SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali   [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law  &  IPR Expert Email Crimes & Indian Cyber Law
INTRODUCTION  ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
DIFFERENT TYPES OF CYBERCRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
E-MAIL RELATED CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount  of  $8000000 USD
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
1. Email Lottery Scam (Nigerian 419 Scam)  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable  Section 415,416, 417 420 of IPC  
2. Sending Malicious Codes through email  w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
3.  Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber  jams your inbox continuously with same emails
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b)  If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability :  Compensation to be paid Section(66)  :  Imprisonment upto 3yrs  OR   Fine up to 5 Lakhs OR Both Also Applicable  Section 379,405,420 of IPC
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist  Javed Akhtar  has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section  66-A   Punishment for sending offensive messages through  communication service, etc.      Any person who sends, by means of a computer resource or a communication device,- a) any   information  that is grossly offensive or has menacing character; or b) any   information  which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred,  or ill will, persistently makes  by making  use of such computer resource or a  communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with  imprisonment for a term which may extend to two three years  and with fine.
6. Emails containing sexually explicit act etc w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 66 and 43(d)  :  DATA DIDDLING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines  Cyber Terrorism and  Section 66-F(2) Specifies Punishment of imprisonment  which may extend to imprisonment for life
Section 66C:  IDENTITY THEFT ,[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section 66C: IDENTITY THEFT- CASE STUDY ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section(66) : CREDIT CARD FRAUD ,[object Object],[object Object],[object Object]
Section(66) :  PHISHING  ,[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Section(66) :  PHISHING Case Study ,[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
EMAIL  DEFAMATION CASE  ,[object Object],[object Object],[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
Tata Sons v. Greenpeace International  Delhi HC  IA 9089/2010 in CS (OS) 1407/2010 ,[object Object],[object Object],w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You   Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell:  9821763157

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 

Was ist angesagt? (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Shilpa
ShilpaShilpa
Shilpa
 

Andere mochten auch

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Km Introduction PowerPoint
Km Introduction PowerPointKm Introduction PowerPoint
Km Introduction PowerPointHoward Gregory
 
Introduction to knowledge management
Introduction to knowledge managementIntroduction to knowledge management
Introduction to knowledge managementNiyitegekabilly
 
Knowledge Management system in current scenario.
Knowledge Management system in current scenario.Knowledge Management system in current scenario.
Knowledge Management system in current scenario.suba ramanujam
 
Knowledge management at infosys
Knowledge management at infosysKnowledge management at infosys
Knowledge management at infosysSupriya M D
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
 
Knowledge management system priyank
Knowledge management system priyankKnowledge management system priyank
Knowledge management system priyankPRIYANK JAIN
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic CommerceDarlene Enderez
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contractsVijay Dalmia
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesMichael Norton
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
E cash payment system
E cash payment systemE cash payment system
E cash payment systemRKPD
 

Andere mochten auch (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Km Introduction PowerPoint
Km Introduction PowerPointKm Introduction PowerPoint
Km Introduction PowerPoint
 
Introduction to knowledge management
Introduction to knowledge managementIntroduction to knowledge management
Introduction to knowledge management
 
Knowledge Management system in current scenario.
Knowledge Management system in current scenario.Knowledge Management system in current scenario.
Knowledge Management system in current scenario.
 
Knowledge management at infosys
Knowledge management at infosysKnowledge management at infosys
Knowledge management at infosys
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Knowledge management system priyank
Knowledge management system priyankKnowledge management system priyank
Knowledge management system priyank
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & Techniques
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
E cash payment system
E cash payment systemE cash payment system
E cash payment system
 
E payment
E paymentE payment
E payment
 
Technology management
Technology managementTechnology management
Technology management
 

Ähnlich wie Email crimes and Cyber Law-Nasscom Cyber safe 2010

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 

Ähnlich wie Email crimes and Cyber Law-Nasscom Cyber safe 2010 (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Hacking laws in india
Hacking laws in indiaHacking laws in india
Hacking laws in india
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 

Mehr von Adv Prashant Mali

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant maliAdv Prashant Mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliAdv Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summitAdv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 

Mehr von Adv Prashant Mali (15)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 

Email crimes and Cyber Law-Nasscom Cyber safe 2010

  • 1. Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Adv. Prashant Mali [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law & IPR Expert Email Crimes & Indian Cyber Law
  • 2.
  • 3.
  • 4.
  • 5. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m An Email Sample showing email received from Microsoft , for winning A lottery amount of $8000000 USD
  • 6. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 7. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 8. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 9. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 10. 1. Email Lottery Scam (Nigerian 419 Scam) w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Legal Status The nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft Also Applicable Section 415,416, 417 420 of IPC  
  • 11. 2. Sending Malicious Codes through email w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The attachment is actually a Trojan file which still can escape detection by some antivirus products
  • 12. 3. Email bombing w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL The email bomber jams your inbox continuously with same emails
  • 13. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 14. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 15. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL
  • 16. 4. Illegal Email Forwarding w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section(43)(b) If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium; Civil Liability : Compensation to be paid Section(66) : Imprisonment upto 3yrs OR Fine up to 5 Lakhs OR Both Also Applicable Section 379,405,420 of IPC
  • 17. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL New Delhi, May 15: Noted lyricist Javed Akhtar has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women. Akhtar has informed the police about the messages which told him that “your countdown has begun”.
  • 18. 5. Sending threatening/Defamatory emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-A   Punishment for sending offensive messages through communication service, etc.     Any person who sends, by means of a computer resource or a communication device,- a) any  information that is grossly offensive or has menacing character; or b) any  information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such shall be punishable with imprisonment for a term which may extend to two three years and with fine.
  • 19.
  • 20.
  • 21. 7. Spreading Communal Disharmony thru Emails w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Section 66-F(1) Defines Cyber Terrorism and Section 66-F(2) Specifies Punishment of imprisonment which may extend to imprisonment for life
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. QUESTIONS w w w . c y b e r l a w c o n s u l t i n g . c o m CONFIDENTIAL Thank You Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell: 9821763157