SlideShare a Scribd company logo
1 of 16
PRESENTATION ON
   CYBER LAWS
BIBLIOGRAPHY
• LAWS RELATING TO
  COMPUTER,INTERNET AND E-
  COMMERCE.
• BY:NANDAN KAMATH
• LEGAL ASPECTS OF BUSINESS
•   BY:AKHILESHWAR PATHAK

• COMPANY LAW
•   BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA


•   www.google.com
•   www.altavista.com
CONTENTS
• INTRODUCTION
• NEED FOR CYBER LAWS
• CYBER LAWS IN INDIA
• CYBER CRIMES
• OFFENCES AND LAWS IN CYBER
  SPACE
• CYBER LAWS AMENDMENTS
• CONCLUSION
INTRODUCTION
• GROWTH OF
  CYBER SPACE

• ONSET OF
  INTERNET

• CYBER LAW OR
  LAW OF
  INTERNET
NEED FOR CYBER LAWS

• TACKLING CYBER
  CRIMES

• INTELLECTUAL
  PROPERTY RIGHTS
  AND COPYRIGHTS
  PROTECTION ACT
CYBER LAWS IN INDIA
• ITACT PASSED IN
  2000
• INTERNET IN
  INDIA
• IMPLEMENTATION
  OF CYBER LAW
• REASONS FOR
  DELAY IN
  IMPLEMENTATION
  OF CYBER LAWS IN
  INDIA
IT ACT PROVISIONS
• email would now be a valid and legal form of
  communication in our country that can be duly
  produced and approved in a court of law.

• Companies shall now be able to carry out
  electronic commerce using the legal infrastructure
  provided by the Act.

• Digital signatures have been given legal validity
  and sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
  notification on the web thus heralding e-
  governance

• statutory remedy in case if anyone breaks
  into companies computer systems or
  network and causes damages or copies data
CYBER CRIMES
• CYBER CRIMES AGAINST
  PERSONS
  eg ‘melissa’and ‘lovebug’ virus
• CYBER CRIMES AGAINST
  PROPERTY
  eg computer vandalism
• CYBER CRIMES AGAINST
  GOVERNMENT
• eg ‘Al-Qaeda’
CYBER CRIMES
CRIME THROUGH ORKUT
• Koushambi ,24-year
  old software
  professional
  working for TCS
  was brutally killed
  by Manish Thakur,
  in a hotel room at
  Andheri.
INTERNET AND ITS EFFECT
• 20% - 30% of Internet
  pornography consumption is by
  children of ages 12 - 17.

• MySpace is being used by
  predators to meet and entice
  kids online.

• Specific marketing strategies
  are being used to attract
  children to porn sites.
OFFENCES AND LAWS IN
       CYBER SPACE
• TAMPERING WITH
  COMPUTER
  DOCUMENTS
• HACKING WITH
  COMPUTER SYSTEM
• PUBLISHING OBSCENE
  MATERIAL ON
  INTERNET
• BREACHING OF
  CONFIDENTIALITY
  AND PRIVACY
CYBER LAWS AMENDMENTS
• INDIAN PENAL CODE,1860

• INDIAN EVIDENCE ACT,1872

• BANKER’S BOOK EVIDENCE ACT,1891

• GENERAL CLAUSES ACT,1897
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
  IN TODAYS WORLD OF INTERNET



• ACHIEVING GLOBAL PEACE AND
  HARMONY
THANK YOU

•   QUERIES WELCOMED

More Related Content

What's hot

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

What's hot (20)

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked (12)

Cyber security
Cyber securityCyber security
Cyber security
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Similar to Cyber laws

Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 

Similar to Cyber laws (20)

cyber-laws (1).ppt
cyber-laws (1).pptcyber-laws (1).ppt
cyber-laws (1).ppt
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Akhila
AkhilaAkhila
Akhila
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Cyber laws

  • 1. PRESENTATION ON CYBER LAWS
  • 2. BIBLIOGRAPHY • LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE. • BY:NANDAN KAMATH • LEGAL ASPECTS OF BUSINESS • BY:AKHILESHWAR PATHAK • COMPANY LAW • BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA • www.google.com • www.altavista.com
  • 3. CONTENTS • INTRODUCTION • NEED FOR CYBER LAWS • CYBER LAWS IN INDIA • CYBER CRIMES • OFFENCES AND LAWS IN CYBER SPACE • CYBER LAWS AMENDMENTS • CONCLUSION
  • 4. INTRODUCTION • GROWTH OF CYBER SPACE • ONSET OF INTERNET • CYBER LAW OR LAW OF INTERNET
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • INTERNET IN INDIA • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 7. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 8. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 9. CYBER CRIMES • CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus • CYBER CRIMES AGAINST PROPERTY eg computer vandalism • CYBER CRIMES AGAINST GOVERNMENT • eg ‘Al-Qaeda’
  • 11. CRIME THROUGH ORKUT • Koushambi ,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.
  • 12. INTERNET AND ITS EFFECT • 20% - 30% of Internet pornography consumption is by children of ages 12 - 17. • MySpace is being used by predators to meet and entice kids online. • Specific marketing strategies are being used to attract children to porn sites.
  • 13. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 14. CYBER LAWS AMENDMENTS • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872 • BANKER’S BOOK EVIDENCE ACT,1891 • GENERAL CLAUSES ACT,1897
  • 15. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY
  • 16. THANK YOU • QUERIES WELCOMED