Upload
ajay-kumar
View
223
Download
0
Embed Size (px)
Citation preview
8/3/2019 0e8aCyber Law2
1/20
5/5/2012 Cyber Law 1
Cyber Law
8/3/2019 0e8aCyber Law2
2/20
5/5/2012 Cyber Law 2
Covered Topics
Introduction to Cyber Crime and CyberLaw
Types of Cyber Crime
Various Laws and Provisions
Penalties
Career Opportunities in Cyber Law
8/3/2019 0e8aCyber Law2
3/20
5/5/2012 Cyber Law 3
Introduction to Cyber Crime
The term Cybernetics was coined by theAmerican mathematician Robert Wiener in1940s to mean:
The Theory of Control and CommunicationProcesses
Cyber Crime can be defined as: Any crime with thehelp of computer and telecommunication
technology with the purpose of influencing thefunctioning of the computer and the computersystem.
8/3/2019 0e8aCyber Law2
4/20
5/5/2012 Cyber Law 4
Some Computer Crimes:
Logic Bombs
Trap Doors
Spamming Piggybacking
Virus, worms, Trojan Horse
E-Mail abuse etc.
8/3/2019 0e8aCyber Law2
5/20
5/5/2012 Cyber Law 5
Categories of Cyber Crime
Against a Person:1. Cyber staking
2. Impersonation
3. Loss of Privacy etc.
Against Property:
1. Unauthorized Computer trespassing
through Cyberspace
2. Computer vandalism
3. Harmful program transfer
4. e-cash5. money laundering
6. Copy Right etc.
8/3/2019 0e8aCyber Law2
6/20
5/5/2012 Cyber Law 6
Against Government:
1.Hacking2. Cyber Extortion3. NASA Website hacking
4. Cyber Terrorism
5. Computer Viruses
6. Counterfeiting currency & industrial Espionage etc.
Mafia Boy
8/3/2019 0e8aCyber Law2
7/205/5/2012 Cyber Law 7
HierarchyLaw
I.P.C.: Indian
PenalCode
Cr.P.C: Criminal
ProcedureCourt
Evidence Act
I.T. Act 2000
The term Cyber Law would mean law relating to the computer and computer network
8/3/2019 0e8aCyber Law2
8/205/5/2012 Cyber Law 8
Sections
22 25 29 30
31 32
43
44
69
45
65 66 67
68 70 71
72 502A 419A 417A
8/3/2019 0e8aCyber Law2
9/20
5/5/2012 Cyber Law 9
Sections in Law & Penalties
Section 43:of the act reads: If any person without permission of the
owner or any other person who in charge of the computer system ornetwork
a) ACCESS OR SECUER the access to such computer
b) DOWNLOAD, COPIES, or EXTRACTS any data from such computerc) Introduces causes to be introduced any computer contaminate or
COMPUTER VIRUS into any computer
d) DEMAGES any computer network
e) DISRUPTS or CAUSES DISRUPTION of any computer system
f) DENIAL or CAUSES DENIAL of access to any person authorized toaccess any computer system or network
g) CONTRAVENTION (break) or violates
h) CHANGES ACCOUNT SETTINGS
8/3/2019 0e8aCyber Law2
10/20
5/5/2012 Cyber Law 10
Continued. Section 43 PenaltyHe shall be liable to pay damages by the way of
compensation not exceeding ONE CRORE to personso affected.
8/3/2019 0e8aCyber Law2
11/20
5/5/2012 Cyber Law 11
Section 66
Hacking with Computer System(1) Information residing in a computer resources mustbe either:
Destroyed
Deleted Altered
Diminished in value or utility
Affected Injuriously
Punishment:
3 yrs. Or Fine up to 2 lac for hacking.
The offences are tribal by any magistrate.
8/3/2019 0e8aCyber Law2
12/20
5/5/2012 Cyber Law 12
Section 67
Section 67 of the Act reads: Whoever publishesor transmitted in the electronic form anymaterial which contains sexually explicit acts or
conduct shall be punished on first convictionwith imprisonment of either description for aterm which extend to ten lakh rupees and in theevent of second or subsequent conviction with
imprisonment of either description for a termwhich may extend to seven years and also withfine which may extend to ten lakh rupees.
8/3/2019 0e8aCyber Law2
13/20
5/5/2012 Cyber Law 13
Continued. Section 67 Penalty He shall be liable to pay 1 lakh and & or imprisonment of2 to 5
yrs.
And if same thing is repeated imprisonment of10 yrs.
8/3/2019 0e8aCyber Law2
14/20
5/5/2012 Cyber Law 14
Section 65
Tampering with computer source document:
Whoever knowingly or intentionally conceals, destroys or alter orintentionally or knowingly causes another to conceal, destroy or alter anycomputer source code used for a computer network, when the computersource code is required to be kept or maintained by law for the time being
in force, shall be punishable with imprisonment up to three years, or withfine which may extend up to two lakh rupees, or with both
Punishments:
Offences are magistrate and are punishable with imprisonment
up to 3 yrs. And / or fine up to Rs. 2 lakh
8/3/2019 0e8aCyber Law2
15/20
5/5/2012 Cyber Law 15
Section 69
Deals with the Interception, monitoring ordecryption of any information in theinterest of the sovereignty, integrity,
Security or defense of India, friendlyrelations with the with foreign states etc.
Punishment:
2 lakh and /or jail not extending 5 yrs.
8/3/2019 0e8aCyber Law2
16/20
5/5/2012 Cyber Law 16
Some other Sections
Section 72: Violation of the privacy policy---Fineup to 5 lakh jail not extending 2 yrs.
Section 502A: Publishing, Transmitting imagesof the private area of a person without his or herconsent---2yrs./2 lakh.
Section 419A: Cheating by any communicationdevice or computer resource--- 5yrs.
Section 417A: Identity Theft--- 2yrs.
8/3/2019 0e8aCyber Law2
17/20
5/5/2012 Cyber Law 17
Career Opportunities in Cyber Law
Research Cyber Law Researcher Get scholarship Present expertise
Academics Cyber Trainer Faculty Member
Consultancy
Security Policy Cyber Crime Investigation assisting Police Dept. Individual Cyber Crime Investigation Conduct legal Audits
8/3/2019 0e8aCyber Law2
18/20
5/5/2012 Cyber Law 18
Career Opportunities in Cyber Law
Drafting
You can draft Contracts relating to technologytransfer, intellectual property, & other e-commertial
documents
Litigation
Represent clients in Cyber Crime Cases
Multi crore Cases Provide expert opinion
Assist the investigation agency to detect the crime
8/3/2019 0e8aCyber Law2
19/20
5/5/2012 Cyber Law 19
Protect your Computers!
Use anti-virus software andfirewalls - keep them up to date
Keep your operating system up todate with critical security updatesand patches
Don't open emails or attachmentsfrom unknown sources
Use hard-to-guess passwords.Dont use words found in adictionary. Remember thatpassword cracking tools exist
Back-up your computer data ondisks or CDs often
Don't share access to yourcomputers with strangers
Ifyou have a wi-fi network,password protect it
Disconnect from the Internetwhen not in use
Reevaluate your security on aregular basis
Make sure your employees andfamily members know this infotoo!
8/3/2019 0e8aCyber Law2
20/20
5/5/2012 Cyber Law 20