Presentation is loading. Please wait.

Presentation is loading. Please wait.

0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Cyber Law And Ethics And Ethics.

Similar presentations


Presentation on theme: "0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Cyber Law And Ethics And Ethics."— Presentation transcript:

1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Cyber Law And Ethics And Ethics

2 Members 56- Shoaib 57- 58-Durgesh 59-Shubham 60-Pradum 61-Ashish 62-Sumita 63-Zahid 64-Parag 65-Komal 66-Nahida 67-Shoaib 68-Mahesh 69- 70-Hashim

3 Cyber Law 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Cyber law And Its Advantages

4 When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence the need for Cyberlaws in India. Cyber Law

5 Advantages Of Cyber Law * From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e- businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. * Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. * Digital signatures have been given legal validity and sanction in the Act. * The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. * The Act now allows Government to issue notification on the web thus heralding e- governance. * The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government.

6 Continue * The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government.* The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date. * Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and cause loss.

7 Cyber Crime Cyber crime encompasses any criminal act dealing with computers and networks (called Hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

8 Cyber Crimes In India From 2007 - 2010

9 Cyber Crime Government Websites Hacked

10 I.T. Act 2000 The Information Technology act, 2000 received the assent of president of India on 9 June 2000 and came into force from 17 October in that same year.The act was enacted to provide legal recognition for transaction carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “Electronic Commerce”, to facilitate electronic filling of documents with governments agencies which involve the use of alternative to paper based method of communication and storage information This law applies to any kind of information in the form of data message used in the context of commercial activities.

11 I.T. Act 2008 *Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; *Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; *If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.”

12 Programming computer controls, Working with business analyst to develop project implementation and develop plans including user interfaces, Modifying IT system already in use, Writing documentation, Developing Coding and debugging across a variety of products, Testing new Software’s for compatibility with other existing software’s, Fixing any technical problems while testing, Designing, prototyping and implementing graphical user interfaces, etc. varying on the organizational requirements from country to country. Responsibilities of Software Professional

13 Software Piracy A)Software piracy as “the illegal copying, distribution, or use of software.” Piracy includes casual copying of particular software by an individual or business. With the advancement of technological tools software piracy has increased worldwide. B)Types Of Software Piracy 1)Borrowing and installing a copy of a software application from a person. 2)Installing more number of copies of the software than authorized number of licenses copies available. 3)Installing and selling unauthorized copies of software while purchasing new computers. 4)Duplicating and selling copyrighted programs.

14 I f any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network – accesses or secures access to such computer, computer system or computer network or computer resource E.g. Hacking, Virus Unauthorized Access

15 Moral, Ethics And Law In Computer World Moral : Morals refer to generally accepted standard of right and wrong in a society. Parents guide their child to learn how to behave in a society. E.g. Do not make use of pirated software CDs, Do not use computers for wrong and illegal hacking, etc. A set of moral principles which systematically link moral beliefs to each other is called Moral Theory. Ethics : The parents guide child to identify what is wrong and what is right and select the right thing. This determination of right and wrong, and following the right behavior, using morals is called as Ethics. Law : Law includes any act of parliament or of state legislature, ordinance promulgated by the President or as a Governor, as the cause may be; Bills enacted as President’s Act and includes rules, regulations, bye-laws and ordered issued under there.

16

17


Download ppt "0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Cyber Law And Ethics And Ethics."

Similar presentations


Ads by Google