GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Cyber Laws in Pakistan Sehrish Mushtaq.
Rockingham County Public Schools Technology Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
“Cyber Crime in India”
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Computer Crimes Career & Technology Education Department.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
1 WEB TECHNOLOGY UNIT – 1 THETOPPERSWAY.COM. 2 HISTORY AND GROWHT OF WEB The idea of a nonproprietary computer communication system was first conceived.
Woodland Hills School District Computer Network Acceptable Use Policy.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cyber Law And Ethics And Ethics.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Cyber Crime.  These are the crimes, which have been committed with the help of computer, computer system, computer network of communication device. IT.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
SECURITY STANDARDS AND CYBER LAWS
IT Security  .
Cyber Laws in Pakistan.
Seminar On Cyber Crime Submitted To: Submitted By:
Cyber Crime.
IT ACT 2000 and 2008 Important Sections Awareness Presentation
COMPUTER CRIME.
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Chapter 13 Security and Ethical Challenges.
What is Computer Crime? Identity Theft Cyber-Bulling Hacking
Cyber Laws in Pakistan Hassan Khalil.
Digital Empowerment of Women in KP
Presentation transcript:

GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004

Cyber Law  Cyber Law is the law governing cyber space.  Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, s and even electronic devices such as cell phones, ATM machines etc.

Need of Cyber Law  Internet has dramatically changed the way we think, the way we govern, the way we do commerce and the way we perceive ourselves.  Information technology is encompassing all walks of life all over the world.  Cyber space creates moral, civil and criminal wrongs. It has now given a new way to express criminal tendencies.

Continued..  Cyberspace is open to participation by all  “IT” has brought Transition from paper to paperless world  The laws of real world cannot be interpreted in the light of emerging cyberspace to include all aspects relating to different activities in cyberspace  Internet requires an enabling and supportive legal infrastructure in tune with the times

Categories of Cyber Crime  Cybercrimes against persons.  Cybercrimes against property.  Cybercrimes against government.

Against a Person  Cyber stalking  Impersonation  Loss of Privacy  Transmission of Obscene Material.  Harassment with the use of computer.

Against Property  Unauthorized Computer Trespassing  Computer vandalism  Transmission of harmful programmes  Siphoning of funds from financial institutions  Stealing secret information & data  Copy Right

Against Government  Hacking of Government websites  Cyber Extortion  Cyber Terrorism  Computer Viruses

Some Other Crimes  Logic Bombs  Spamming  Virus, worms, Trojan Horse  Bombing  abuse etc.

Statistics of Cyber Crimes Year Cyber Crimes

IT Act-2000  The Information Technology Act, 2000 (IT Act), came into force on 17 October  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.

Crimes under Indian Penal Code and Special Laws Offence Sections Sending threatening & Defamatory messages by Sec 503 & 499 IPC Forgery of electronic records Sec 463 IPC Bogus websites, cyber frauds Sec 420 IPC spoofing & Abuse Sec 463 & 500 IPC Web-Jacking Sec 383 IPC Online sale of Drugs NDPS Act Online sale of Arms Arms Act

Section 43 If any person uses a computer or system network without permission of the owner or any other person who is incharge &  Access, download, Copy any data from such computer  Introduces Computer Virus into any computer.  Damages any computer network or computer.  Changes Account Settings. Punishment He shall be liable to pay damages by the way of 1 Crore compensation not exceeding 1 Crore to affected person.

Section 66 Hacking with Computer System  Information residing in a computer resources must be either: Destroyed Deleted Altered Diminished in value or utility Affected Injuriously Punishment 3 yrs. Or Fine up to 2 lakh.

Section 67  Publication or transmitted in the electronic form any material which contains sexually explicit acts or conduct. Punishment  1st conviction with 2 to 5 years of imprisonment and fine of 1 lakh rupees.  2nd or subsequent conviction with the imprisonment up to 7-10 years and also with fine which may extend to 10 lakh rupees.

Some other Sections  Section 65 : Tampering with computer source document. Punishments Offences are punishable with imprisonment up to 3 yrs. And/or fine up to Rs. 2 lakh.  Section 69: Interception, monitoring of any information regarding the integrity, Security or defense of India, friendly relations with foreign countries. Punishment 2 lakh and /or jail not extending 5 yrs

Continued…  Section 502A: Publishing, Transmitting images of the private area of a person without his or her consent. Punishment : 2yrs./2 lakh.  Section 419A: Cheating by any communication device or computer resource Punishment : 5yrs.  Section 417A: Identity Theft Punishment: 2yrs.  Section 72: Violation of the privacy policy Punishment: Fine up to 5 lakh jail not extending 2 yrs.

Thank You