SlideShare uma empresa Scribd logo
1 de 10
PRESENTED BY
ABIRAMI. ABEL.
CYBER LAW
CYBER CRIME
crime
computer
CYBER LAW
 a combination of
 crime and computer.
 To put it in simple terms ‘any offence
or crime in which a computer is used is
called cyber crime
REASONS BEHIND IT ACT
 E-commerce industry
 e-mail
 Digital signatures and digital records
 e-governance.
IT ACT 2000
 The Information Technology Act, 2000, was thus
passed as the Act No.21 of 2000, got President
assent on 9 June and was made effective from 17
October 2000.
 The Act totally has 13 chapters and 90 sections
 four Acts namely
 The Indian Penal Code 1860,
 The Indian Evidence Act 1872,
 The Bankers’ Books Evidence Act 1891 and
• The Reserve Bank of India Act 1934).
Reasonable Security Practices
 Site certification
 Security initiatives
 Awareness Training
 Conformance to Standards, certification
 Policies and adherence to policies
 Policies like password policy, Access
 Control, email Policy etc
 Periodic monitoring and review.
Some of the K ey highlights of the
ITAA are as follows
 Focusing on data privacy
 Focusing on Information Security
 Defining cyber café
 Making digital signature technology neutral
 Defining reasonable security practices to be
followed by corporate
 Inclusion of some additional cyber crimes like
child pornography and cyber terrorism
The Act essentially deals with the
following issues
 Legal Recognition of Electronic
Documents - email
 Legal Recognition of Digital
Signatures
 e-governance
 To facilitate EFT between the financial
institutions and banks
Observations on ITA
 Awareness
 Evidences
 Non coverage of many crimes
 Jurisdiction
Cyber law

Mais conteúdo relacionado

Mais procurados

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment9945446746
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 

Mais procurados (20)

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 

Semelhante a Cyber law

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPallaviThukral2
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxaryan358156
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfroystoncdsouza7
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfroystoncdsouza7
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
IT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptxIT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptx227Stijisp
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03 ATHULYARAJDS
 

Semelhante a Cyber law (20)

Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
It act 2000
It act 2000It act 2000
It act 2000
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptxPawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
Pawan_Dugal_-_Information_Technology_Act_And_Its_Impact.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
 
objectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdfobjectivesofitact2000-111114071603-phpapp01.pdf
objectivesofitact2000-111114071603-phpapp01.pdf
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
IT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptxIT ACT 2000 by stiji.pptx
IT ACT 2000 by stiji.pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Cyber law

  • 3. CYBER LAW  a combination of  crime and computer.  To put it in simple terms ‘any offence or crime in which a computer is used is called cyber crime
  • 4. REASONS BEHIND IT ACT  E-commerce industry  e-mail  Digital signatures and digital records  e-governance.
  • 5. IT ACT 2000  The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000, got President assent on 9 June and was made effective from 17 October 2000.  The Act totally has 13 chapters and 90 sections  four Acts namely  The Indian Penal Code 1860,  The Indian Evidence Act 1872,  The Bankers’ Books Evidence Act 1891 and • The Reserve Bank of India Act 1934).
  • 6. Reasonable Security Practices  Site certification  Security initiatives  Awareness Training  Conformance to Standards, certification  Policies and adherence to policies  Policies like password policy, Access  Control, email Policy etc  Periodic monitoring and review.
  • 7. Some of the K ey highlights of the ITAA are as follows  Focusing on data privacy  Focusing on Information Security  Defining cyber café  Making digital signature technology neutral  Defining reasonable security practices to be followed by corporate  Inclusion of some additional cyber crimes like child pornography and cyber terrorism
  • 8. The Act essentially deals with the following issues  Legal Recognition of Electronic Documents - email  Legal Recognition of Digital Signatures  e-governance  To facilitate EFT between the financial institutions and banks
  • 9. Observations on ITA  Awareness  Evidences  Non coverage of many crimes  Jurisdiction