited, stores
passwords of main servers in his personal laptop. Y,
a friend of X, with X permission, access X’s laptop
and note down passwords of main server. Y secured
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
◦ (g) provides any assistance to any
person to facilitate access to a
computer, computer system or
computer network in contravention of
the provisions of this Act, rules or
regulations made thereunder,
 Assistances – is act of helping or aiding
 Facilitate – to make easier or to make less
difficult or to assist in the progress of…
 Examples
 Handing over password by the existing officer
 Deliberately ignoring warnings of IDS
 Putting firewall on disable mode
 Secured access or attempts to secure access to a
protected system
 Punishment : jailed upto 10 years and/or fine
 Protected system declared by the Government
 Examples: Computers of India Army, Mumbai Police,
Forest Dept of Government etc.
 Examples (attempts)
 Unsuccessful attempt to break password
 Unsuccessful DOS attack
 Unsuccessful attempt to send a Trojan
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
◦ (b) downloads, copies or extracts
any data, computer data base or
information from such computer,
computer system or computer network
including information or data held or
stored in any removable storage
 To download is to transfer information from one
computer to another
 To copy is to imitate or reproduce an exact
replica of the original
 To extract is to take out, distil, deduce, derive or
quote from any source
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
◦ (c) introduces or causes to be introduced
any computer contaminant or computer
virus into any computer, computer
system or computer network;
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network –
◦ (d) damages or causes to be
damaged any computer, computer
system or computer network, data,
computer data base or any other
programmes residing in such computer,
computer system or computer network;
 Damage means to destroy, alter, delete, add,
modify or rearrange any computer resource by
any means
 Examples
 Changing an image from .gif format to .jpg format
 Deleting/changing of code/URL/ excel file
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
◦ (e) disrupts or causes disruption of any
computer, computer system or
computer network;
 Disruption- could be total or partial
 To prevent the normal continuance of
 To throw into confusion or disorder
 To interupt or impede the progress of
 Examples of Disruption
 Spreading worms in a global network…
slowing down of the network
 Switching off the wi-fi modem
 Using the slow internet connection for heavy
download…it is not available to other
legitimate users.
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
◦(f) denies or causes the denial of
access to any person authorised to
access any computer, computer
system or computer network by any
means;
◦ Examples: DOS and DDOS attacks
 If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
◦ (h) charges the services availed of by a
person to the account of another person
by tampering with or manipulating
any computer, computer system, or
computer network,
◦ Examples: internet time theft, misuse of
credit card etc
 If any person without permission of the owner or
any other person who is incharge of a computer,
computer system or computer network -
◦ (j) Steals, conceals, destroys or
alters or causes any person to
steal, conceal, destroy or alter any
computer source code used for a
computer resource with an intention to
cause damage,
 Any person knowingly or intentionally
conceals, destroys or alters or
intentionally or knowingly causes
another to conceal, destroy or alter
◦ any computer source code used for a computer,
computer programme, computer system or computer
network, when the computer source code is required
to be kept or maintained by law for the time being in
force,
 Punishment: jailed up to three years and/or fine up to two lakh rupees.
 Case-Law: Syed Asifuddin & others v/s State of A. P
 Where a body corporate, possessing, dealing or
handling any sensitive personal data or
information in a computer resource which it
owns, controls or operates, is negligent in
implementing and maintaining reasonable
security practices and procedures and
thereby causes wrongful loss or wrongful gain to
any person, such body corporate shall be liable to
pay damages by way of compensation, to the
person so affected.
 Save as otherwise provided in this Act or any other law
for the time being in force, any person including an
intermediary who,
◦ while providing services under the terms of lawful contract,
◦ has secured access to any material containing personal
information about another person,
◦ with the intent to cause or knowing that he is likely to
cause wrongful loss or wrongful gain
◦ discloses, without the consent of the person concerned,
or in breach of a lawful contract, such material to any
other person,
 Punishment: Jailed upto three years, or/and fine upto
five lakh rupees
 Any person who sends, by means of a computer
resource or a communication device,-
◦ a) any information that is grossly offensive or
has menacing character; or
 Punishment: Jailed upto three years, or/and
fine
 Any person who sends, by means of a computer
resource or a communication device,-
◦
◦ b) any information which he knows to be false,
but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult,
injury, criminal intimidation, enmity, hatred,
or ill will, persistently makes by making use of
such computer resource or a communication
device,
 Any person who sends, by means of a computer
resource or a communication device,-
◦ c) any electronic mail or electronic mail
message for the purpose of causing
annoyance or inconvenience or to deceive or
to mislead the addressee or recipient about
the origin of such messages
 Punishment: Jailed upto three years, or/and
fine
 67. Punishment for publishing or transmitting
obscene material in electronic form
 67 A Punishment for publishing or transmitting of
material containing sexually explicit act, etc. in
electronic form
 67 B Punishment for publishing or transmitting of
material depicting children in sexually explicit
act, etc. in electronic form
 If any person, intentionally or knowingly captures,
publishes or transmits the image of a private area
of any person without his or her consent, under
circumstances violating the privacy of that
person,
◦ Punishment: Jailed upto three years, or/and fine upto
two lakhs
 “private area” means the naked or undergarment
clad genitals, pubic area, buttocks or female
breast
 66 B. Punishment for dishonestly receiving stolen
computer resource or communication device
 66C. Punishment for identity theft
 66D. Punishment for cheating by personation by
using computer resource
 66F. Punishment for cyber terrorism
 Sec 75 Act to apply for offence or contraventions
committed outside India by any person
irrespective of his nationality.
 if the act or conduct constituting the offence or
contravention involves a computer, computer
system or computer network located in India.
1.
1. PReSENSE, Issue No 32 – Oct 2008
PReSENSE, Issue No 32 – Oct 2008
(http://www.primepointfoundation.org/presense/presense1008.pdf accessed on
(http://www.primepointfoundation.org/presense/presense1008.pdf accessed on
27-09-2009)
27-09-2009)
2.
2. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws
Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws
(http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf
(http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf
accessed on 27-09-2009)
accessed on 27-09-2009)
3.
3. A False Bargain: The Los Angeles County Economic consequences of counterfeit
A False Bargain: The Los Angeles County Economic consequences of counterfeit
Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya
Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya
(February 2007)
(February 2007)
4.
4. “
“It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
5.
5. Wikipedia
Wikipedia
http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog
http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog
(Accessed on 15-09-2010)
(Accessed on 15-09-2010)
http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011)
8.
8. presentation on Digital DNA & Digital Augmentation (how technology and new
presentation on Digital DNA & Digital Augmentation (how technology and new
economic force are changing business) by Martin Deinoff
economic force are changing business) by Martin Deinoff
(http://www.slideshare.net/MartinDeinoff/digital-dna-digital-
(http://www.slideshare.net/MartinDeinoff/digital-dna-digital-
Thank You
Thank You
Adv. DIPAK G. PARMAR
Adv. DIPAK G. PARMAR
Dipak@Cyber-IPR.com
Dipak@Cyber-IPR.com
09820196971
09820196971

More Related Content

What's hot

Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Penology and Victimology.pptx
Penology and Victimology.pptxPenology and Victimology.pptx
Penology and Victimology.pptxPushpaHanumaiah1
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Important Provisions on Legal Services Authorities Act
Important Provisions on Legal Services Authorities Act Important Provisions on Legal Services Authorities Act
Important Provisions on Legal Services Authorities Act Dr. Kalpeshkumar L Gupta
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international lawcarolineelias239
 
Code of civil procedure 1908 suits in particular cases pptx
Code of civil procedure 1908 suits in particular cases pptxCode of civil procedure 1908 suits in particular cases pptx
Code of civil procedure 1908 suits in particular cases pptxDr. Vikas Khakare
 
Code of civil procedure 1908 appeals
Code of civil procedure 1908 appealsCode of civil procedure 1908 appeals
Code of civil procedure 1908 appealsDr. Vikas Khakare
 
Cpc smart notes
Cpc   smart notesCpc   smart notes
Cpc smart notesgurlguru
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in Indiashamvisingh
 
Christian Law of Succession
Christian Law of SuccessionChristian Law of Succession
Christian Law of SuccessionRahul Yadav
 
Trial before a court of session
Trial before a court of session Trial before a court of session
Trial before a court of session Nitish Nawsagaray
 
Legitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International LawLegitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International Lawcarolineelias239
 
Family Court Act,1984
Family Court Act,1984Family Court Act,1984
Family Court Act,1984Rashmi Dubey
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 

What's hot (20)

Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Penology and Victimology.pptx
Penology and Victimology.pptxPenology and Victimology.pptx
Penology and Victimology.pptx
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Important Provisions on Legal Services Authorities Act
Important Provisions on Legal Services Authorities Act Important Provisions on Legal Services Authorities Act
Important Provisions on Legal Services Authorities Act
 
The advocates act, 1961
The advocates act, 1961The advocates act, 1961
The advocates act, 1961
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international law
 
Code of civil procedure 1908 suits in particular cases pptx
Code of civil procedure 1908 suits in particular cases pptxCode of civil procedure 1908 suits in particular cases pptx
Code of civil procedure 1908 suits in particular cases pptx
 
Code of civil procedure 1908 appeals
Code of civil procedure 1908 appealsCode of civil procedure 1908 appeals
Code of civil procedure 1908 appeals
 
Cpc smart notes
Cpc   smart notesCpc   smart notes
Cpc smart notes
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
Christian Law of Succession
Christian Law of SuccessionChristian Law of Succession
Christian Law of Succession
 
Trial before a court of session
Trial before a court of session Trial before a court of session
Trial before a court of session
 
Legitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International LawLegitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International Law
 
Family Court Act,1984
Family Court Act,1984Family Court Act,1984
Family Court Act,1984
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 

Similar to Introduction to Cyber Law

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Part-A An Overview of Cyber Law.pdf
Part-A An Overview of Cyber Law.pdfPart-A An Overview of Cyber Law.pdf
Part-A An Overview of Cyber Law.pdfSunilSaklani6
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 

Similar to Introduction to Cyber Law (20)

Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Part-A An Overview of Cyber Law.pdf
Part-A An Overview of Cyber Law.pdfPart-A An Overview of Cyber Law.pdf
Part-A An Overview of Cyber Law.pdf
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 

More from Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai

More from Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai (20)

Artificial Intelligence (AI) application in Agriculture Area
Artificial Intelligence (AI) application in Agriculture Area Artificial Intelligence (AI) application in Agriculture Area
Artificial Intelligence (AI) application in Agriculture Area
 
VLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
VLSI Design Book CMOS_Circuit_Design__Layout__and_SimulationVLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
VLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
 
Question Bank: Network Management in Telecommunication
Question Bank: Network Management in TelecommunicationQuestion Bank: Network Management in Telecommunication
Question Bank: Network Management in Telecommunication
 
LRU_Replacement-Policy.pdf
LRU_Replacement-Policy.pdfLRU_Replacement-Policy.pdf
LRU_Replacement-Policy.pdf
 
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdfNetwork Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
 
Euler Method Details
Euler Method Details Euler Method Details
Euler Method Details
 
Mini Project fo BE Engineering students
Mini Project fo BE Engineering  students  Mini Project fo BE Engineering  students
Mini Project fo BE Engineering students
 
Mini Project for Engineering Students BE or Btech Engineering students
Mini Project for Engineering Students BE or Btech Engineering students Mini Project for Engineering Students BE or Btech Engineering students
Mini Project for Engineering Students BE or Btech Engineering students
 
Ballistics Detsils
Ballistics Detsils Ballistics Detsils
Ballistics Detsils
 
VLSI Design_LAB MANUAL By Umakant Gohatre
VLSI Design_LAB MANUAL By Umakant GohatreVLSI Design_LAB MANUAL By Umakant Gohatre
VLSI Design_LAB MANUAL By Umakant Gohatre
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...
 
Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...
 
Python overview
Python overviewPython overview
Python overview
 
Python numbers
Python numbersPython numbers
Python numbers
 
Python networking
Python networkingPython networking
Python networking
 
Python multithreading
Python multithreadingPython multithreading
Python multithreading
 
Python modules
Python modulesPython modules
Python modules
 
Python loops
Python loopsPython loops
Python loops
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 

Introduction to Cyber Law

  • 1. 1 INTRODUCTION TO INTRODUCTION TO CYBER LAW CYBER LAW MODULE NO 4 The Concept of Cyberspace BY UMAKANT BHASKAR GOHATRE Smt. Indira Gandhi College of Engineering
  • 3.  Pre 1990: People are not connected Pre 1990: People are not connected  1990: Connecting People to Information 1990: Connecting People to Information  2000: Connecting People to People 2000: Connecting People to People  2010: Everything is connected 2010: Everything is connected
  • 4.
  • 5.
  • 6.
  • 7.  We are now living in e-world… dominated by numbers of “e”.  e-friend…e-music…e-network…e-ticket…e- commerce… and very soon e-service of notice in commercial matters of our supreme court.  Recently, our Supreme Court had decided to serve email notice in commercial matters in addition to the regular notice by R. P. A. D. in order to cut down the delay in the servicing notice.  In my opinion, right to life includes right to e-life.
  • 8.
  • 9.  Technology is growing at lightening speed. While the technology brings lot of good things, it also brings equal amount of risks and challenges.  Every day, we read in the newspapers about the various cyber crimes, like Credit card cloning, spoofing, phishing, stalking, etc.  Some of the youngsters indulge in misusing the technology and get caught by the Police Authorities.
  • 10.  A recent study revealed that 80 percent of the cyber crimes in the Corporate Houses are committed by the ‘insiders’.  More than 95 percent of the cases do not get reported to the Police Authorities.  Only 3% of cyber crime complaints filed in Mumbai are being converted in FIR.
  • 12.  Cyberspace is the electronic medium of computer networks, in which online communication takes place.  It is readily identified with the interconnected information technology required to achieve the wide range of system capabilities associated with the transport of communication and control products and services.  The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson.
  • 13.  Now, the term has become a conventional means to describe anything associated with computers, information technology, the internet and the diverse internet culture.  Cyberspace includes Cyberspace includes ◦ The Internet, websites The Internet, websites ◦ computers, networks computers, networks ◦ software, data storage devices, emails software, data storage devices, emails ◦ electronic devices (cell phones, ATM machines etc) electronic devices (cell phones, ATM machines etc)  Cyber Law governs cyberspace Cyber Law governs cyberspace
  • 14.  Cyber space is an intangible and provides Cyber space is an intangible and provides an extreme mobility an extreme mobility ◦ events taking place on the internet are not happening in events taking place on the internet are not happening in the locations where participants or servers are physically the locations where participants or servers are physically located, but "in cyberspace". located, but "in cyberspace".  Cyber space offers great economic Cyber space offers great economic efficiency. efficiency. ◦ Billions of dollars worth of software can be traded over the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.
  • 15.  Cyber space has Complete disrespect for Cyber space has Complete disrespect for national boundaries. national boundaries. ◦ A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone.
  • 16.  Cyber space is absolutely open to Cyber space is absolutely open to participation by all. participation by all. ◦ A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  • 17.
  • 18.  Cyber space offers enormous potential for Cyber space offers enormous potential for anonymity to its members. anonymity to its members. ◦ "On the Internet, nobody knows you're a dog" is an adage which began as the caption of a cartoon by Peter Steiner published by The New Yorker on July 5, 1993. ◦ The cartoon features two dogs: one sitting on a chair in front of a computer, speaking the caption to a second dog sitting on the floor. ◦ http://www.unc.edu/depts/jomc/academics/dri/idog.html
  • 19.  On the Internet, it is very easier to create several On the Internet, it is very easier to create several copies and transmitting the same in different copies and transmitting the same in different locations of world in few minutes. For these locations of world in few minutes. For these reasons, the Internet has been described as “the reasons, the Internet has been described as “the world’s biggest copy machine”. world’s biggest copy machine”.  “ “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
  • 20.  The IT Act gives legal recognition to electronic records and digital and electronic signature.  Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of electronic/digital signature affixed in such manner as may be prescribed by the Central Government.  Use of Electronic Records and Electronic Signature in Government and its agencies
  • 22. 22  If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - ◦ (a) to (j)  Then he shall be liable to pay unlimited damages to affected the person.
  • 23. If any person, dishonestly or fraudulently, does any act referred to in section 43, Punishment: Jailed upto three years and/or fine upto five lakh rupees. Dishonestly- the intention of causing wrongful gain to one person or wrongful loss to another person Fraudulently – the intention to defraud but not otherwise
  • 24.  If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - ◦(a) accesses or secures access to such computer, computer system or computer network or computer resource
  • 25.  Access means  Gaining entry into,  Instructing with the logical, arithmetical, or memory function resources of  Communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover every with a
  • 26.  Access means  Gaining entry into a computer, computer system or computer network (widely defined to cover  Applies to physical access too  Examples  Unauthorized access to a room storing a server/super computers  Unscrews the cabinet of computer
  • 27.  Access means  Instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover  Instructing means giving order or directing (one way process)  Communicating means exchange of information (one way process)
  • 28.  Examples (instructing or communicating )  Remotely shutting down computer by sending SMS  Port scanning?? A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.
  • 29.  Section 43 (a) covers access or secures access ◦ Secure means to make certain  To make certain that access can be achieved as and when desired by the person seeking to access.  Example  X, network administrator of ABC Limited, stores passwords of main servers in his personal laptop. Y, a friend of X, with X permission, access X’s laptop and note down passwords of main server. Y secured
  • 30.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦ (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder,
  • 31.  Assistances – is act of helping or aiding  Facilitate – to make easier or to make less difficult or to assist in the progress of…  Examples  Handing over password by the existing officer  Deliberately ignoring warnings of IDS  Putting firewall on disable mode
  • 32.  Secured access or attempts to secure access to a protected system  Punishment : jailed upto 10 years and/or fine  Protected system declared by the Government  Examples: Computers of India Army, Mumbai Police, Forest Dept of Government etc.  Examples (attempts)  Unsuccessful attempt to break password  Unsuccessful DOS attack  Unsuccessful attempt to send a Trojan
  • 33.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦ (b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage
  • 34.  To download is to transfer information from one computer to another  To copy is to imitate or reproduce an exact replica of the original  To extract is to take out, distil, deduce, derive or quote from any source
  • 35.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦ (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
  • 36.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network – ◦ (d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;
  • 37.  Damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means  Examples  Changing an image from .gif format to .jpg format  Deleting/changing of code/URL/ excel file
  • 38.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦ (e) disrupts or causes disruption of any computer, computer system or computer network;  Disruption- could be total or partial  To prevent the normal continuance of  To throw into confusion or disorder  To interupt or impede the progress of
  • 39.  Examples of Disruption  Spreading worms in a global network… slowing down of the network  Switching off the wi-fi modem  Using the slow internet connection for heavy download…it is not available to other legitimate users.
  • 40.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦(f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; ◦ Examples: DOS and DDOS attacks
  • 41.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦ (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, ◦ Examples: internet time theft, misuse of credit card etc
  • 42.  If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - ◦ (j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage,
  • 43.  Any person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter ◦ any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force,  Punishment: jailed up to three years and/or fine up to two lakh rupees.  Case-Law: Syed Asifuddin & others v/s State of A. P
  • 44.  Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.
  • 45.  Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, ◦ while providing services under the terms of lawful contract, ◦ has secured access to any material containing personal information about another person, ◦ with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain ◦ discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person,  Punishment: Jailed upto three years, or/and fine upto five lakh rupees
  • 46.  Any person who sends, by means of a computer resource or a communication device,- ◦ a) any information that is grossly offensive or has menacing character; or  Punishment: Jailed upto three years, or/and fine
  • 47.  Any person who sends, by means of a computer resource or a communication device,- ◦ ◦ b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device,
  • 48.  Any person who sends, by means of a computer resource or a communication device,- ◦ c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages  Punishment: Jailed upto three years, or/and fine
  • 49.  67. Punishment for publishing or transmitting obscene material in electronic form  67 A Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form  67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
  • 50.  If any person, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, ◦ Punishment: Jailed upto three years, or/and fine upto two lakhs  “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast
  • 51.  66 B. Punishment for dishonestly receiving stolen computer resource or communication device  66C. Punishment for identity theft  66D. Punishment for cheating by personation by using computer resource  66F. Punishment for cyber terrorism
  • 52.  Sec 75 Act to apply for offence or contraventions committed outside India by any person irrespective of his nationality.  if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.
  • 53. 1. 1. PReSENSE, Issue No 32 – Oct 2008 PReSENSE, Issue No 32 – Oct 2008 (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on 27-09-2009) 27-09-2009) 2. 2. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) accessed on 27-09-2009) 3. 3. A False Bargain: The Los Angeles County Economic consequences of counterfeit A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) (February 2007) 4. 4. “ “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). 5. 5. Wikipedia Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-2010) (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011) 8. 8. presentation on Digital DNA & Digital Augmentation (how technology and new presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital- (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-
  • 54. Thank You Thank You Adv. DIPAK G. PARMAR Adv. DIPAK G. PARMAR Dipak@Cyber-IPR.com Dipak@Cyber-IPR.com 09820196971 09820196971