SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Cyber Crime
Cyber crime is unlawful acts wherein the computer is either a tool or a
target or both..
Using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
Using a computer as Weapon to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
Pornography etc
The Cost of Cybercrime
In India in 2010:
29.9 million people fell victim to cybercrime
$4 billion in direct financial losses
$3.6 billion in time spent resolving the crime
4 in 5 online adults (80%) have been a victim of cybercrime
17% of adults online have experienced cybercrime on their
mobile phone
20% - 30% of Internet pornography consumption is by
children of ages 12 - 17.
Annual loss = 50 billion.
Source: Norton Cybercrime Report 2011
Why India?
A rapidly growing online user base
– 121 million internet users
– 65 million active internet users, up 28%
from 51 million in 2010
– 50 million users shop online on
ecommerce and online shopping sites
– 46+ million social network users
– 346 million mobile users had subscribed
to data packages
Source: IAMAI; Juxt; wearesocial 2011
• The majority of cybercrimes are centered on forgery, fraud and
phishing
• India is the third-most targeted country for phishing attacks
after the US and the UK
• Social networks as well as ecommerce sites are major targets
• 6.9 million bot-infected systems in 2010
• 14,348 website defacements in 2010
• Defaced in 2011
• 15,000 sites hacked in 2011
• India is the number 1 country in the world for generating spam
What kind of cybercrimes?
6,850
4,150
Cyber Crime Brief Description Relevant Section
in IT Act
Punishments
Cyber Stalking Stealthily following a person, tracking
his internet chats.
43, 65, 66 3 years, or with
fine up to 2 lakh
Cyber Pornography
including child pornography
Publishing Obscene in Electronic
Form involving children
67, 67 (2) 10 years and with
fine may extends
to 10 lakh
Intellectual Property Crimes Source Code Tampering, piracy,
copyright infringement etc.
65 3 years, or with
fine up to 2 lakh
Cyber Terrorism Protection against cyber terrorism 69 Imprisonment for
a term, may
extend to 7 years
Cyber Hacking Destruction, deletion, alteration, etc in
a computer resources
66 3 years, or with
fine up to 2 lakh
Phishing Bank Financial Frauds in Electronic
Banking
43, 65, 66 3 years, or with
fine up to 2 lakh
Privacy Unauthorised access to computer 43, 66, 67, 69, 72
• Unauthorized access & Hacking
• Trojan Attack, Virus and Worm attack
• E-mail & IRC related crimes
1. Email spoofing
2. Email Spamming
3. Sending malicious codes through email
4. Email bombing
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
• Three main ways to attack IRC are: Attacks, Clone Attacks, and Flood
Attacks.
• Denial of Service attacks
• Telecom Fraud (Phreaking)
• CD/DVD Cloning
Cyber law is a term used to describe the legal issues
related to use of communications technology, particularly
"cyberspace", i.e. the Internet.
.
CYBER LAW
Cyber Law in India
Information Technology Act 2000- Preface Stating
Objectives
“To provide legal recognition for transactions carried out by means
of electronic data interchange and other means of electronic
communication, commonly referred to as "electronic commerce",
which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic
filing of documents with the Government agencies and further to
amend the :-
Indian Penal Code 1860.
Indian Evidence Act, 1872
Bankers' Books Evidence Act, 1891
Reserve Bank of India Act, 1934
Information Technology Act, 2000
The Information Technology Act, 2000, was made effective from 17
October 2000.
The Act essentially deals with the following issues:
• Legal Recognition of Electronic Documents
• Legal Recognition of Digital Signatures
• Offenses and Contraventions
• Justice Dispensation Systems for cyber crimes.
• Retention of electronic record
•Authentication of electronic records
• The Amendment was created to address
issues that the original bill failed to cover
• The original Act was developed to promote
the IT industry, regulate e-commerce, facilitate
e-governance and prevent cybercrime
• The Act has provided Indian government with
the power of surveillance, monitoring and
blocking data traffic
Information Technology Amendment
Act 2008
Information Technology Amendment
Act 2008
This Amendment Act was made effective from 27 October 2009.
passed in – 2008 & propsed in 2006.
Some of the notable features of the ITAA are as follows:
• Focussing on data privacy
• Focussing on Information Security
• Defining cyber cafe
• Making digital signature technology neutral
• Redefining the role of intermediaries
• Recognising the role of Indian Computer Emergency Response Team
• Inclusion of cyber crimes like child pornography and cyber terrorism
• authorizing an Inspector to investigate cyber offences (as against the
DSP earlier)
What should government tackle?
• The police have recorded 3,038 cases but
made only 2,700 arrests in 3 years
(between 2007 and 2010)
• India registered only 1,350 cases under the
IT Act and IPC in 2010
• 50% of cybercrimes are not even reported
• Why are so few cases are reported and
does that mean the legislation is
inadequate?
Some Cases
• Cubby, Inc v. CompuServe, Inc. - allegedly defamatory statements
• State Bank of India vs. Rizvi Exports Ltd – Evidence printout of
accounts
• Ritu Kohli Case - cyber stalking
• State of Maharashtra v/s Anand Ashok Khare - online obscenity
• State v/s Amit Prasad - India's first case of hacking registered under
Section 66
• Arif Azim case - mis-use of credit cards numbers by a
Call Centre employee
• The Arzika case- Pornography and obscene electronic
Arrests & Reports under IT Act
• Under the IT Act, 966 cybercrime cases were filed in 2010
420 in 2009)
• Geographic breakdown of cases reported:
– 153 from Karnataka,
– 148 from Kerala
– 142 from Maharashtra
– 105 Andhra Pradesh
– 52 Rajasthan
– 52 Punjab
• 233 persons were arrested in 2010
• 33% of the cases registered were related to Cracking (hacking)
Source: National Crime Records Bureau
Arrests & Reports under IPC
• Under the IPC, 356 cybercrime cases were registered in 2010 (276
cases in 2009)
• Geographic breakdown of cases reported
– 104 from Maharashtra
– 66 Andhra Pradesh
– 46 Chhattisgarh
The majority of these crimes were either
forgery or fraud cases.
Source: National Crime Records Bureau
138740042-cyber-law.pptx

Weitere ähnliche Inhalte

Ähnlich wie 138740042-cyber-law.pptx

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Information technology act
Information technology actInformation technology act
Information technology actDeepthiPrabhu9
 

Ähnlich wie 138740042-cyber-law.pptx (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
IT Act
IT ActIT Act
IT Act
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Information technology act
Information technology actInformation technology act
Information technology act
 

Mehr von Rahuljain40418

resaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).pptresaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).pptRahuljain40418
 
Contract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptxContract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptxRahuljain40418
 
DOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdfDOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdfRahuljain40418
 
Common Sense, Law and Public Policy - LPP2023 .pdf
Common Sense, Law and Public Policy - LPP2023  .pdfCommon Sense, Law and Public Policy - LPP2023  .pdf
Common Sense, Law and Public Policy - LPP2023 .pdfRahuljain40418
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
Itmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdfItmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdfRahuljain40418
 
sairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdfsairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdfRahuljain40418
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
fundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdffundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdfRahuljain40418
 
mtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdfmtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdfRahuljain40418
 

Mehr von Rahuljain40418 (20)

resaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).pptresaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).ppt
 
Contract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptxContract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptx
 
ESI ACT 1948 PPT.pptx
ESI ACT 1948 PPT.pptxESI ACT 1948 PPT.pptx
ESI ACT 1948 PPT.pptx
 
DOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdfDOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdf
 
Common Sense, Law and Public Policy - LPP2023 .pdf
Common Sense, Law and Public Policy - LPP2023  .pdfCommon Sense, Law and Public Policy - LPP2023  .pdf
Common Sense, Law and Public Policy - LPP2023 .pdf
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Pty
PtyPty
Pty
 
Itmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdfItmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdf
 
sairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdfsairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdf
 
Yuu
YuuYuu
Yuu
 
Kyu constitutes
Kyu constitutes Kyu constitutes
Kyu constitutes
 
Copying
Copying Copying
Copying
 
ilovepdf_merged.pptx
ilovepdf_merged.pptxilovepdf_merged.pptx
ilovepdf_merged.pptx
 
Ppt of condt
Ppt of condtPpt of condt
Ppt of condt
 
LL4.pptx
LL4.pptxLL4.pptx
LL4.pptx
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
fundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdffundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdf
 
mtp-210624165737.pdf
mtp-210624165737.pdfmtp-210624165737.pdf
mtp-210624165737.pdf
 
LL4.pptx
LL4.pptxLL4.pptx
LL4.pptx
 
mtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdfmtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdf
 

Kürzlich hochgeladen

Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
Divorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfDivorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfdigitalnikesh24
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 

Kürzlich hochgeladen (20)

Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Divorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfDivorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdf
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 

138740042-cyber-law.pptx

  • 1.
  • 2. Cyber Crime Cyber crime is unlawful acts wherein the computer is either a tool or a target or both.. Using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. Using a computer as Weapon to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc
  • 3. The Cost of Cybercrime In India in 2010: 29.9 million people fell victim to cybercrime $4 billion in direct financial losses $3.6 billion in time spent resolving the crime 4 in 5 online adults (80%) have been a victim of cybercrime 17% of adults online have experienced cybercrime on their mobile phone 20% - 30% of Internet pornography consumption is by children of ages 12 - 17. Annual loss = 50 billion. Source: Norton Cybercrime Report 2011
  • 4. Why India? A rapidly growing online user base – 121 million internet users – 65 million active internet users, up 28% from 51 million in 2010 – 50 million users shop online on ecommerce and online shopping sites – 46+ million social network users – 346 million mobile users had subscribed to data packages Source: IAMAI; Juxt; wearesocial 2011
  • 5. • The majority of cybercrimes are centered on forgery, fraud and phishing • India is the third-most targeted country for phishing attacks after the US and the UK • Social networks as well as ecommerce sites are major targets • 6.9 million bot-infected systems in 2010 • 14,348 website defacements in 2010 • Defaced in 2011 • 15,000 sites hacked in 2011 • India is the number 1 country in the world for generating spam What kind of cybercrimes? 6,850 4,150
  • 6. Cyber Crime Brief Description Relevant Section in IT Act Punishments Cyber Stalking Stealthily following a person, tracking his internet chats. 43, 65, 66 3 years, or with fine up to 2 lakh Cyber Pornography including child pornography Publishing Obscene in Electronic Form involving children 67, 67 (2) 10 years and with fine may extends to 10 lakh Intellectual Property Crimes Source Code Tampering, piracy, copyright infringement etc. 65 3 years, or with fine up to 2 lakh Cyber Terrorism Protection against cyber terrorism 69 Imprisonment for a term, may extend to 7 years Cyber Hacking Destruction, deletion, alteration, etc in a computer resources 66 3 years, or with fine up to 2 lakh Phishing Bank Financial Frauds in Electronic Banking 43, 65, 66 3 years, or with fine up to 2 lakh Privacy Unauthorised access to computer 43, 66, 67, 69, 72
  • 7. • Unauthorized access & Hacking • Trojan Attack, Virus and Worm attack • E-mail & IRC related crimes 1. Email spoofing 2. Email Spamming 3. Sending malicious codes through email 4. Email bombing 5. Sending threatening emails 6. Defamatory emails 7. Email frauds 8. IRC related • Three main ways to attack IRC are: Attacks, Clone Attacks, and Flood Attacks. • Denial of Service attacks • Telecom Fraud (Phreaking) • CD/DVD Cloning
  • 8. Cyber law is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. . CYBER LAW
  • 9. Cyber Law in India Information Technology Act 2000- Preface Stating Objectives “To provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the :- Indian Penal Code 1860. Indian Evidence Act, 1872 Bankers' Books Evidence Act, 1891 Reserve Bank of India Act, 1934
  • 10. Information Technology Act, 2000 The Information Technology Act, 2000, was made effective from 17 October 2000. The Act essentially deals with the following issues: • Legal Recognition of Electronic Documents • Legal Recognition of Digital Signatures • Offenses and Contraventions • Justice Dispensation Systems for cyber crimes. • Retention of electronic record •Authentication of electronic records
  • 11. • The Amendment was created to address issues that the original bill failed to cover • The original Act was developed to promote the IT industry, regulate e-commerce, facilitate e-governance and prevent cybercrime • The Act has provided Indian government with the power of surveillance, monitoring and blocking data traffic Information Technology Amendment Act 2008
  • 12. Information Technology Amendment Act 2008 This Amendment Act was made effective from 27 October 2009. passed in – 2008 & propsed in 2006. Some of the notable features of the ITAA are as follows: • Focussing on data privacy • Focussing on Information Security • Defining cyber cafe • Making digital signature technology neutral • Redefining the role of intermediaries • Recognising the role of Indian Computer Emergency Response Team • Inclusion of cyber crimes like child pornography and cyber terrorism • authorizing an Inspector to investigate cyber offences (as against the DSP earlier)
  • 13. What should government tackle? • The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010) • India registered only 1,350 cases under the IT Act and IPC in 2010 • 50% of cybercrimes are not even reported • Why are so few cases are reported and does that mean the legislation is inadequate?
  • 14. Some Cases • Cubby, Inc v. CompuServe, Inc. - allegedly defamatory statements • State Bank of India vs. Rizvi Exports Ltd – Evidence printout of accounts • Ritu Kohli Case - cyber stalking • State of Maharashtra v/s Anand Ashok Khare - online obscenity • State v/s Amit Prasad - India's first case of hacking registered under Section 66 • Arif Azim case - mis-use of credit cards numbers by a Call Centre employee • The Arzika case- Pornography and obscene electronic
  • 15. Arrests & Reports under IT Act • Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009) • Geographic breakdown of cases reported: – 153 from Karnataka, – 148 from Kerala – 142 from Maharashtra – 105 Andhra Pradesh – 52 Rajasthan – 52 Punjab • 233 persons were arrested in 2010 • 33% of the cases registered were related to Cracking (hacking) Source: National Crime Records Bureau
  • 16. Arrests & Reports under IPC • Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009) • Geographic breakdown of cases reported – 104 from Maharashtra – 66 Andhra Pradesh – 46 Chhattisgarh The majority of these crimes were either forgery or fraud cases. Source: National Crime Records Bureau