SlideShare a Scribd company logo
1 of 21
The Cyber Crime
The InformationTechnology Act 2000.
-Presented by
SYBAF (B).
The InformationTechnology
Act, 2000.
Introduction.
The InformationTechnology (IT) Act 2000 can be defined as :-
 an act passed by the Indian Parliament,
 contains cyber laws,
 provides legal framework,
 safeguards e-commerce and e-data interchange.
Objectives.
Some of the objectives of the IT Act 2000 are as follows :-
To facilitate maintenance of electronic records.
To facilitate legality to electronic transactions.
To facilitate electronic filing.
To amend various other acts.
Contents.
The InformationTechnologyAct, 2000 contains the following :-
 13 chapters.
 94 sections.
 4 schedules.
Sections.
Some of the important sections of the IT Act 2000 are :-
Section 1 to 14 Legal aspects for Digital Signature.
Section 15 to 42 License for Digital Signature Certificate.
Section 43 to 47 Penalties and compensation.
Section 48 to 64 Tribunals and appeal to High Court, etc.
Section 65 to 79 Offences.
Section 80 to 94 Miscellaneous Provisions.
Advantages.
Some advantages of the application of the IT Act 2000 are :-
 Helpful to promote e-commerce.
 Enhance the corporate business.
 Filling online forms.
 High penalty for cyber crime.
Cyber-Crimes.
Cyber crime can be defined as :-
 a crime done through a computer,
 an illegal activity committed on the internet,
 where the computer acts as a tool for crime,
 and exposed to internet security.
Introduction.
Cyber-crimes can be basically divided into 3 major categories :-
 Cyber-crimes against persons.
 Cyber-crimes against property.
 Cyber-crimes against government.
Categories.
Cyber-crimes against a person.
The following are the ways through which cyber-crime takes place
against a person :-
 Transmission of child pornography.
 Harassment through spam e-mails.
Cyber-crimes against property.
The following are the ways through which cyber-crime takes place
against property :-
 Computer vandalism.
 Transmission of harmful programme.
Cyber-crimes against govt.
The following are the ways through which cyber-crime takes place
against government :-
 Cyber-terrorism.
 Cracking.
Types.
Cyber-crimes can be classified into following types :-
 Call-centre / BPO scams.
 Child pornography.
 Credit card frauds.
 Cyber-squatting.
 Cyber-stalking.
 Cyber-lotto.
 E-mail security destruction.
 Violation of privacy.
 Software Piracy.
 Data fiddling.
 Phreaking.
 Hacking.
Hacking.
 Illegal intrusion.
 Similar to cracking.
 Breaking networks.
Write / use ready-made computer programs.
 Personal monetary gains.
Software Piracy.
 Unauthorized software theft.
 Illegal copy / Counterfeiting.
 Illegal distribution of the same.
 No valid license .
 Almost impossible to stop.
Credit Card Frauds.
 Fraud through credit / debit card.
 Identity theft.
 Controlling others’ card.
 Skimming (making copy of card).
 Fraudulent source of funds.
Child Pornography.
 Images / Clips abusing a child sexually.
 Sexual exploitation of a child .
 Extracting child’s personal information.
 Generated by the pedophiles.
 Cause for pedophilia.
India = 3 %Statistical Data.
Cyber-Police.
Mumbai Police Control
Room.
100
Mumbai Police. www.mumbaipolice.org
Indian Computer
Emergency Response
Team.
www.cert-in.org.in
Mumbai cyber-crime complaints to filed with:
Thank You.
Pearl Almeida (72)
Aditi Chamaria (76)
Adwait Sahasrabuddhe (112)
Vivek Sharma (116)
Archana Shringarpure (118)
Nidhi Khedekar (127)
- Presented By.

More Related Content

What's hot (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber law
Cyber lawCyber law
Cyber law
 

Viewers also liked

Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Advantages and disadvantages of law
Advantages and disadvantages of lawAdvantages and disadvantages of law
Advantages and disadvantages of lawHunza00
 
Chapter 3 servlet & jsp
Chapter 3 servlet & jspChapter 3 servlet & jsp
Chapter 3 servlet & jspJafar Nesargi
 
Servlets - filter, listeners, wrapper, internationalization
Servlets -  filter, listeners, wrapper, internationalizationServlets -  filter, listeners, wrapper, internationalization
Servlets - filter, listeners, wrapper, internationalizationsusant sahu
 
Law-Exchange.co.uk Powerpoint
Law-Exchange.co.uk PowerpointLaw-Exchange.co.uk Powerpoint
Law-Exchange.co.uk Powerpointlawexchange.co.uk
 
Java Servlets
Java ServletsJava Servlets
Java ServletsEmprovise
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 

Viewers also liked (20)

Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Advantages and disadvantages of law
Advantages and disadvantages of lawAdvantages and disadvantages of law
Advantages and disadvantages of law
 
Chapter 3 servlet & jsp
Chapter 3 servlet & jspChapter 3 servlet & jsp
Chapter 3 servlet & jsp
 
Servlets - filter, listeners, wrapper, internationalization
Servlets -  filter, listeners, wrapper, internationalizationServlets -  filter, listeners, wrapper, internationalization
Servlets - filter, listeners, wrapper, internationalization
 
Class it act
Class it actClass it act
Class it act
 
Law-Exchange.co.uk Powerpoint
Law-Exchange.co.uk PowerpointLaw-Exchange.co.uk Powerpoint
Law-Exchange.co.uk Powerpoint
 
Java Servlets
Java ServletsJava Servlets
Java Servlets
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
It act 2000
It act 2000It act 2000
It act 2000
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 

Similar to Cyber Crime & Information technology Act 2000

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 

Similar to Cyber Crime & Information technology Act 2000 (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
cyber crime
cyber crime cyber crime
cyber crime
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
English in written
English in writtenEnglish in written
English in written
 

Recently uploaded

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Cyber Crime & Information technology Act 2000

  • 1. The Cyber Crime The InformationTechnology Act 2000. -Presented by SYBAF (B).
  • 3. Introduction. The InformationTechnology (IT) Act 2000 can be defined as :-  an act passed by the Indian Parliament,  contains cyber laws,  provides legal framework,  safeguards e-commerce and e-data interchange.
  • 4. Objectives. Some of the objectives of the IT Act 2000 are as follows :- To facilitate maintenance of electronic records. To facilitate legality to electronic transactions. To facilitate electronic filing. To amend various other acts.
  • 5. Contents. The InformationTechnologyAct, 2000 contains the following :-  13 chapters.  94 sections.  4 schedules.
  • 6. Sections. Some of the important sections of the IT Act 2000 are :- Section 1 to 14 Legal aspects for Digital Signature. Section 15 to 42 License for Digital Signature Certificate. Section 43 to 47 Penalties and compensation. Section 48 to 64 Tribunals and appeal to High Court, etc. Section 65 to 79 Offences. Section 80 to 94 Miscellaneous Provisions.
  • 7. Advantages. Some advantages of the application of the IT Act 2000 are :-  Helpful to promote e-commerce.  Enhance the corporate business.  Filling online forms.  High penalty for cyber crime.
  • 9. Cyber crime can be defined as :-  a crime done through a computer,  an illegal activity committed on the internet,  where the computer acts as a tool for crime,  and exposed to internet security. Introduction.
  • 10. Cyber-crimes can be basically divided into 3 major categories :-  Cyber-crimes against persons.  Cyber-crimes against property.  Cyber-crimes against government. Categories.
  • 11. Cyber-crimes against a person. The following are the ways through which cyber-crime takes place against a person :-  Transmission of child pornography.  Harassment through spam e-mails.
  • 12. Cyber-crimes against property. The following are the ways through which cyber-crime takes place against property :-  Computer vandalism.  Transmission of harmful programme.
  • 13. Cyber-crimes against govt. The following are the ways through which cyber-crime takes place against government :-  Cyber-terrorism.  Cracking.
  • 14. Types. Cyber-crimes can be classified into following types :-  Call-centre / BPO scams.  Child pornography.  Credit card frauds.  Cyber-squatting.  Cyber-stalking.  Cyber-lotto.  E-mail security destruction.  Violation of privacy.  Software Piracy.  Data fiddling.  Phreaking.  Hacking.
  • 15. Hacking.  Illegal intrusion.  Similar to cracking.  Breaking networks. Write / use ready-made computer programs.  Personal monetary gains.
  • 16. Software Piracy.  Unauthorized software theft.  Illegal copy / Counterfeiting.  Illegal distribution of the same.  No valid license .  Almost impossible to stop.
  • 17. Credit Card Frauds.  Fraud through credit / debit card.  Identity theft.  Controlling others’ card.  Skimming (making copy of card).  Fraudulent source of funds.
  • 18. Child Pornography.  Images / Clips abusing a child sexually.  Sexual exploitation of a child .  Extracting child’s personal information.  Generated by the pedophiles.  Cause for pedophilia.
  • 19. India = 3 %Statistical Data.
  • 20. Cyber-Police. Mumbai Police Control Room. 100 Mumbai Police. www.mumbaipolice.org Indian Computer Emergency Response Team. www.cert-in.org.in Mumbai cyber-crime complaints to filed with:
  • 21. Thank You. Pearl Almeida (72) Aditi Chamaria (76) Adwait Sahasrabuddhe (112) Vivek Sharma (116) Archana Shringarpure (118) Nidhi Khedekar (127) - Presented By.