SlideShare a Scribd company logo
1 of 23
Download to read offline
Cyber Law &
IT ACT 2000
Background for Cyberlaws

 In 1969 America’s Department of Defense commissioned the
  construction of a super network called ARPANET.
  The Advanced Research Projects Agency Network(ARPANET).
 Basically intended as a military network slowly grew and the internet
  was born.
 According to International Data Corporation (IDC), Approximately 163
  million individuals or entities will use the internet by the end of this year
  as opposed to 16.1 million in 1995.
 This present state of the Internet make the necessity of Cyberlaws
  more important.
Need for Cyberlaw


• Due to the anonymous nature of the Internet, it is possible to
  engage into a variety of criminal activities with impunity and
  people with intelligence, have been grossly misusing this
  aspect of the Internet to perpetuate criminal activities in
  cyberspace.

• Also the number of users are increasing rapidly.

• Hence the need for Cyberlaws arises.
Cyber Crime


• The Computer as a Target
  Using a computer to attack other computers.
  e.g. Hacking, Virus/Worm attacks, DOS attack etc.

• The Computer as a Weapon
  Using a computer to commit real world crimes.
  e.g. Cyber Terrorism, IPR violations, Credit card frauds,
  EFT frauds, Pornography etc.
Criminal Misuse of Information
          Technologies
Unauthorized access & Hacking
    Any kind of access without the permission of either the rightful owner
    or the person in charge of a computer, computer system or computer
    network.
    Every act committed towards breaking into a computer and/or
    network is hacking.

Trojan Attack
    The program that act like something useful but do the things that are
    quiet damping. The programs of this kind are called as Trojans.

  Virus and Worm attack
  A program that has capability to infect other programs and make copies
    of itself and spread into other programs is called virus.
  Programs that multiply like viruses but spread from computer to
    computer are called as worms.
E-mail related crimes
  Email Spamming
  Sending malicious codes through email
  Email bombingSending threatening emails
  Defamatory emails
  Email frauds

Denial of Service attacks
  Flooding a computer resource with more requests than it can handle.
   This causes the resource to crash thereby denying access of service
   to authorized users.
 attempts to "flood" a network, thereby preventing legitimate network
 traffic
 attempts to disrupt connections between two machines, thereby
 preventing access to a service
Cyber law


• Cyber law is a system of law and regulation for the
  cyber space. Simply speaking cyber law is a generic
  term which refers to all the legal and regulatory aspects
  of internet and the world wide web.
• The growth of Electronic Commerce has propelled the need
  for vibrant and effective regulatory mechanisms which would
  strengthen the legal infrastructure, and would be crucial for
  the success of Electronic Commerce.
• The cyberlaw of India is defined under IT Act, 2000
IT ACT 2000


• The Act came into effect following the clearance of the
  Information Technology Bill 2000 in May 2000 by both the
  houses of the Parliament. The Bill received the assent of the
  President Of India in August 2000 (IT Act 2000).
• The IT Act 2000 attempts to change outdated laws and
  provides ways to deal with cyber crimes. Such an act is
  required as people can perform purchase transactions over
  the net through credit cards without fear of getting misused.
• IT Act 2000 is very important to control cyber crime.
Various Objectives of IT ACT 2000

• Chapter-II of the Act specifically stipulates that any subscriber
  may authenticate an electronic record by affixing his digital
  signature.
• Chapter-IV of the said Act gives a scheme for Regulation of
  Certifying Authorities. The Act envisages a Controller of Certifying
  Authorities who shall perform the function of exercising
  supervision over the activities of the Certifying Authorities as also
  laying down standards and conditions governing the Certifying
  Authorities as also specifying the various forms and content of
  Digital Signature Certificates.
• Chapter-VII of the Act details about the scheme of things relating
  to Digital Signature Certificates. The duties of subscribers are
  also enshrined in the said Act.
Various Objectives of IT ACT 2000

• Chapter-IX of the said Act talks about penalties and adjudication
  for various offences. The penalties for damage to computer,
  computer systems etc. has been fixed as damages by way of
  compensation not exceeding Rs. 1,00,00,000 to affected persons.
• Chapter-X of the Act talks of the establishment of the Cyber
  Regulations Appellate Tribunal, which shall be an appellate body
  where appeals against the orders passed by the Adjudicating
  Officers, shall be preferred.
• Chapter-XI of the Act talks about various offences and the said
  offences shall be investigated only by a Police Officer not below
  the rank of Deputy Superintendent of Police. These offences
  include tampering with computer source documents, publishing of
  information, hacking which is obscene in electronic form.
Various Objectives of IT ACT 2000



The Act also provides for the constitution of the Cyber
Regulations Advisory Committee, which shall advice
the government as regards any rules, or for any other
purpose connected with the said act.
Advantage of IT ACT 2000

•   The E-commerce industry carries out its business via
    transactions and communications done through electronic
    records. It thus becomes essential that such transactions be
    made legal.
•   The Act legalizes the e-mail and gives it the status of being
    valid form of carrying out communication in India. This implies
    that e-mails can be duly produced and approved in a court of
    law as a legal document.
•   The Act now allows Government to issue notification on the
    web thus helping E-governance.
•   It eases the task of companies of the filing any form, application
    or document by laying down the guidelines to be submitted at
    any appropriate office, authority, body or agency owned or
    controlled by the government.
Advantage of IT ACT 2000

• The act also provides statutory remedy to the corporate in
  case the crime against the accused for breaking into their
  computer systems or network and damaging and copying
  the data is proven. The remedy provided by the Act is in the
  form of monetary damages, not exceeding Rs. 1 crore.

• The law has also laid guidelines for providing Internet
  Services on a license on a non-exclusive basis.

• The law sets up the Territorial Jurisdiction of the
  Adjudicating Officers for cyber crimes and the Cyber
  Regulations Appellate Tribunal.
Criticism of IT Act 2000

•   The law misses out completely the issue of Intellectual
    Property Rights, and makes no provisions whatsoever for
    copyrighting, trade marking or patenting of electronic
    information and data.

•   The law even stays silent over the regulation of electronic
    payments gateway and segregates the negotiable
    instruments from the applicability of the IT Act.

•   The act empowers the Deputy Superintendent of Police to
    look up into the investigations and filling of charge sheet
    when any case related to cyber law is called.
Criticism of IT Act 2000

•   Internet is a borderless medium; it spreads to every corner
    of the world where life is possible and hence is the cyber
    criminal.

•   Adequate and reasonable provisions must me made in the
    IT Act, 2000 regarding “Internet censorship”
Digital Signature


• Digital signature provides authentication to an electronic
  record.
• Makes electronic document valid. Carry same property as of
  a handwritten signature on a paper.
• It consist of public key and a private key.
   – Private key is allocated to a individual which enables the user to fix a
     digital signature.
   – Public key is available to all who want to check authentication of
     records.


   The key are provided by regulatory authorities and are
   unique.
Benefit of Digital Signature


Benefits of Digital Signature

• Authentication
• Integrity

Drawbacks of Digital Signature

• Doesn’t provide certainty of date and time
Few tips to protect you from cyber
           crime

• Protect your PC

  •   Use a firewall
  •   Install anti-virus software and prevent virus infections.
  •   Make regular backups
  •   Secure wireless networks
  •   Get the latest updates and browse the internet safely.
Few tips to protect you from cyber
            crime

• Protect yourself

   •   Bank online safely
   •   Shop only safely
   •   Use strong passwords
   •   Be careful with file sharing
   •   Protect your privacy
Making Cyber law more effective

• A sound Cyber law regime:
   It is important to realize that we need “qualitative law” and not
      “quantitative law”.

• A sound enforcement machinery:
  A law might have been properly enacted and may be theoretically
  effective too but it is useless unless enforced in its true letter and
  spirit. The law enforcement machinery in India is not well
  equipped to deal with cyber law offences and contraventions.

• A sound judicial system:
  A sound judicial system is the backbone for preserving the law
  and order in a society. In short, the dream for an “Ideal Cyber Law
  in India” requires a “considerable” amount of time, money and
  resources.
Cyber Law Cases in India


• Parliament Attack Case

• Official Website of Maharashtra Government Hacked

• City Principal Seeks Police Help To Stop Cyber Crime

• Community sites: The new Danger
Conclusions

• Computer – related crime is a real.
• Increase in number of crimes.
• Law should be alter as and when required.
• Cyber law defined as a though full group conversation about
  core values and distinct benefits to the society will persist .
• Law as that applicable to physical , geographically defined
  territories.
• It is the duty of every citizen to contribute toward making the
  said cyber space.
Thank You

More Related Content

What's hot

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 

What's hot (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
It act 2000
It act 2000It act 2000
It act 2000
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 

Viewers also liked

Viewers also liked (8)

Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber law-it-act-2000

Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

Similar to Cyber law-it-act-2000 (20)

Cyber
CyberCyber
Cyber
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Cyber law-it-act-2000

  • 1. Cyber Law & IT ACT 2000
  • 2. Background for Cyberlaws  In 1969 America’s Department of Defense commissioned the construction of a super network called ARPANET. The Advanced Research Projects Agency Network(ARPANET).  Basically intended as a military network slowly grew and the internet was born.  According to International Data Corporation (IDC), Approximately 163 million individuals or entities will use the internet by the end of this year as opposed to 16.1 million in 1995.  This present state of the Internet make the necessity of Cyberlaws more important.
  • 3. Need for Cyberlaw • Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. • Also the number of users are increasing rapidly. • Hence the need for Cyberlaws arises.
  • 4. Cyber Crime • The Computer as a Target Using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. • The Computer as a Weapon Using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 5. Criminal Misuse of Information Technologies Unauthorized access & Hacking Any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Every act committed towards breaking into a computer and/or network is hacking. Trojan Attack The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. Virus and Worm attack A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 6. E-mail related crimes Email Spamming Sending malicious codes through email Email bombingSending threatening emails Defamatory emails Email frauds Denial of Service attacks Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. attempts to "flood" a network, thereby preventing legitimate network traffic attempts to disrupt connections between two machines, thereby preventing access to a service
  • 7. Cyber law • Cyber law is a system of law and regulation for the cyber space. Simply speaking cyber law is a generic term which refers to all the legal and regulatory aspects of internet and the world wide web. • The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would strengthen the legal infrastructure, and would be crucial for the success of Electronic Commerce. • The cyberlaw of India is defined under IT Act, 2000
  • 8. IT ACT 2000 • The Act came into effect following the clearance of the Information Technology Bill 2000 in May 2000 by both the houses of the Parliament. The Bill received the assent of the President Of India in August 2000 (IT Act 2000). • The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. Such an act is required as people can perform purchase transactions over the net through credit cards without fear of getting misused. • IT Act 2000 is very important to control cyber crime.
  • 9. Various Objectives of IT ACT 2000 • Chapter-II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. • Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities. The Act envisages a Controller of Certifying Authorities who shall perform the function of exercising supervision over the activities of the Certifying Authorities as also laying down standards and conditions governing the Certifying Authorities as also specifying the various forms and content of Digital Signature Certificates. • Chapter-VII of the Act details about the scheme of things relating to Digital Signature Certificates. The duties of subscribers are also enshrined in the said Act.
  • 10. Various Objectives of IT ACT 2000 • Chapter-IX of the said Act talks about penalties and adjudication for various offences. The penalties for damage to computer, computer systems etc. has been fixed as damages by way of compensation not exceeding Rs. 1,00,00,000 to affected persons. • Chapter-X of the Act talks of the establishment of the Cyber Regulations Appellate Tribunal, which shall be an appellate body where appeals against the orders passed by the Adjudicating Officers, shall be preferred. • Chapter-XI of the Act talks about various offences and the said offences shall be investigated only by a Police Officer not below the rank of Deputy Superintendent of Police. These offences include tampering with computer source documents, publishing of information, hacking which is obscene in electronic form.
  • 11. Various Objectives of IT ACT 2000 The Act also provides for the constitution of the Cyber Regulations Advisory Committee, which shall advice the government as regards any rules, or for any other purpose connected with the said act.
  • 12. Advantage of IT ACT 2000 • The E-commerce industry carries out its business via transactions and communications done through electronic records. It thus becomes essential that such transactions be made legal. • The Act legalizes the e-mail and gives it the status of being valid form of carrying out communication in India. This implies that e-mails can be duly produced and approved in a court of law as a legal document. • The Act now allows Government to issue notification on the web thus helping E-governance. • It eases the task of companies of the filing any form, application or document by laying down the guidelines to be submitted at any appropriate office, authority, body or agency owned or controlled by the government.
  • 13. Advantage of IT ACT 2000 • The act also provides statutory remedy to the corporate in case the crime against the accused for breaking into their computer systems or network and damaging and copying the data is proven. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore. • The law has also laid guidelines for providing Internet Services on a license on a non-exclusive basis. • The law sets up the Territorial Jurisdiction of the Adjudicating Officers for cyber crimes and the Cyber Regulations Appellate Tribunal.
  • 14. Criticism of IT Act 2000 • The law misses out completely the issue of Intellectual Property Rights, and makes no provisions whatsoever for copyrighting, trade marking or patenting of electronic information and data. • The law even stays silent over the regulation of electronic payments gateway and segregates the negotiable instruments from the applicability of the IT Act. • The act empowers the Deputy Superintendent of Police to look up into the investigations and filling of charge sheet when any case related to cyber law is called.
  • 15. Criticism of IT Act 2000 • Internet is a borderless medium; it spreads to every corner of the world where life is possible and hence is the cyber criminal. • Adequate and reasonable provisions must me made in the IT Act, 2000 regarding “Internet censorship”
  • 16. Digital Signature • Digital signature provides authentication to an electronic record. • Makes electronic document valid. Carry same property as of a handwritten signature on a paper. • It consist of public key and a private key. – Private key is allocated to a individual which enables the user to fix a digital signature. – Public key is available to all who want to check authentication of records. The key are provided by regulatory authorities and are unique.
  • 17. Benefit of Digital Signature Benefits of Digital Signature • Authentication • Integrity Drawbacks of Digital Signature • Doesn’t provide certainty of date and time
  • 18. Few tips to protect you from cyber crime • Protect your PC • Use a firewall • Install anti-virus software and prevent virus infections. • Make regular backups • Secure wireless networks • Get the latest updates and browse the internet safely.
  • 19. Few tips to protect you from cyber crime • Protect yourself • Bank online safely • Shop only safely • Use strong passwords • Be careful with file sharing • Protect your privacy
  • 20. Making Cyber law more effective • A sound Cyber law regime: It is important to realize that we need “qualitative law” and not “quantitative law”. • A sound enforcement machinery: A law might have been properly enacted and may be theoretically effective too but it is useless unless enforced in its true letter and spirit. The law enforcement machinery in India is not well equipped to deal with cyber law offences and contraventions. • A sound judicial system: A sound judicial system is the backbone for preserving the law and order in a society. In short, the dream for an “Ideal Cyber Law in India” requires a “considerable” amount of time, money and resources.
  • 21. Cyber Law Cases in India • Parliament Attack Case • Official Website of Maharashtra Government Hacked • City Principal Seeks Police Help To Stop Cyber Crime • Community sites: The new Danger
  • 22. Conclusions • Computer – related crime is a real. • Increase in number of crimes. • Law should be alter as and when required. • Cyber law defined as a though full group conversation about core values and distinct benefits to the society will persist . • Law as that applicable to physical , geographically defined territories. • It is the duty of every citizen to contribute toward making the said cyber space.