SlideShare uma empresa Scribd logo
1 de 33
Cyber Law in India
Need & Importance
Presented by,
Aditya Shukla
Overview
 Need of Cyber Law
 Cyber Crime
 Introduction of Cyber law
 IT Act-2000
 IT Act Amendment-2008
 SOPA & PIPA
 World & Cyber Law
 Importance of Cyber Law in Present Era
Need of Cyber Law
"The modern thief can steal more with a computer than
with a gun. Tomorrow's terrorist may be able to do more
damage with a keyboard than with a bomb".
National Research Council, U S A "Computers at
Risk”.1991
Need of Cyber Law
 Internet has dramatically changed the way we think,
the way we govern, the way we do commerce and the
way we perceive ourselves.
 Information technology is encompassing all walks of
life all over the world.
 Cyber space creates moral, civil and criminal wrongs.
It has now given a new way to express criminal
tendencies.
Need of Cyber Law
 Cyberspace is open to participation by all
 “IT” has brought Transition from paper to paperless
world
 The laws of real world cannot be interpreted in the
light of emerging cyberspace to include all aspects
relating to different activities in cyberspace
 Internet requires an enabling and supportive legal
infrastructure in tune with the times
Cyber Law ?
 Cyber Law is the law governing cyber space.
 Cyber space includes computers, networks, software's, data
storage devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic devices such as
cell phones, ATM machines etc.
Cyber Law Deals with
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
Cyber Crime ?
 Any crime with the help of computer and
telecommunication technology.
 Any crime where either the computer is used as an
object or subject.
Categories of Cyber Crime
 Cybercrimes against persons.
 Cybercrimes against property.
 Cybercrimes against government.
Against a Person
 Cyber stalking
 Impersonation
 Loss of Privacy
 Transmission of Obscene Material.
 Harassment with the use of computer.
Against Property
 Unauthorized Computer Trespassing
 Computer vandalism
 Transmission of harmful programmes
 Siphoning of funds from financial institutions
 Stealing secret information & data
 Copy Right
Against Government
 Hacking of Government websites
 Cyber Extortion
 Cyber Terrorism
 Computer Viruses
Some Other Crimes
 Logic Bombs
 Spamming
 Virus, worms, Trojan Horse
 E-Mail Bombing
 E-Mail abuse etc.
Statistics of Cyber Crimes
0
500
1000
1500
2000
2500
1 2 3 4
Cyber Crime in India
Year 2008 2009 2010 2011
Cyber Crimes 267 411 1322 2213
IT Act-2000
 The Information Technology Act, 2000 (IT Act), came
into force on 17 October 2000.
 The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate filing
of electronic records with the Government.
 Information Technology Act 2000 consisted of 94
sections segregated into 13 chapters.
IT Act-2000 : Objectives
 To provide legal recognition for transactions
 To facilitate electronic filing of documents with the
Government agencies.
 To amend the Indian Penal Code, The Indian
Evidence Act, 1872, The Banker's Book Evidence
Act, 1891 and the Reserve Bank of India Act, 1934.
 Aims to provide the legal framework to all
electronic records.
IT Act-2000
Snapshot of Important Cyber Law
Provisions in India
Offence Section under IT
Act
Tampering with Computer source documents
(with out the permission of in charge) Sec.43
Hacking with Computer systems, Data alteration Sec.66
Publishing obscene information Sec.67
Un-authorized access to protected system Sec.70
Breach of Confidentiality and Privacy Sec.72
Publishing false digital signature certificates Sec.73
IT Act-2000
Crimes under Indian Penal Code and Special Laws
Offence
Sections
Sending threatening & Defamatory messages by email Sec 503 & 499 IPC
Forgery of electronic records Sec 463 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing & Abuse Sec 463 & 500 IPC
Web-Jacking Sec 383 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
19
Section 43
If any person uses a computer or system network without permission
of the owner or any other person who is incharge &
 Access, download, Copy any data from such computer
 Introduces Computer Virus into any computer.
 Damages any computer network or computer.
 Changes Account Settings.
Punishment
He shall be liable to pay damages by the way of
compensation not exceeding 1 Crore to affected person.
20
Section 66
Hacking with Computer System
 Information residing in a computer resources must be
either:
• Destroyed
• Deleted
• Altered
• Diminished in value or utility
• Affected Injuriously
Punishment
3 yrs. Or Fine up to 2 lakh.
21
Section 67
 Publication or transmitted in the electronic form
any material which contains sexually explicit acts or
conduct.
Punishment
 1st conviction with 2 to 5 years of imprisonment and
fine of 1 lakh rupees.
 2nd or subsequent conviction with the
imprisonment up to 7-10 years and also with fine
which may extend to 10 lakh rupees.
22
Some other Sections
 Section 65 : Tampering with computer source document.
Punishments
Offences are punishable with imprisonment up to 3 yrs.
And/or fine up to Rs. 2 lakh.
 Section 69: Interception, monitoring of any information
regarding the integrity, Security or defense of
India, friendly relations with foreign countries.
Punishment
2 lakh and /or jail not extending 5 yrs
Some other Sections
 Section 502A: Publishing, Transmitting images of the private
area of a person without his or her consent.
Punishment : 2yrs./2 lakh.
 Section 419A: Cheating by any communication device or
computer resource
Punishment : 5yrs.
 Section 417A: Identity Theft
Punishment: 2yrs.
 Section 72: Violation of the privacy policy
Punishment: Fine up to 5 lakh jail not extending 2 yrs.
IT Act Amendment-2008
 The Information Technology Amendment Act, 2008 (IT
Act 2008) has been passed by the parliament on
23rd December 2008.
 It received the assent of President of India on
5th February, 2009.
 The IT Act 2008 has been notified on October 27, 2009.
 ITA-2008, is a new version of IT Act 2000.
 Provides additional focus on Information
Security.
 Added several new sections on offences
including Cyber Terrorism and Data Protection.
 124 sections and 14 chapters.
 Schedule I and II have been replaced &
Schedules III and IV are deleted.
IT Act Amendment-2008
 Digital signature has been replaced with
Electronic signature.
 Section 67 of the old Act is amended.
 Sections 66A to 66F prescribe punishment for
obscene electronic message transmissions
& cyber terrorism.
Salient features
 Amended section 69 gives power to the state.
 Sections 69 A and B, grant power to the state to direct
blocking for public access of any information through
any computer resource.
Salient features
United States America have many rules to regulate
internet content, Currently He is working on :
 SOPA (Stop Online Piracy) is a United States bill to
expand the ability to fight online trafficking in
copyrighted intellectual property.
 PIPA (Protect IPAct) is a proposed law of U.S.
government.
SOPA & PIPA
 The Great firewall of China monitors every movement in
cyber space and protect to publish any offensive content.
 China have a hold on every content which is harmful of
dangerous for the government of China.
 Brazil is considered world’s biggest airport for Hackers.
 Iran is also a dangerous country for the Netizens. He also
have a Crime Police unit for crime in Cyber Space.
World & Cyber laws
 We are living in highly digitalized world.
 All companies depend upon their computer networks
and keep their valuable data in electronic form.
 Government forms including income tax
returns, company law forms etc are now filled in
electronic form.
 Consumers are increasingly using credit cards for
shopping.
Importance of Cyber Law
Importance of Cyber Law
 Most people are using email, cell phones and SMS
messages for communication.
 Even in "non-cyber crime" cases, important evidence is
found in computers /cell phones e.g. in cases of
divorce, murder, kidnapping, organized crime, terrorist
operations, counterfeit currency etc.
 Since it touches all the aspects of transactions and
activities on and concerning the Internet, the World
Wide Web and Cyberspace therefore Cyber Law is
extremely important.
 www.cyberlawclinic.org/
 http://cyberlawsindia.net/
 http://mit.gov.in/hindi/node/1435#
 http://www.samvadsetu.com/?p=325
 http://slideshare.net
 http://www.icicibank.com/hindi/safe-banking/phishing.html
 http://www.indiancybersecurity.com/dwn_cyber_law.html
 http://inextlive.jagran.com/What-is-SOPA--201201180029
 http://hi.articlestreet.com/legal/cyber-law/filters-that-enforce-
cyber-law-regulations.html
 http://www.ahyep.com
 www.leawo.com/free-powerpoint-templates/
 http://www.mrmcharity.org/wp-
content/uploads/2012/07/Divorce-Law.jpg
 http:// www.ncrb.nic.in
References
Thank You

Mais conteúdo relacionado

Mais procurados

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 

Mais procurados (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 

Destaque

Legal aspects of ad col tambekar
Legal aspects of ad  col tambekarLegal aspects of ad  col tambekar
Legal aspects of ad col tambekar
Rbk Asr
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
Diya Mirza
 
Collective bargaining 1
Collective bargaining 1Collective bargaining 1
Collective bargaining 1
Komal Kataria
 
Collective bargaining ppt
Collective bargaining pptCollective bargaining ppt
Collective bargaining ppt
Craig Curry
 
Collective barganing
Collective barganingCollective barganing
Collective barganing
Rakhi Sarkar
 
Human Rights Presentation
Human Rights PresentationHuman Rights Presentation
Human Rights Presentation
ellaboi
 

Destaque (20)

Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Nuj
NujNuj
Nuj
 
Legal aspects of ad col tambekar
Legal aspects of ad  col tambekarLegal aspects of ad  col tambekar
Legal aspects of ad col tambekar
 
RTI ACT PPT
RTI ACT PPTRTI ACT PPT
RTI ACT PPT
 
General security order_for_office
General security order_for_officeGeneral security order_for_office
General security order_for_office
 
The official secrets Act, 1923
The official secrets Act, 1923The official secrets Act, 1923
The official secrets Act, 1923
 
Official secrets act
Official secrets actOfficial secrets act
Official secrets act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Industrial Disputes Act 1947
Industrial Disputes Act 1947Industrial Disputes Act 1947
Industrial Disputes Act 1947
 
Collective bargaining 1
Collective bargaining 1Collective bargaining 1
Collective bargaining 1
 
Collective bargaining ppt
Collective bargaining pptCollective bargaining ppt
Collective bargaining ppt
 
Industrial dispute
Industrial disputeIndustrial dispute
Industrial dispute
 
Industrial dispute act 1947
Industrial dispute act 1947Industrial dispute act 1947
Industrial dispute act 1947
 
COLLECTIVE BARGAINING
COLLECTIVE BARGAININGCOLLECTIVE BARGAINING
COLLECTIVE BARGAINING
 
Collective barganing
Collective barganingCollective barganing
Collective barganing
 
Human rights
Human rightsHuman rights
Human rights
 
Industrial disputes
Industrial disputesIndustrial disputes
Industrial disputes
 
Human rights
Human rightsHuman rights
Human rights
 
Human Rights Presentation
Human Rights PresentationHuman Rights Presentation
Human Rights Presentation
 

Semelhante a Cyber law in India: Its need & importance

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
Hemant
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
Yogendra Wagh
 

Semelhante a Cyber law in India: Its need & importance (20)

cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
It act 2000
It act 2000It act 2000
It act 2000
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Pre itact
Pre itactPre itact
Pre itact
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Cyber law in India: Its need & importance

  • 1. Cyber Law in India Need & Importance Presented by, Aditya Shukla
  • 2. Overview  Need of Cyber Law  Cyber Crime  Introduction of Cyber law  IT Act-2000  IT Act Amendment-2008  SOPA & PIPA  World & Cyber Law  Importance of Cyber Law in Present Era
  • 3. Need of Cyber Law "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, U S A "Computers at Risk”.1991
  • 4. Need of Cyber Law  Internet has dramatically changed the way we think, the way we govern, the way we do commerce and the way we perceive ourselves.  Information technology is encompassing all walks of life all over the world.  Cyber space creates moral, civil and criminal wrongs. It has now given a new way to express criminal tendencies.
  • 5. Need of Cyber Law  Cyberspace is open to participation by all  “IT” has brought Transition from paper to paperless world  The laws of real world cannot be interpreted in the light of emerging cyberspace to include all aspects relating to different activities in cyberspace  Internet requires an enabling and supportive legal infrastructure in tune with the times
  • 6. Cyber Law ?  Cyber Law is the law governing cyber space.  Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 7. Cyber Law Deals with  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy
  • 8. Cyber Crime ?  Any crime with the help of computer and telecommunication technology.  Any crime where either the computer is used as an object or subject.
  • 9. Categories of Cyber Crime  Cybercrimes against persons.  Cybercrimes against property.  Cybercrimes against government.
  • 10. Against a Person  Cyber stalking  Impersonation  Loss of Privacy  Transmission of Obscene Material.  Harassment with the use of computer.
  • 11. Against Property  Unauthorized Computer Trespassing  Computer vandalism  Transmission of harmful programmes  Siphoning of funds from financial institutions  Stealing secret information & data  Copy Right
  • 12. Against Government  Hacking of Government websites  Cyber Extortion  Cyber Terrorism  Computer Viruses
  • 13. Some Other Crimes  Logic Bombs  Spamming  Virus, worms, Trojan Horse  E-Mail Bombing  E-Mail abuse etc.
  • 14. Statistics of Cyber Crimes 0 500 1000 1500 2000 2500 1 2 3 4 Cyber Crime in India Year 2008 2009 2010 2011 Cyber Crimes 267 411 1322 2213
  • 15. IT Act-2000  The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.
  • 16. IT Act-2000 : Objectives  To provide legal recognition for transactions  To facilitate electronic filing of documents with the Government agencies.  To amend the Indian Penal Code, The Indian Evidence Act, 1872, The Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934.  Aims to provide the legal framework to all electronic records.
  • 17. IT Act-2000 Snapshot of Important Cyber Law Provisions in India Offence Section under IT Act Tampering with Computer source documents (with out the permission of in charge) Sec.43 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
  • 18. IT Act-2000 Crimes under Indian Penal Code and Special Laws Offence Sections Sending threatening & Defamatory messages by email Sec 503 & 499 IPC Forgery of electronic records Sec 463 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing & Abuse Sec 463 & 500 IPC Web-Jacking Sec 383 IPC Online sale of Drugs NDPS Act Online sale of Arms Arms Act
  • 19. 19 Section 43 If any person uses a computer or system network without permission of the owner or any other person who is incharge &  Access, download, Copy any data from such computer  Introduces Computer Virus into any computer.  Damages any computer network or computer.  Changes Account Settings. Punishment He shall be liable to pay damages by the way of compensation not exceeding 1 Crore to affected person.
  • 20. 20 Section 66 Hacking with Computer System  Information residing in a computer resources must be either: • Destroyed • Deleted • Altered • Diminished in value or utility • Affected Injuriously Punishment 3 yrs. Or Fine up to 2 lakh.
  • 21. 21 Section 67  Publication or transmitted in the electronic form any material which contains sexually explicit acts or conduct. Punishment  1st conviction with 2 to 5 years of imprisonment and fine of 1 lakh rupees.  2nd or subsequent conviction with the imprisonment up to 7-10 years and also with fine which may extend to 10 lakh rupees.
  • 22. 22 Some other Sections  Section 65 : Tampering with computer source document. Punishments Offences are punishable with imprisonment up to 3 yrs. And/or fine up to Rs. 2 lakh.  Section 69: Interception, monitoring of any information regarding the integrity, Security or defense of India, friendly relations with foreign countries. Punishment 2 lakh and /or jail not extending 5 yrs
  • 23. Some other Sections  Section 502A: Publishing, Transmitting images of the private area of a person without his or her consent. Punishment : 2yrs./2 lakh.  Section 419A: Cheating by any communication device or computer resource Punishment : 5yrs.  Section 417A: Identity Theft Punishment: 2yrs.  Section 72: Violation of the privacy policy Punishment: Fine up to 5 lakh jail not extending 2 yrs.
  • 24. IT Act Amendment-2008  The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008.  It received the assent of President of India on 5th February, 2009.  The IT Act 2008 has been notified on October 27, 2009.
  • 25.  ITA-2008, is a new version of IT Act 2000.  Provides additional focus on Information Security.  Added several new sections on offences including Cyber Terrorism and Data Protection.  124 sections and 14 chapters.  Schedule I and II have been replaced & Schedules III and IV are deleted. IT Act Amendment-2008
  • 26.  Digital signature has been replaced with Electronic signature.  Section 67 of the old Act is amended.  Sections 66A to 66F prescribe punishment for obscene electronic message transmissions & cyber terrorism. Salient features
  • 27.  Amended section 69 gives power to the state.  Sections 69 A and B, grant power to the state to direct blocking for public access of any information through any computer resource. Salient features
  • 28. United States America have many rules to regulate internet content, Currently He is working on :  SOPA (Stop Online Piracy) is a United States bill to expand the ability to fight online trafficking in copyrighted intellectual property.  PIPA (Protect IPAct) is a proposed law of U.S. government. SOPA & PIPA
  • 29.  The Great firewall of China monitors every movement in cyber space and protect to publish any offensive content.  China have a hold on every content which is harmful of dangerous for the government of China.  Brazil is considered world’s biggest airport for Hackers.  Iran is also a dangerous country for the Netizens. He also have a Crime Police unit for crime in Cyber Space. World & Cyber laws
  • 30.  We are living in highly digitalized world.  All companies depend upon their computer networks and keep their valuable data in electronic form.  Government forms including income tax returns, company law forms etc are now filled in electronic form.  Consumers are increasingly using credit cards for shopping. Importance of Cyber Law
  • 31. Importance of Cyber Law  Most people are using email, cell phones and SMS messages for communication.  Even in "non-cyber crime" cases, important evidence is found in computers /cell phones e.g. in cases of divorce, murder, kidnapping, organized crime, terrorist operations, counterfeit currency etc.  Since it touches all the aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace therefore Cyber Law is extremely important.
  • 32.  www.cyberlawclinic.org/  http://cyberlawsindia.net/  http://mit.gov.in/hindi/node/1435#  http://www.samvadsetu.com/?p=325  http://slideshare.net  http://www.icicibank.com/hindi/safe-banking/phishing.html  http://www.indiancybersecurity.com/dwn_cyber_law.html  http://inextlive.jagran.com/What-is-SOPA--201201180029  http://hi.articlestreet.com/legal/cyber-law/filters-that-enforce- cyber-law-regulations.html  http://www.ahyep.com  www.leawo.com/free-powerpoint-templates/  http://www.mrmcharity.org/wp- content/uploads/2012/07/Divorce-Law.jpg  http:// www.ncrb.nic.in References

Notas do Editor

  1. NOTE: Sec.78 of I.T. Act empowers Deputy Superintendent Of Police to investigate cases falling under this Act
  2. x