SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Cyber Laws
Cyber Crime
• Cyber crime is a generic term that refers to all criminal
activities done using the medium of computers, the
Internet, cyber space and the worldwide web.
• Use of online social networks.
What is Cyber Law?
• Cyber law is a term used to describe the legal
issues related to use of communications
technology, particularly “cyberspace”
i.e. the Internet.
CYBER LAWS IN INDIA
• ITACT PASSED IN
2000
• IMPLEMENTATION
OF CYBER LAW
• REASONS FOR
DELAY IN
IMPLEMENTATION
OF CYBER LAWS IN
INDIA
NEED FOR CYBER LAWS
• TACKLING CYBER
CRIMES
• INTELLECTUAL
PROPERTY RIGHTS
AND COPYRIGHTS
PROTECTION ACT
Types of Cyber crimes
• Credit card frauds
• Cyber pornography
• Sale of illegal articles-narcotics,
weapons, wildlife
• Online gambling
• Intellectual Property crimes-
software piracy, copyright
infringement, trademarks
violations, theft of computer
source code
• Email spoofing
• Forgery
• Defamation
• Cyber stalking (section 509 IPC)
• Phishing
• Cyber terrorism
Crime
against
property
Crime
against
Government
Crime
against
persons
Types of Cyber Crime
• Hacking
• Data Theft
• Spreading Virus or Worms
• Identity Theft
• E-Mail Spoofing
Hacking
• Hacking means unauthorized attempts to bypass
the security mechanisms of an information
system or network.
• Unauthorized access to a computer system,
programs, data and network resources. (The
term “hacker” originally meant a very gifted
programmer.
Hacking: Law & Punishment
• Under Information Technology (Amendment) Act,
2008, Section 43(a) read with section 66 is applicable
and Section 379 & 406 of Indian Penal Code, 1860 also
are applicable.
• If crime is proved under IT Act, accused shall be
punished for imprisonment, which may extend to three
years or with fine, which may extend to five lakh rupees
or both.
Data Theft
• Data Theft is a growing problem, primarily perpetrated
by office workers with access to technology such as
desktop computers and handheld devices, capable of
storing digital information such as flash drives, iPods
and even digital cameras.
• The damage caused by data theft can be considerable
with today’s ability to transmit very
large files via e-mail, web pages, USB
devices, DVD storage and other
hand-held devices.
Data Theft: Law & Punishment
• Law & Punishment: Under Information Technology
(Amendment) Act, 2008, Section 43(b) read with
Section 66 is applicable and under Section 379, 405 &
420 of Indian Penal Code, 1860 also applicable. Data
Theft offence is cognizable, bailable, compoundable
with permission of the court before which the
prosecution of such offence is pending and triable by
any magistrate.
Spreading Virus or Worms
• In most cases, viruses can do any amount of damage,
the creator intends them to do.
• They can send your data to a third party and then delete
your data from your computer.
• They can also ruin/mess up your system and render it
unusable without a re-installation of the operating
system.
• Most have not done this much damage in
the past, but could easily do this in the future.
Spreading Virus or Worms
• Usually the virus will install files on your system
and then will change your system so that virus
program is run every time you start your system.
• It will then attempt to replicate itself by sending
itself to other potential victims.
Spreading Virus or Worms:
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 43(c) & 43(e) read with
Section 66 is applicable and under Section 268
of Indian Penal Code, 1860 also applicable.
• Spreading of Virus offence is cognizable,
bailable, compoundable with permission of the
court before which the prosecution of such
offence is pending and triable by any magistrate.
Identity Theft
• It is a form of fraud or cheating of another person’s
identity in which someone pretends to be someone else
by assuming that person’s identity.
• Information Technology (Amendment) Act, 2008,
crime of identity theft under Section 66-C, whoever,
fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification
feature of any other person known as identity theft.
Identity theft is a term used to refer to fraud that
involves stealing money or getting other benefits by
pretending to be someone else.
Email spoofing
• Email spoofing is a technique used by hackers to
fraudulently send email messages in which the sender
address and other parts of the email header are altered
to appear as though the email originated from a source
other than its actual source.
• Hackers use this method to disguise the actual email
address from which phishing and spam messages are
sent and often use email spoofing in conjunction with
Web page spoofing to trick users into providing
personal and confidential information
Email spoofing:
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-D and Section417, 419 &
465of Indian Penal Code, 1860 also applicable.
Email spoofing offence is cognizable, bailable,
compoundable with permission of the court
before which the prosecution of such offence is
pending and triable by any magistrate.
IT ACT, 2000
• The IT Act is a first step taken by the
Government of India towards promoting the
growth of electronic commerce. Despite all its
failings, it is a first historical step.
• We in India also have had a vision to become
the 12th nation in the world to enact a Cyber
law. We have enacted the Information
Technology Act, 2000.
THE IT ACT, 2000 –
OBJECTIVES
• To provide legal recognition for transactions:-
Carried out by means of electronic data
interchange,
• Other means of electronic communication,
commonly referred to as "electronic commerce",
involving the use of alternatives to paper-based
methods of communication and storage of
information,
THE IT ACT, 2000 –
OBJECTIVES
• To facilitate electronic filing of documents with the
Government agencies
• To amend the Indian Penal Code, the Indian
Evidence Act, 1872, the Banker's Book Evidence
Act, 1891 and the Reserve Bank of India Act, 1934
Conclusion
• CYBER LAWS –
ESSENTIAL FEATURE IN TODAYS WORLD OF
INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
Tuhin Batra
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
Hemant
 

Was ist angesagt? (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 

Andere mochten auch

9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know
satyam mishra
 
Ppt to stop the legal terrorism
Ppt to stop the legal terrorismPpt to stop the legal terrorism
Ppt to stop the legal terrorism
swarup1972
 
Supernova presentation
Supernova presentationSupernova presentation
Supernova presentation
Akshay Mehra
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
minimum wages act 1948
minimum wages act 1948minimum wages act 1948
minimum wages act 1948
shhilpa
 
Global financial crisis 2008
Global financial crisis 2008Global financial crisis 2008
Global financial crisis 2008
valliappan1991
 

Andere mochten auch (20)

9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know9727080 Psmdifferent Laws One Should Know
9727080 Psmdifferent Laws One Should Know
 
Ppt to stop the legal terrorism
Ppt to stop the legal terrorismPpt to stop the legal terrorism
Ppt to stop the legal terrorism
 
Punjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous electionsPunjab assembly election 2017- An analysis based on the previous elections
Punjab assembly election 2017- An analysis based on the previous elections
 
Supernova presentation
Supernova presentationSupernova presentation
Supernova presentation
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Visual Resumes
Visual ResumesVisual Resumes
Visual Resumes
 
Ethics in media
Ethics in mediaEthics in media
Ethics in media
 
minimum wages act 1948
minimum wages act 1948minimum wages act 1948
minimum wages act 1948
 
PowerPoint Visual Resume
PowerPoint Visual ResumePowerPoint Visual Resume
PowerPoint Visual Resume
 
Sample PPT from College
Sample PPT from CollegeSample PPT from College
Sample PPT from College
 
Nationalism In India
Nationalism In IndiaNationalism In India
Nationalism In India
 
Nationalism in india.
Nationalism in india. Nationalism in india.
Nationalism in india.
 
Amazing simple facts
Amazing simple factsAmazing simple facts
Amazing simple facts
 
Global financial crisis 2008
Global financial crisis 2008Global financial crisis 2008
Global financial crisis 2008
 
BuzzFeed Pitch Deck
BuzzFeed Pitch DeckBuzzFeed Pitch Deck
BuzzFeed Pitch Deck
 
Contently Pitch Deck
Contently Pitch DeckContently Pitch Deck
Contently Pitch Deck
 
Pendo Series B Investor Deck External
Pendo Series B Investor Deck ExternalPendo Series B Investor Deck External
Pendo Series B Investor Deck External
 
Visual resume
Visual resumeVisual resume
Visual resume
 
Tinder Pitch Deck
Tinder Pitch DeckTinder Pitch Deck
Tinder Pitch Deck
 
Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008Airbnb Pitch Deck From 2008
Airbnb Pitch Deck From 2008
 

Ähnlich wie Indian Cyber laws

What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 

Ähnlich wie Indian Cyber laws (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Indian Cyber laws

  • 2. Cyber Crime • Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web. • Use of online social networks.
  • 3. What is Cyber Law? • Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace” i.e. the Internet.
  • 4. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. Types of Cyber crimes • Credit card frauds • Cyber pornography • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling • Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code • Email spoofing • Forgery • Defamation • Cyber stalking (section 509 IPC) • Phishing • Cyber terrorism Crime against property Crime against Government Crime against persons
  • 7. Types of Cyber Crime • Hacking • Data Theft • Spreading Virus or Worms • Identity Theft • E-Mail Spoofing
  • 8.
  • 9. Hacking • Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. • Unauthorized access to a computer system, programs, data and network resources. (The term “hacker” originally meant a very gifted programmer.
  • 10. Hacking: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable. • If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lakh rupees or both.
  • 11. Data Theft • Data Theft is a growing problem, primarily perpetrated by office workers with access to technology such as desktop computers and handheld devices, capable of storing digital information such as flash drives, iPods and even digital cameras. • The damage caused by data theft can be considerable with today’s ability to transmit very large files via e-mail, web pages, USB devices, DVD storage and other hand-held devices.
  • 12. Data Theft: Law & Punishment • Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable. Data Theft offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 13. Spreading Virus or Worms • In most cases, viruses can do any amount of damage, the creator intends them to do. • They can send your data to a third party and then delete your data from your computer. • They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. • Most have not done this much damage in the past, but could easily do this in the future.
  • 14. Spreading Virus or Worms • Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. • It will then attempt to replicate itself by sending itself to other potential victims.
  • 15. Spreading Virus or Worms: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable. • Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 16. Identity Theft • It is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity. • Information Technology (Amendment) Act, 2008, crime of identity theft under Section 66-C, whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as identity theft. Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else.
  • 17. Email spoofing • Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source. • Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information
  • 18. Email spoofing: Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-D and Section417, 419 & 465of Indian Penal Code, 1860 also applicable. Email spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 19. IT ACT, 2000 • The IT Act is a first step taken by the Government of India towards promoting the growth of electronic commerce. Despite all its failings, it is a first historical step. • We in India also have had a vision to become the 12th nation in the world to enact a Cyber law. We have enacted the Information Technology Act, 2000.
  • 20. THE IT ACT, 2000 – OBJECTIVES • To provide legal recognition for transactions:- Carried out by means of electronic data interchange, • Other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information,
  • 21. THE IT ACT, 2000 – OBJECTIVES • To facilitate electronic filing of documents with the Government agencies • To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934
  • 22. Conclusion • CYBER LAWS – ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY