SlideShare uma empresa Scribd logo
1 de 22
Mukesh N Tekwani mukeshtekwani@outlook.com
2
What is Cyber Law?
1. Cyber law – all legal and regulatory aspects of the
Internet.
2. Cyber space - governed by a system of laws and
regulations called cyber law.
3. Why is cyber law needed? Millions of people around the
world use Internet for business, banking, social
interactions, and Internet is misused for criminal
activities. Hence the need for laws
3
Cyber Security Law – What you can do
1. In case you become a victim of cyber crime, what can you do?
2. Preserve the relevant incriminating electronic evidence.
3. Legal liability can be:
a) Civil liability
b) Criminal liability
4. Even if you are the victim, you still have a legal liability. The law
expects you to have the duty of due diligence.
5. If you are the victim, you must report the breach to the relevant
statutory authorities
6. Example – getting email from a bank with a bank statement/invoice
meant for someone else
4
Cyber Security Law – Challenges
1. The person committing cybercrime may not be located in your
country and so legal remedies could be difficult.
2. Anyone sitting in one country could target the network of a
company or a govt in another country.
3. There is no international legal law for such matters. So jurisdiction is
going to pay a very important role in tackling cybercrime.
5
International Cyber Law
1. There are no international cyber laws.
2. Every country has its own cyber laws – only for its citizens.
3. What happens if a cyber crime is committed on country X from
country Y ?
4. Some countries have come up with bilateral agreements with other
countries – but no international laws in place
5. July 2015 – Germany came up with cyber laws – laws to protect
critical infrastructure only. Equipment, plants that are important for
running the country.
6. June 2017 – China’s cyber security law – very broad – personal
information also covered
6
What should companies do?
1. Inform customers of the breach
2. Tell customers what to do in this case
3. Examples –
1. Yahoo password leaks.
2. British Airways credit card and other info leak
7
Copyright
1. Copyright is an intellectual property right attached to
original works – e.g., books, movies, music, logo,…
2. Copyright is a protection provided by law to authors of
original works. This includes literature, films, music,
paintings, etc
3. Copyright laws apply to published and unpublished
work.
4. Copyright law helps to determine authorship, duration
of protection and laws for transfering rights to others
8
Security
1. Security is an organisational concern.
2. Every business needs safeguards that protect computer
systems and data from damage or unlawful use.
3. Protect systems from hackers
4. Protect data from unlawful use.
9
Controls
1. What are controls? These are policies, procedures,
rules, techniques designed to prevent errors in data and
systems.
2. Examples are :
a. access privileges – who, what, when
b. Data validation – numeric data for DOB, no numeric
for name, etc
c. Input authorizations, view rights, edit rights
10
Privacy
1. Security is an organisational concern
2. Privacy is an individual concern.
3. People need assurance that their personal information
such as employment, financial records, medical records,
employment history will not be misused.
4. You must ensure that you don’t reveal your personal /
private information to others.
5. Info such as – bank details, date of birth, medical
history, employment records, educational records…..
11
Software Piracy
1. It is the unauthorized copying and distribution of
copyrighted software
2. How is it done ? – Downloading, copying, sharing, selling
copies of original software
3. Software license – how many copies can be installed. If
you install more than the specified number of copies, it is
piracy
4. Sharing login credentials used to access a web-based
software application – e.g. one person pays for an online
service and many use that service by sharing password.
12
Code of Ethics
1. Ethics => Ethics is a branch of philosophy. Ethics defines
what is good and bad, what is right and wrong, obligations.
2. All software professionals (programmers, systems admins,…)
have the responsibility to provide certain quality or work
and assure control, privacy and security in their services and
products.
3. What does a code of ethics do? It gives these norms and
principles. Code of ethics sets standards.
4. Code of ethics sets commitments, requirements and
responsibilities for members of an organization.
13
Code of Ethics for Computer Professionals
1. Fair Treatment – treat everyone fairly. No discrimination on
grounds of age, gender, post, etc
2. Access private info only when it is extremely necessary for
your official duties, after taking permissions from concerned
authorities.
3. Don’t use confidential information for your personal gain.
14
Code of Ethics for Computer Professionals
4. Maintain the privacy of users and professionals.
5. Maintain good communication with users – inform users of
which resources can be shared, legal obligations, etc.
6. Maintain good system integrity – regularly perform
maintenance of hardware and software, check network and
Internet availability. Analyze system performance
(download speeds, bootup times for computers, etc)
7. Prevent unauthorized access to systems and resources
(applications, printers, data, …)
15
Code of Ethics for Computer Professionals
8. Maintain healthy cooperation. ‘We’, not ‘I’.
9. Support your colleagues – cooperate with other colleagues.
Learn from them if you don’t know something. Train them
if they need help in learning
10. Acknowledge the responsibility of the team – the
community.
11. Be honest – honesty is the best policy. Take help of seniors
if it is necessary, to perform your duties efficiently.
12. Update yourself with latest technology, software, systems
practices. If necessary, go for training, self-study.
16
Code of Ethics for Computer Professionals
13. Update yourself on social ad legal issues relating to
computing. Share with others whatever new you have
learnt. Encourage others to adopt changes in policies – this
is social responsibility
14. If you make mistakes, admit them and correct them. Don’t
try to blame others for your mistakes. Maintain
professionalism while performing your duties.
15. Remove any wrong data about individuals.
17
Do’s for Computer Professionals
1. Use the Internet to enhance your knowledge. Take courses
from sites such as Udacity, Udemy, Coursera, MIT, etc
2. When communicating with strangers, don’t share your
personal data. Personal data = family, financial, job, health
3. Respect privacy of others
4. Avoid political discussions with strangers
5. Use antivirus software to protect your computer systems
6. Download software from reliable sites only
18
Don’ts for Computer Professionals
1. Don’t share your passwords and usernames with others
2. Don’t arrange to meet unknown persons whom you met on
Internet
3. Don’t use unauthorized or pirated software
4. Don’t break / hack into computers. It’s a crime.
5. Don’t answer any improper messages
6. Don’t fall prey to lottery, cashback, loan schemes.
7. Don’t fall into traps of friendship from strangers.
19
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
20
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
21
Cyber Insurance
Cyber Insurance covers the following:
i. A financial loss resulting from being a victim of email spoofing and
phishing
ii. Fraudulent online transactions in bank account, debit/credit card or e-
wallet
iii. Reputational liability, including claims alleging defamation and invasion of
privacy
iv. Losses and expenses related to defence and prosecution cost related to
identity theft
v. Restoration cost to retrieve data or computer program damaged by entry
of the malware
vi. Cyber extortion loss
THANK YOU
Prof Mukesh N Tekwani
mukeshtekwani@outlook.com
November 9, 2019

Mais conteúdo relacionado

Mais procurados

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Mais procurados (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 

Semelhante a Cyber Laws

Semelhante a Cyber Laws (20)

Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
E commerce
E commerce E commerce
E commerce
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 

Mais de Mukesh Tekwani

Mais de Mukesh Tekwani (20)

Computer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelComputer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube Channel
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfThe Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdf
 
Circular motion
Circular motionCircular motion
Circular motion
 
Gravitation
GravitationGravitation
Gravitation
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - Physics
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversion
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversion
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prism
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surface
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrors
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atom
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lenses
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
 
XML
XMLXML
XML
 
Social media
Social mediaSocial media
Social media
 

Último

💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Último (20)

💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 

Cyber Laws

  • 1. Mukesh N Tekwani mukeshtekwani@outlook.com
  • 2. 2 What is Cyber Law? 1. Cyber law – all legal and regulatory aspects of the Internet. 2. Cyber space - governed by a system of laws and regulations called cyber law. 3. Why is cyber law needed? Millions of people around the world use Internet for business, banking, social interactions, and Internet is misused for criminal activities. Hence the need for laws
  • 3. 3 Cyber Security Law – What you can do 1. In case you become a victim of cyber crime, what can you do? 2. Preserve the relevant incriminating electronic evidence. 3. Legal liability can be: a) Civil liability b) Criminal liability 4. Even if you are the victim, you still have a legal liability. The law expects you to have the duty of due diligence. 5. If you are the victim, you must report the breach to the relevant statutory authorities 6. Example – getting email from a bank with a bank statement/invoice meant for someone else
  • 4. 4 Cyber Security Law – Challenges 1. The person committing cybercrime may not be located in your country and so legal remedies could be difficult. 2. Anyone sitting in one country could target the network of a company or a govt in another country. 3. There is no international legal law for such matters. So jurisdiction is going to pay a very important role in tackling cybercrime.
  • 5. 5 International Cyber Law 1. There are no international cyber laws. 2. Every country has its own cyber laws – only for its citizens. 3. What happens if a cyber crime is committed on country X from country Y ? 4. Some countries have come up with bilateral agreements with other countries – but no international laws in place 5. July 2015 – Germany came up with cyber laws – laws to protect critical infrastructure only. Equipment, plants that are important for running the country. 6. June 2017 – China’s cyber security law – very broad – personal information also covered
  • 6. 6 What should companies do? 1. Inform customers of the breach 2. Tell customers what to do in this case 3. Examples – 1. Yahoo password leaks. 2. British Airways credit card and other info leak
  • 7. 7 Copyright 1. Copyright is an intellectual property right attached to original works – e.g., books, movies, music, logo,… 2. Copyright is a protection provided by law to authors of original works. This includes literature, films, music, paintings, etc 3. Copyright laws apply to published and unpublished work. 4. Copyright law helps to determine authorship, duration of protection and laws for transfering rights to others
  • 8. 8 Security 1. Security is an organisational concern. 2. Every business needs safeguards that protect computer systems and data from damage or unlawful use. 3. Protect systems from hackers 4. Protect data from unlawful use.
  • 9. 9 Controls 1. What are controls? These are policies, procedures, rules, techniques designed to prevent errors in data and systems. 2. Examples are : a. access privileges – who, what, when b. Data validation – numeric data for DOB, no numeric for name, etc c. Input authorizations, view rights, edit rights
  • 10. 10 Privacy 1. Security is an organisational concern 2. Privacy is an individual concern. 3. People need assurance that their personal information such as employment, financial records, medical records, employment history will not be misused. 4. You must ensure that you don’t reveal your personal / private information to others. 5. Info such as – bank details, date of birth, medical history, employment records, educational records…..
  • 11. 11 Software Piracy 1. It is the unauthorized copying and distribution of copyrighted software 2. How is it done ? – Downloading, copying, sharing, selling copies of original software 3. Software license – how many copies can be installed. If you install more than the specified number of copies, it is piracy 4. Sharing login credentials used to access a web-based software application – e.g. one person pays for an online service and many use that service by sharing password.
  • 12. 12 Code of Ethics 1. Ethics => Ethics is a branch of philosophy. Ethics defines what is good and bad, what is right and wrong, obligations. 2. All software professionals (programmers, systems admins,…) have the responsibility to provide certain quality or work and assure control, privacy and security in their services and products. 3. What does a code of ethics do? It gives these norms and principles. Code of ethics sets standards. 4. Code of ethics sets commitments, requirements and responsibilities for members of an organization.
  • 13. 13 Code of Ethics for Computer Professionals 1. Fair Treatment – treat everyone fairly. No discrimination on grounds of age, gender, post, etc 2. Access private info only when it is extremely necessary for your official duties, after taking permissions from concerned authorities. 3. Don’t use confidential information for your personal gain.
  • 14. 14 Code of Ethics for Computer Professionals 4. Maintain the privacy of users and professionals. 5. Maintain good communication with users – inform users of which resources can be shared, legal obligations, etc. 6. Maintain good system integrity – regularly perform maintenance of hardware and software, check network and Internet availability. Analyze system performance (download speeds, bootup times for computers, etc) 7. Prevent unauthorized access to systems and resources (applications, printers, data, …)
  • 15. 15 Code of Ethics for Computer Professionals 8. Maintain healthy cooperation. ‘We’, not ‘I’. 9. Support your colleagues – cooperate with other colleagues. Learn from them if you don’t know something. Train them if they need help in learning 10. Acknowledge the responsibility of the team – the community. 11. Be honest – honesty is the best policy. Take help of seniors if it is necessary, to perform your duties efficiently. 12. Update yourself with latest technology, software, systems practices. If necessary, go for training, self-study.
  • 16. 16 Code of Ethics for Computer Professionals 13. Update yourself on social ad legal issues relating to computing. Share with others whatever new you have learnt. Encourage others to adopt changes in policies – this is social responsibility 14. If you make mistakes, admit them and correct them. Don’t try to blame others for your mistakes. Maintain professionalism while performing your duties. 15. Remove any wrong data about individuals.
  • 17. 17 Do’s for Computer Professionals 1. Use the Internet to enhance your knowledge. Take courses from sites such as Udacity, Udemy, Coursera, MIT, etc 2. When communicating with strangers, don’t share your personal data. Personal data = family, financial, job, health 3. Respect privacy of others 4. Avoid political discussions with strangers 5. Use antivirus software to protect your computer systems 6. Download software from reliable sites only
  • 18. 18 Don’ts for Computer Professionals 1. Don’t share your passwords and usernames with others 2. Don’t arrange to meet unknown persons whom you met on Internet 3. Don’t use unauthorized or pirated software 4. Don’t break / hack into computers. It’s a crime. 5. Don’t answer any improper messages 6. Don’t fall prey to lottery, cashback, loan schemes. 7. Don’t fall into traps of friendship from strangers.
  • 19. 19 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 20. 20 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 21. 21 Cyber Insurance Cyber Insurance covers the following: i. A financial loss resulting from being a victim of email spoofing and phishing ii. Fraudulent online transactions in bank account, debit/credit card or e- wallet iii. Reputational liability, including claims alleging defamation and invasion of privacy iv. Losses and expenses related to defence and prosecution cost related to identity theft v. Restoration cost to retrieve data or computer program damaged by entry of the malware vi. Cyber extortion loss
  • 22. THANK YOU Prof Mukesh N Tekwani mukeshtekwani@outlook.com November 9, 2019