0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Cyber Law And Ethics And Ethics.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
PRESENTATION ON CYBER LAWS. BIBLIOGRAPHY LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE.LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE. BY:NANDAN.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
JCSD-aw Citizenship in an e-World Johnston Community School District.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Describe ethical considerations resulting from technological advances.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Business Law Chapter 13: Business Law in the Internet Era.
Computer Programming I
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Unethical use of Computers and Networks
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Computer Crimes Career & Technology Education Department.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. Netcrime refers, more precisely, to criminal exploitation of.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Section 1.1 The Foundations of Law Section 1.1 The Foundations of Law Morality refers to a society’s values and beliefs about right and wrong. Ethics.
Ethics Self Imposed Right and Wrong Behavior Described as:
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Using the computer appropriately
Legal and ethical issues
SECURITY STANDARDS AND CYBER LAWS
Cyber Laws in Pakistan.
Investigating the correct and legal way to use software
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Five Unethical Uses of Computers
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
BCT 2.00 Analyze Technology Issues
Computer Programming I
Preventing Information Technology Crimes
Ethical Use of Computers
Laws Against Computer Hacking
Presentation transcript:

Cyber Law And Ethics And Ethics

Members 56- Shoaib Durgesh 59-Shubham 60-Pradum 61-Ashish 62-Sumita 63-Zahid 64-Parag 65-Komal 66-Nahida 67-Shoaib 68-Mahesh Hashim

Cyber Law Cyber law And Its Advantages

When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence the need for Cyberlaws in India. Cyber Law

Advantages Of Cyber Law * From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e- businesses would be that would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. * Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. * Digital signatures have been given legal validity and sanction in the Act. * The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. * The Act now allows Government to issue notification on the web thus heralding e- governance. * The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government.

Continue * The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government.* The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date. * Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and cause loss.

Cyber Crime Cyber crime encompasses any criminal act dealing with computers and networks (called Hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

Cyber Crimes In India From

Cyber Crime Government Websites Hacked

I.T. Act 2000 The Information Technology act, 2000 received the assent of president of India on 9 June 2000 and came into force from 17 October in that same year.The act was enacted to provide legal recognition for transaction carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “Electronic Commerce”, to facilitate electronic filling of documents with governments agencies which involve the use of alternative to paper based method of communication and storage information This law applies to any kind of information in the form of data message used in the context of commercial activities.

I.T. Act 2008 *Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; *Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; *If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.”

Programming computer controls, Working with business analyst to develop project implementation and develop plans including user interfaces, Modifying IT system already in use, Writing documentation, Developing Coding and debugging across a variety of products, Testing new Software’s for compatibility with other existing software’s, Fixing any technical problems while testing, Designing, prototyping and implementing graphical user interfaces, etc. varying on the organizational requirements from country to country. Responsibilities of Software Professional

Software Piracy A)Software piracy as “the illegal copying, distribution, or use of software.” Piracy includes casual copying of particular software by an individual or business. With the advancement of technological tools software piracy has increased worldwide. B)Types Of Software Piracy 1)Borrowing and installing a copy of a software application from a person. 2)Installing more number of copies of the software than authorized number of licenses copies available. 3)Installing and selling unauthorized copies of software while purchasing new computers. 4)Duplicating and selling copyrighted programs.

I f any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network – accesses or secures access to such computer, computer system or computer network or computer resource E.g. Hacking, Virus Unauthorized Access

Moral, Ethics And Law In Computer World Moral : Morals refer to generally accepted standard of right and wrong in a society. Parents guide their child to learn how to behave in a society. E.g. Do not make use of pirated software CDs, Do not use computers for wrong and illegal hacking, etc. A set of moral principles which systematically link moral beliefs to each other is called Moral Theory. Ethics : The parents guide child to identify what is wrong and what is right and select the right thing. This determination of right and wrong, and following the right behavior, using morals is called as Ethics. Law : Law includes any act of parliament or of state legislature, ordinance promulgated by the President or as a Governor, as the cause may be; Bills enacted as President’s Act and includes rules, regulations, bye-laws and ordered issued under there.