SlideShare ist ein Scribd-Unternehmen logo
1 von 16
PRESENTATION ON
   CYBER LAWS
BIBLIOGRAPHY
• LAWS RELATING TO
  COMPUTER,INTERNET AND E-
  COMMERCE.
• BY:NANDAN KAMATH
• LEGAL ASPECTS OF BUSINESS
•   BY:AKHILESHWAR PATHAK

• COMPANY LAW
•   BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA


•   www.google.com
•   www.altavista.com
CONTENTS
• INTRODUCTION
• NEED FOR CYBER LAWS
• CYBER LAWS IN INDIA
• CYBER CRIMES
• OFFENCES AND LAWS IN CYBER
  SPACE
• CYBER LAWS AMENDMENTS
• CONCLUSION
INTRODUCTION
• GROWTH OF
  CYBER SPACE

• ONSET OF
  INTERNET

• CYBER LAW OR
  LAW OF
  INTERNET
NEED FOR CYBER LAWS

• TACKLING CYBER
  CRIMES

• INTELLECTUAL
  PROPERTY RIGHTS
  AND COPYRIGHTS
  PROTECTION ACT
CYBER LAWS IN INDIA
• ITACT PASSED IN
  2000
• INTERNET IN
  INDIA
• IMPLEMENTATION
  OF CYBER LAW
• REASONS FOR
  DELAY IN
  IMPLEMENTATION
  OF CYBER LAWS IN
  INDIA
IT ACT PROVISIONS
• email would now be a valid and legal form of
  communication in our country that can be duly
  produced and approved in a court of law.

• Companies shall now be able to carry out
  electronic commerce using the legal infrastructure
  provided by the Act.

• Digital signatures have been given legal validity
  and sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
  notification on the web thus heralding e-
  governance

• statutory remedy in case if anyone breaks
  into companies computer systems or
  network and causes damages or copies data
CYBER CRIMES
• CYBER CRIMES AGAINST
  PERSONS
  eg ‘melissa’and ‘lovebug’ virus
• CYBER CRIMES AGAINST
  PROPERTY
  eg computer vandalism
• CYBER CRIMES AGAINST
  GOVERNMENT
• eg ‘Al-Qaeda’
CYBER CRIMES
CRIME THROUGH ORKUT
• Koushambi ,24-year
  old software
  professional
  working for TCS
  was brutally killed
  by Manish Thakur,
  in a hotel room at
  Andheri.
INTERNET AND ITS EFFECT
• 20% - 30% of Internet
  pornography consumption is by
  children of ages 12 - 17.

• MySpace is being used by
  predators to meet and entice
  kids online.

• Specific marketing strategies
  are being used to attract
  children to porn sites.
OFFENCES AND LAWS IN
       CYBER SPACE
• TAMPERING WITH
  COMPUTER
  DOCUMENTS
• HACKING WITH
  COMPUTER SYSTEM
• PUBLISHING OBSCENE
  MATERIAL ON
  INTERNET
• BREACHING OF
  CONFIDENTIALITY
  AND PRIVACY
CYBER LAWS AMENDMENTS
• INDIAN PENAL CODE,1860

• INDIAN EVIDENCE ACT,1872

• BANKER’S BOOK EVIDENCE ACT,1891

• GENERAL CLAUSES ACT,1897
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
  IN TODAYS WORLD OF INTERNET



• ACHIEVING GLOBAL PEACE AND
  HARMONY
THANK YOU

•   QUERIES WELCOMED

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber law
Cyber lawCyber law
Cyber law
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 

Andere mochten auch

Andere mochten auch (12)

Cyber security
Cyber securityCyber security
Cyber security
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Ähnlich wie Cyber laws

Ähnlich wie Cyber laws (20)

cyber-laws (1).ppt
cyber-laws (1).pptcyber-laws (1).ppt
cyber-laws (1).ppt
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Akhila
AkhilaAkhila
Akhila
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cyber laws

  • 1. PRESENTATION ON CYBER LAWS
  • 2. BIBLIOGRAPHY • LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE. • BY:NANDAN KAMATH • LEGAL ASPECTS OF BUSINESS • BY:AKHILESHWAR PATHAK • COMPANY LAW • BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA • www.google.com • www.altavista.com
  • 3. CONTENTS • INTRODUCTION • NEED FOR CYBER LAWS • CYBER LAWS IN INDIA • CYBER CRIMES • OFFENCES AND LAWS IN CYBER SPACE • CYBER LAWS AMENDMENTS • CONCLUSION
  • 4. INTRODUCTION • GROWTH OF CYBER SPACE • ONSET OF INTERNET • CYBER LAW OR LAW OF INTERNET
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • INTERNET IN INDIA • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 7. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 8. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 9. CYBER CRIMES • CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus • CYBER CRIMES AGAINST PROPERTY eg computer vandalism • CYBER CRIMES AGAINST GOVERNMENT • eg ‘Al-Qaeda’
  • 11. CRIME THROUGH ORKUT • Koushambi ,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.
  • 12. INTERNET AND ITS EFFECT • 20% - 30% of Internet pornography consumption is by children of ages 12 - 17. • MySpace is being used by predators to meet and entice kids online. • Specific marketing strategies are being used to attract children to porn sites.
  • 13. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 14. CYBER LAWS AMENDMENTS • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872 • BANKER’S BOOK EVIDENCE ACT,1891 • GENERAL CLAUSES ACT,1897
  • 15. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY
  • 16. THANK YOU • QUERIES WELCOMED