SlideShare uma empresa Scribd logo
1 de 14
LAW
DIGITAL AGE
IN
CYBERCRIMEANDITS TYPES
• WHAT IS CYBER CRIME?
CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE
INTERNET.
• WHAT ARE THE TYPES?
1. HACKING.
2. THEFT.
3. CYBER STALKING.
4. IDENTITY THEFT.
5. MALICIOUS SOFTWARE.
6. CHILD SOLICITING AND ABUSE.
CATERGORIES
• CYBER CRIMES ARE BROADLY CATEGORIZED INTO THREE
CATEGORIES, NAMELY CRIME AGAINST -
1. INDIVIDUAL
2. PROPERTY
3. SOCIETY
4. ORGANISATION &
5. GOVERNMENT.
CAUSES
1. EASY EARNING BUSINESS.
2. ACCESS TO CONFIDENTIAL AND PRIVATE INFORMATION OF
INDIVIDUAL AND GOVERNMENT.
3. PASSION OF TEENAGERS.
4. TO TAKE REVENGE.
- LAW BREAKERS
TO BEAT A HACKER YOU HAVE TO BECOME
ONE
CYBER CRIMEININDIA
• THE MAJORITY OF THE CYBER CRIMES ARE CENTERED ON FORGERY, FRAUD AND
PHISHING.
• INDIA IS THE THIRD MOST TARGETED COUNTRY FOR CYBER ATTACKS AFTER US AND UK.
• 4 IN 5 ONLINE ADULTS HAVE BEEN A VICTIM OF CYBER CRIME
• AVERAGELY 14350 WEBSITE DEFACEMENTS ARE FOUND EVERY YEAR.
• INDIA IS THE NUMBER ONE COUNTRY IN THE WORLD FOR GENERATING SPAM.
WIKILEAKS
 INITATED IN 2006

 JULIAN ASSANGE -FOUNDER
 “WE OPEN GOVERNMENTS”
THE IT ACT
• The Information Technology Act, 2000 Is An Act Of The indian parliament Notified On 17 October 2000.
• It Is Also Known As IT ACT.
• It Can Be Against : Individual, Organisation Or Society At Large.
• Many Amendments Are Made Till Now.
CYBER SECURITY
• India Has No Dedicated Cyber Security Regulation Framed Under The Information Technology
Act 2000.
• National Cyber Security Policy Of India 2013 : Remained Ineffective And Non-implementable.
• Indian Cyber Security Policy : Failed In Protecting Civil Liberties & Privacy Rights.
• Cyber Security Of India : Grossly Weak With No Legal Obligation For Cyber Security.
CASE STUDYS
CURIOUS CASE OF JONATHAN JAMES
CASE OF KEVIN MITNICK
USE OFSOCIAL WEBSITE/APPS
• CASE RELATED TO YAKUB MENON’S ARREST
Salman had tweeted, “Get tiger, hang him. Parade him not his brother’’.
• MUMBAI GIRLS JAILED AFTER FACEBOOK POST ABOUT BAL
THACKERAY WHICH 'HURT RELIGIOUS SENTIMENTS‘.
Shaheen had reportedly written on her Facebook wall that "People like Thackeray are born and die
daily, and one should not observe a 'bandh' for that".
CONCLUSION
• PREVENTIVE MEASURES
BY INDIVIDUAL .
BY ORGANISATION
BY SOCIETY.
PRECAUTIONS
BY GOVERNMENT.
THANK YOU
-RUSHABH
BROUGHT TO YOU BY

Mais conteúdo relacionado

Mais procurados

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
The China-US Trade War
The China-US Trade WarThe China-US Trade War
The China-US Trade WarHenri Meylan
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
Nixon and the watergate scandal
Nixon and the watergate scandalNixon and the watergate scandal
Nixon and the watergate scandalRCB78
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
India and the global financial crisis
India and the global financial crisisIndia and the global financial crisis
India and the global financial crisisCharu Rastogi
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

Mais procurados (20)

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
The China-US Trade War
The China-US Trade WarThe China-US Trade War
The China-US Trade War
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Us China Trade War
Us China Trade War Us China Trade War
Us China Trade War
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Nixon and the watergate scandal
Nixon and the watergate scandalNixon and the watergate scandal
Nixon and the watergate scandal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
India and the global financial crisis
India and the global financial crisisIndia and the global financial crisis
India and the global financial crisis
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Destaque

Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship12mk
 
digital law
digital lawdigital law
digital law11tsk
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointTala
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnesspakkwok
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellnessPat Bruinsma
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and securitymdhague
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Anti bullying Philippines
Anti bullying Philippines Anti bullying Philippines
Anti bullying Philippines Ricky Fancubit
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Destaque (17)

Kahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =shipKahlout Powerpoint it ditgital citizan =ship
Kahlout Powerpoint it ditgital citizan =ship
 
digital law
digital lawdigital law
digital law
 
Digital law
Digital lawDigital law
Digital law
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital law
Digital lawDigital law
Digital law
 
Digital health and wellness
Digital health and wellnessDigital health and wellness
Digital health and wellness
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Anti bullying Philippines
Anti bullying Philippines Anti bullying Philippines
Anti bullying Philippines
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Semelhante a LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.

Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 

Semelhante a LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA. (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 

Último

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 

Último (20)

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 

LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.

  • 2. CYBERCRIMEANDITS TYPES • WHAT IS CYBER CRIME? CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE INTERNET. • WHAT ARE THE TYPES? 1. HACKING. 2. THEFT. 3. CYBER STALKING. 4. IDENTITY THEFT. 5. MALICIOUS SOFTWARE. 6. CHILD SOLICITING AND ABUSE.
  • 3. CATERGORIES • CYBER CRIMES ARE BROADLY CATEGORIZED INTO THREE CATEGORIES, NAMELY CRIME AGAINST - 1. INDIVIDUAL 2. PROPERTY 3. SOCIETY 4. ORGANISATION & 5. GOVERNMENT.
  • 4. CAUSES 1. EASY EARNING BUSINESS. 2. ACCESS TO CONFIDENTIAL AND PRIVATE INFORMATION OF INDIVIDUAL AND GOVERNMENT. 3. PASSION OF TEENAGERS. 4. TO TAKE REVENGE.
  • 5. - LAW BREAKERS TO BEAT A HACKER YOU HAVE TO BECOME ONE
  • 6.
  • 7. CYBER CRIMEININDIA • THE MAJORITY OF THE CYBER CRIMES ARE CENTERED ON FORGERY, FRAUD AND PHISHING. • INDIA IS THE THIRD MOST TARGETED COUNTRY FOR CYBER ATTACKS AFTER US AND UK. • 4 IN 5 ONLINE ADULTS HAVE BEEN A VICTIM OF CYBER CRIME • AVERAGELY 14350 WEBSITE DEFACEMENTS ARE FOUND EVERY YEAR. • INDIA IS THE NUMBER ONE COUNTRY IN THE WORLD FOR GENERATING SPAM.
  • 8. WIKILEAKS  INITATED IN 2006   JULIAN ASSANGE -FOUNDER  “WE OPEN GOVERNMENTS”
  • 9. THE IT ACT • The Information Technology Act, 2000 Is An Act Of The indian parliament Notified On 17 October 2000. • It Is Also Known As IT ACT. • It Can Be Against : Individual, Organisation Or Society At Large. • Many Amendments Are Made Till Now.
  • 10. CYBER SECURITY • India Has No Dedicated Cyber Security Regulation Framed Under The Information Technology Act 2000. • National Cyber Security Policy Of India 2013 : Remained Ineffective And Non-implementable. • Indian Cyber Security Policy : Failed In Protecting Civil Liberties & Privacy Rights. • Cyber Security Of India : Grossly Weak With No Legal Obligation For Cyber Security.
  • 11. CASE STUDYS CURIOUS CASE OF JONATHAN JAMES CASE OF KEVIN MITNICK
  • 12. USE OFSOCIAL WEBSITE/APPS • CASE RELATED TO YAKUB MENON’S ARREST Salman had tweeted, “Get tiger, hang him. Parade him not his brother’’. • MUMBAI GIRLS JAILED AFTER FACEBOOK POST ABOUT BAL THACKERAY WHICH 'HURT RELIGIOUS SENTIMENTS‘. Shaheen had reportedly written on her Facebook wall that "People like Thackeray are born and die daily, and one should not observe a 'bandh' for that".
  • 13. CONCLUSION • PREVENTIVE MEASURES BY INDIVIDUAL . BY ORGANISATION BY SOCIETY. PRECAUTIONS BY GOVERNMENT.