SlideShare ist ein Scribd-Unternehmen logo
1 von 9
An introduction to cyber law
By
Shreya Sanghvi
What is Cyber Law?
• Cyber law is the law governing Cyber space
Cyber space is a very wide term and
includes computers ,networks , software
datastorage devices and many more..
Cyber law of India encompasses laws
relating to
• Cyber Crimes
• Electronic and Digital Signatures
• Intellectual Property
• Data Protection and Privacy
What is Cyber Crime??
Cyber crime is the latest and perhaps the most
complicated problem in the cyber world.
 Cyber crimes are unlawful acts where computer is used
either as a tool or a target or both.
 The enormous growth in electronic commerce and
online share trading has led to a phenomenal spurt in
incidents of cyber crime.
Cybercrimes can be divided into three
major categories:
Cybercrimes against Persons
Cybercrimes against Property
Cybercrimes against government
Cyber Crime Against Property
• Cybercrimes commited against persons include
various crime like transmisstion of child
pornography , harassment of any one with the
use of a computer such as e-mail
The trafficking , distribution, posting, and dissemination of
obscene material including pornography and indecent exposure is
one of the most important Cybercrimes known today in general
Cyber crime against property
These crimes include:
Computer vandalism(Destruction of others’
property)
Transmisstion of harmful programmers
Siphoning of funds from financial institutions
Stealing secret information and data
Cyber crime against government
• Cyber terrorism is one distinct kind of crime in
this category
• The medium of Cyberspace is used by
individuals and groups to threaten the
international governments
• This crime manifest itself into terrorism when
an individual “cracks” into a government or
military maintained website
“The modern thief can steal more with a computer
than with a gun . Tomorrow’s terrorist may be
able to do more damage with a keyboard than
with a bomb”

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 

Andere mochten auch

Andere mochten auch (20)

THIYAGU PM 2014
THIYAGU PM 2014THIYAGU PM 2014
THIYAGU PM 2014
 
Rationale behind
Rationale behind Rationale behind
Rationale behind
 
Afdiarsa zaidan
Afdiarsa zaidanAfdiarsa zaidan
Afdiarsa zaidan
 
Dossier Megadialer
Dossier Megadialer Dossier Megadialer
Dossier Megadialer
 
Michelle Breen University of Limerick Promoting library collections and servi...
Michelle Breen University of Limerick Promoting library collections and servi...Michelle Breen University of Limerick Promoting library collections and servi...
Michelle Breen University of Limerick Promoting library collections and servi...
 
Alliza syafira rahmawati
Alliza syafira rahmawatiAlliza syafira rahmawati
Alliza syafira rahmawati
 
Are We Prepared When Safety Collapses
Are We Prepared When Safety CollapsesAre We Prepared When Safety Collapses
Are We Prepared When Safety Collapses
 
Venkata Nagupalli _Resume
Venkata Nagupalli _ResumeVenkata Nagupalli _Resume
Venkata Nagupalli _Resume
 
2nd
2nd2nd
2nd
 
VIKASH KUMAR SHUKLA 2015
VIKASH KUMAR SHUKLA 2015VIKASH KUMAR SHUKLA 2015
VIKASH KUMAR SHUKLA 2015
 
Sushi Star
Sushi StarSushi Star
Sushi Star
 
CURICULUM VITAE-REVISI
CURICULUM VITAE-REVISICURICULUM VITAE-REVISI
CURICULUM VITAE-REVISI
 
Pradeep-Resume
Pradeep-ResumePradeep-Resume
Pradeep-Resume
 
Школьная пресса
Школьная прессаШкольная пресса
Школьная пресса
 
Lvov
LvovLvov
Lvov
 
Healthy & Long hair tips
Healthy & Long hair tips Healthy & Long hair tips
Healthy & Long hair tips
 
IUE BBA Transcripts
IUE BBA TranscriptsIUE BBA Transcripts
IUE BBA Transcripts
 
Makalah Planet Gliese 581 g ( Planet Kembaran Bumi )
Makalah Planet Gliese 581 g ( Planet Kembaran Bumi )Makalah Planet Gliese 581 g ( Planet Kembaran Bumi )
Makalah Planet Gliese 581 g ( Planet Kembaran Bumi )
 
History CSI: the Collapse of Byzantium
History CSI:  the Collapse of ByzantiumHistory CSI:  the Collapse of Byzantium
History CSI: the Collapse of Byzantium
 
Skuteczna komunikacja | w 6 krokach
Skuteczna komunikacja | w 6 krokach Skuteczna komunikacja | w 6 krokach
Skuteczna komunikacja | w 6 krokach
 

Ähnlich wie An introduction to cyber law

Ähnlich wie An introduction to cyber law (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 

Kürzlich hochgeladen

INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 

Kürzlich hochgeladen (20)

INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 

An introduction to cyber law

  • 1. An introduction to cyber law By Shreya Sanghvi
  • 2. What is Cyber Law? • Cyber law is the law governing Cyber space Cyber space is a very wide term and includes computers ,networks , software datastorage devices and many more..
  • 3. Cyber law of India encompasses laws relating to • Cyber Crimes • Electronic and Digital Signatures • Intellectual Property • Data Protection and Privacy
  • 4. What is Cyber Crime?? Cyber crime is the latest and perhaps the most complicated problem in the cyber world.  Cyber crimes are unlawful acts where computer is used either as a tool or a target or both.  The enormous growth in electronic commerce and online share trading has led to a phenomenal spurt in incidents of cyber crime.
  • 5. Cybercrimes can be divided into three major categories: Cybercrimes against Persons Cybercrimes against Property Cybercrimes against government
  • 6. Cyber Crime Against Property • Cybercrimes commited against persons include various crime like transmisstion of child pornography , harassment of any one with the use of a computer such as e-mail The trafficking , distribution, posting, and dissemination of obscene material including pornography and indecent exposure is one of the most important Cybercrimes known today in general
  • 7. Cyber crime against property These crimes include: Computer vandalism(Destruction of others’ property) Transmisstion of harmful programmers Siphoning of funds from financial institutions Stealing secret information and data
  • 8. Cyber crime against government • Cyber terrorism is one distinct kind of crime in this category • The medium of Cyberspace is used by individuals and groups to threaten the international governments • This crime manifest itself into terrorism when an individual “cracks” into a government or military maintained website
  • 9. “The modern thief can steal more with a computer than with a gun . Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb”