O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Cyber Law And Ethics

23.267 visualizações

Publicada em

Regarding laws crime and commandments

Publicada em: Tecnologia
  • Entre para ver os comentários

Cyber Law And Ethics

  1. 1.  Cyber law is the area of law that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information systems (IS).  Cyber law is also known as Cyber Law or Internet Law.  Cyber laws prevent or reduce large scale damage from cybercriminal activities by protecting information access, privacy, communications, intellectual property (IP) and freedom of speech related to the use of the Internet, websites, email, computers, cell phones, software and hardware, such as data storage devices.
  2. 2.  The increase in Internet traffic has led to a higher proportion of legal issues worldwide.  Because cyber laws vary by jurisdiction and country, enforcement is challenging, and restitution ranges from fines to imprisonment.
  3. 3.  The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).  The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. The Act is administered by the Indian Computer Emergency Response Team (CERT-IN).  The original Act was developed to promote the IT industry, regulate e-commerce, facilitate e- governance and prevent cybercrime.  The Act also sought to foster security practices within India that would serve the country in a global context.
  4. 4.  The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed.  Changes in the Amendment include: redefining terms such as "communication device" to reflect current use; validating electronic signatures and contracts; making the owner of a given IP address responsible for content accessed or distributed through it; and making corporations responsible for implementing effective data security practices and liable for breaches.
  5. 5.  The following are its main objectives of I T Act 2000  1. It is objective of I.T. Act 2000 to give legal recognition to any transaction which is done by electronic way or use of internet.  2. To give legal recognition to digital signature for accepting any agreement via computer.  3. To provide facility of filling document online relating to school admission or registration in employment exchange.
  6. 6.  4. According to I.T. Act 2000, any company can store their data in electronic storage.  5. To stop computer crime and protect privacy of internet users.  6. To give legal recognition for keeping books of accounts by bankers and other companies in electronic form.  7. To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime.
  7. 7.  1. Thou shalt not copy or use proprietary software for which you have not paid.  2. Thou shalt not use other people's computer resources without authorization or proper compensation.  3. Thou shalt not appropriate other people's intellectual output.  4. Thou shalt think about the social consequences of the program you are writing or the system you are designing.  5. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
  8. 8.  6. Thou shalt not use a computer to harm other people.  7. Thou shalt not interfere with other people's computer work.  8. Thou shalt not snoop around in other people's computer files.  9. Thou shalt not use a computer to steal.  10. Thou shalt not use a computer to bear false witness.
  9. 9.  Computer crime, or cybercrime, is any crime that involves a computer and a network.  Dr. Debarati Halder and Dr. K. Jaishankar (2011) define Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
  10. 10.  Such crimes may threaten a nation’s security and financial health.  Surrounding these types of crimes have become high- profile, particularly those surrounding hacking, copyright infringement , child pornography, and child grooming.  The computer may have been used in the commission of a crime, or it may be the target.
  11. 11.  There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.  Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber welfare.  The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.