Cyber laws

Siddharth Paldhikar
Siddharth PaldhikarFounder at Websterapp um Arg Group
Seminar Presentation
on Cyber Laws
 CyberTheory.
Need of Cyber Laws.
Cyber laws in India.
 Cyber Crime & Cyber Crime Cases
 Penalties for cyber crimes.
Cyber laws
•In 1980, there were only 50,000 Computers all over the world.
• Today, over 50,000 Computers are being sold each day
globally.
• I think it is fair to say that personal computers have become
the most empowering tool we have ever created.They are
tools of communication, they are tools of creativity & they can
be shaped by their user.
- Bill Gates.
Chairman, Microsoft.
• We live in the E-World ?
E-Commerce, E-billing, E-ticketing, E-mail, E-
learning, E-books.
•Internet is the 6th most important invention
in the life of a human being.
• Everything in this world has Advantages &
Disadvantages.
Real-world & Virtual- world
Current approaches evolved to deal
with real-world crime
Cybercrime occurs in a virtual-world
and therefore presents different issues
Cyber laws
 Evolution of Cyber Laws ?
 Advantages of Cyber Law.
Awareness of cyber laws & crimes.
 Does Cyber Law concern me.
•To make our digital life safe.
•Tackling cyber crimes.
• Intellectual property rights & copyrights
protection act.
• Essential feature for today,s world of internet.
•Achieving global peace & harmony.
•INDIAN PENAL CODE,1860.
• INDIAN EVIDENCE ACT,1872.
•BANKERS BOOK EVIDENCE ACT,1891.
•GENERAL CLAUSES ACT,1897
•IT ACT 2000.
 email would now be a valid and legal form of communication
in our country that can be duly produced and approved in a
court of law.
 Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided by the Act.
 Digital signatures have been given legal validity and sanction
in the Act.
Action can be imposed against anyone you creates a
unauthorized access into the system of companies or
industries.
Cyber Crime
• Cyber Crime is unlawful act wherein the
computer is either targeted or used as a tool
to gain unauthorized access into a network.
•Unauthorized access & hacking.
•Virus & worm attack
•Email Spamming.
Virus & Worms
•OfficialWebsite of Maharashtra Government hacked, MUMBAI
,20 september 2007
•Three people held guilty in online credit card scam.
• Orkut : A Danger.
•Offensive Sms can lead to 2 yrs jail.
•CBIWebsite hacked by Pakistani Hackers.
• City principal seeks police help to stop Cyber Crime,Social
networking issue.
Penalties for cyber crime
• Imprisonment
• Fine for unlawful acts.
• Cancelation of certifications
Cyber laws
1 von 17

Recomendados

introduction to cyber law and cyber crime von
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
7.1K views17 Folien
Indian Cyber laws von
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
1.3K views23 Folien
Cyber law-it-act-2000 von
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000Mayuresh Patil
35.2K views23 Folien
Need And Importance Of Cyber Law von
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
135.6K views7 Folien
Introduction to Cyber Law von
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Lawn|u - The Open Security Community
65.9K views54 Folien
Cyber laws in India von
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
2.3K views23 Folien

Más contenido relacionado

Was ist angesagt?

Cyber law von
Cyber lawCyber law
Cyber lawUmang Maheshwari
26.9K views20 Folien
Cyber security and cyber laws von
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
800 views36 Folien
Introduction to Cyber law (IT Act 2000) von
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
1.5K views21 Folien
Cyber crime von
Cyber crimeCyber crime
Cyber crimeyazad dumasia
1.7K views25 Folien
It act ppt ( 1111) von
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)Yogendra Wagh
37.5K views24 Folien
Cyber law in India: Its need & importance von
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
3.9K views33 Folien

Was ist angesagt?(20)

Introduction to Cyber law (IT Act 2000) von Ambar Deo
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo1.5K views
Cyber law in India: Its need & importance von Aditya Shukla
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla3.9K views
Introduction to Cyber Crimes von atuljaybhaye
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye6.3K views
Cyber Crime & Information technology Act 2000 von V'vek Sharma
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma13.1K views
Cybercrime a growing threat of 21 st century !!! von Asma Hossain
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain732 views
Cybercrime presentation von Rajat Jain
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.3K views
Cyber Crime and Security von Dipesh Waghela
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela57.7K views
Cyber law In India: its need & importance von Aditya Shukla
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla83.6K views

Similar a Cyber laws

Cyber laws von
Cyber lawsCyber laws
Cyber lawsSiddharth Paldhikar
401 views17 Folien
Cyber Crime von
Cyber CrimeCyber Crime
Cyber CrimePragnesh Ghoda
1.2K views19 Folien
Cyber Security von
Cyber SecurityCyber Security
Cyber SecurityRP6997
498 views17 Folien
IT Act von
IT ActIT Act
IT ActNitesh Bhatia
76 views21 Folien
cyber law IT Act 2000 von
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
1.4K views20 Folien
138740042-cyber-law.pptx von
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
4 views17 Folien

Similar a Cyber laws(20)

Cyber Security von RP6997
Cyber SecurityCyber Security
Cyber Security
RP6997498 views
cyber law IT Act 2000 von Yash Jain
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain1.4K views
Cyberspace Usages Challenges And Disputeresolution Ja von utkarshjani
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
utkarshjani1.2K views
Cybercrimeppt 160421074211 von Andreaa Viv
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv57 views
Cyber lawyer india von cyberjure
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
cyberjure324 views

Último

PRODUCT PRESENTATION.pptx von
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
14 views1 Folie
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
263 views86 Folien
Future of Indian ConsumerTech von
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 views68 Folien
Ransomware is Knocking your Door_Final.pdf von
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
55 views46 Folien
PharoJS - Zürich Smalltalk Group Meetup November 2023 von
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
127 views17 Folien
Kyo - Functional Scala 2023.pdf von
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
368 views92 Folien

Último(20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software263 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 views
Powerful Google developer tools for immediate impact! (2023-24) von wesley chun
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)
wesley chun10 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Serverless computing with Google Cloud (2023-24) von wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Piloting & Scaling Successfully With Microsoft Viva von Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
"Running students' code in isolation. The hard way", Yurii Holiuk von Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays11 views
HTTP headers that make your website go faster - devs.gent November 2023 von Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
Future of AR - Facebook Presentation von ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56114 views
Special_edition_innovator_2023.pdf von WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc10 views

Cyber laws

  • 2.  CyberTheory. Need of Cyber Laws. Cyber laws in India.  Cyber Crime & Cyber Crime Cases  Penalties for cyber crimes.
  • 4. •In 1980, there were only 50,000 Computers all over the world. • Today, over 50,000 Computers are being sold each day globally. • I think it is fair to say that personal computers have become the most empowering tool we have ever created.They are tools of communication, they are tools of creativity & they can be shaped by their user. - Bill Gates. Chairman, Microsoft.
  • 5. • We live in the E-World ? E-Commerce, E-billing, E-ticketing, E-mail, E- learning, E-books. •Internet is the 6th most important invention in the life of a human being. • Everything in this world has Advantages & Disadvantages.
  • 6. Real-world & Virtual- world Current approaches evolved to deal with real-world crime Cybercrime occurs in a virtual-world and therefore presents different issues
  • 8.  Evolution of Cyber Laws ?  Advantages of Cyber Law. Awareness of cyber laws & crimes.  Does Cyber Law concern me.
  • 9. •To make our digital life safe. •Tackling cyber crimes. • Intellectual property rights & copyrights protection act. • Essential feature for today,s world of internet. •Achieving global peace & harmony.
  • 10. •INDIAN PENAL CODE,1860. • INDIAN EVIDENCE ACT,1872. •BANKERS BOOK EVIDENCE ACT,1891. •GENERAL CLAUSES ACT,1897 •IT ACT 2000.
  • 11.  email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act. Action can be imposed against anyone you creates a unauthorized access into the system of companies or industries.
  • 13. • Cyber Crime is unlawful act wherein the computer is either targeted or used as a tool to gain unauthorized access into a network. •Unauthorized access & hacking. •Virus & worm attack •Email Spamming.
  • 15. •OfficialWebsite of Maharashtra Government hacked, MUMBAI ,20 september 2007 •Three people held guilty in online credit card scam. • Orkut : A Danger. •Offensive Sms can lead to 2 yrs jail. •CBIWebsite hacked by Pakistani Hackers. • City principal seeks police help to stop Cyber Crime,Social networking issue.
  • 16. Penalties for cyber crime • Imprisonment • Fine for unlawful acts. • Cancelation of certifications