SlideShare a Scribd company logo
1 of 4
MOZAAI MADHU HACKER
Hacking Laws in India
In Simple way we can say that cyber crime is unlawful acts
wherein the computer is either a tool or a target or both
Cyber crimes can involve criminal activities that are
traditional in nature, such as theft, fraud, forgery, defamation
and mischief, all of which are subject to the Indian Penal
Code. The abuse of computers has also given birth to a
gamut of new age crimes that are addressed by the
Information Technology Act, 2000.
We can categorize Cyber crimes in two ways
The Computer as a Target :-using a computer to attack
other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit
real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds,
EFT frauds, Pornography etc.

MOZAAI MADHU HACKER
Cyber Crime regulated by Cyber Laws or Internet Laws.
Types of cyber crimes
website defacing
child pornography
data breach
E-mail bombing
Computer Hacks
Network Hacks
Data diddling
usage of virus and worms
Trojans
Harassment through mails and chats
spoofing- email,sms,call
defamation
cyber stalking
trafficking
cyber warfare
software piracy
spamming
scams etc.
acts and sections

MOZAAI MADHU HACKER
Section 65:
For: Tampering with computer source documents
Punishments: Imprisonment upto 3 years or fine which may
extendupto 2 lakhs.
Section 66:
For: offences related to computer
Punishments: Imprisonment upto 3 years or with fine upto 5
lakh rupees or both
Section 66A:
For: sending offensive messages through communication
services like computer or mobile etc.
Punishments:imprisonmentupto three years and with fine
section 66B:
For: recieving stolen computer resource or communication
device
Punishments: imprisonment upto 3 yearsor with fine upto 1
lakh rupees or with both.
section 66C:
For: Identity Theft
Punishments: imprisonment upto 3 years or with fine upto 1
lakh
Section 66D :
For: Cheating by impersonation using computer resource
Punishments: imprisonment upto 3 years and also may be
responsible to fine which may extend upto 1 lakh
Section 66E:
For: piracy violation or video voyeurism
Punishments: Imprisonment upto 3 years or with fine upto 2
lakh rupees or with both
Section 66F:
For: cyber terrorism
Punishments: imprisonment may extend upto lifetime period
Section 67:
For: publishing obscene information in electric form
Punishments: Imprisonment upto 3 years and fine upto 5
lakh rupees in first conviction and in second
or subsequent convictions imprisonmentupto 5
years and also with fine upto 10 lakh rupees
Section 67A:
For : publishing or transmitting sexually implict material in
electronic form
Punishments: Imprisonment upto 5 years and fine upto 10
lakh rupees and imprisonment upto 7 years
andupto 10 lakh under subsequent
conviction
Section 67B:
For : Child pornography
Punishments: Imprisonment upto 5 years and fine upto10
lakh on first conviction and in subsequent
convictionupto 7 years and 10 lakh rupees
Section 67C:
For: Preservation and also retention of informtion by
intermediaries
Punishments: Imprisonment upto 3 years and also with fine
Section 68:
For: Violating the rules taken by power of controller
Punishments: Imprisonment upto 2 years or fine upto one
lakh
Section 69:
For: Any person who fails to assist agents who want to
monitor or decrypt any information on computer
Punishments: Upto 7 years and also with fine
Section 69A:
For: Any person who fails to support the corresponding
officials who ordered to block public access to any
information through computer resource
Punishments: upto 7 years and also fine
Section 69B:
For: Any person who fails to support the corresponding
officials to support the corresponding officials who
need to monitor and get traffic data or information
Punishments: Upto 3 years and also fine
Section 72:
For: breaking privacy and confidentiality
Punishments: Upto 3 years and also fine upto 1 lakh

MOZAAI MADHU HACKER

More Related Content

Viewers also liked

The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012
DefCamp
 
DefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniques
DefCamp
 
Mechanical injuries_Forensics
Mechanical injuries_ForensicsMechanical injuries_Forensics
Mechanical injuries_Forensics
Shiv Joshi
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
DefCamp
 

Viewers also liked (14)

The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012
 
DefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniques
 
Create our own keylogger
Create our own keyloggerCreate our own keylogger
Create our own keylogger
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Sql full tutorial
Sql full tutorialSql full tutorial
Sql full tutorial
 
Day1
Day1Day1
Day1
 
Abrasion
AbrasionAbrasion
Abrasion
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Mechanical injuries_Forensics
Mechanical injuries_ForensicsMechanical injuries_Forensics
Mechanical injuries_Forensics
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Similar to Hacking laws in india

Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
Aryan Ajmer
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
ClubHack
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
Yash
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Prashant Angadi
 

Similar to Hacking laws in india (20)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Hacking laws in india

  • 1. MOZAAI MADHU HACKER Hacking Laws in India In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. MOZAAI MADHU HACKER Cyber Crime regulated by Cyber Laws or Internet Laws. Types of cyber crimes website defacing child pornography data breach E-mail bombing Computer Hacks Network Hacks Data diddling usage of virus and worms Trojans
  • 2. Harassment through mails and chats spoofing- email,sms,call defamation cyber stalking trafficking cyber warfare software piracy spamming scams etc. acts and sections MOZAAI MADHU HACKER Section 65: For: Tampering with computer source documents Punishments: Imprisonment upto 3 years or fine which may extendupto 2 lakhs. Section 66: For: offences related to computer Punishments: Imprisonment upto 3 years or with fine upto 5 lakh rupees or both Section 66A: For: sending offensive messages through communication services like computer or mobile etc. Punishments:imprisonmentupto three years and with fine section 66B: For: recieving stolen computer resource or communication device Punishments: imprisonment upto 3 yearsor with fine upto 1 lakh rupees or with both. section 66C: For: Identity Theft Punishments: imprisonment upto 3 years or with fine upto 1 lakh
  • 3. Section 66D : For: Cheating by impersonation using computer resource Punishments: imprisonment upto 3 years and also may be responsible to fine which may extend upto 1 lakh Section 66E: For: piracy violation or video voyeurism Punishments: Imprisonment upto 3 years or with fine upto 2 lakh rupees or with both Section 66F: For: cyber terrorism Punishments: imprisonment may extend upto lifetime period Section 67: For: publishing obscene information in electric form Punishments: Imprisonment upto 3 years and fine upto 5 lakh rupees in first conviction and in second or subsequent convictions imprisonmentupto 5 years and also with fine upto 10 lakh rupees Section 67A: For : publishing or transmitting sexually implict material in electronic form Punishments: Imprisonment upto 5 years and fine upto 10 lakh rupees and imprisonment upto 7 years andupto 10 lakh under subsequent conviction Section 67B: For : Child pornography Punishments: Imprisonment upto 5 years and fine upto10 lakh on first conviction and in subsequent convictionupto 7 years and 10 lakh rupees Section 67C: For: Preservation and also retention of informtion by
  • 4. intermediaries Punishments: Imprisonment upto 3 years and also with fine Section 68: For: Violating the rules taken by power of controller Punishments: Imprisonment upto 2 years or fine upto one lakh Section 69: For: Any person who fails to assist agents who want to monitor or decrypt any information on computer Punishments: Upto 7 years and also with fine Section 69A: For: Any person who fails to support the corresponding officials who ordered to block public access to any information through computer resource Punishments: upto 7 years and also fine Section 69B: For: Any person who fails to support the corresponding officials to support the corresponding officials who need to monitor and get traffic data or information Punishments: Upto 3 years and also fine Section 72: For: breaking privacy and confidentiality Punishments: Upto 3 years and also fine upto 1 lakh MOZAAI MADHU HACKER