logging in or signing up CYBER LAW IN INDIA BHAGYASHREEKEDIA Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 5733 Category: Education License: All Rights Reserved Like it (3) Dislike it (0) Added: March 23, 2011 This Presentation is Public Favorites: 3 Presentation Description No description available. Comments Posting comment... By: anola (33 month(s) ago) helpful Saving..... Post Reply Close By: anjalibrahmi (25 month(s) ago) plz allow to download these ppt plzzzzzzzzzzzzzz By: prateeksharmamay (25 month(s) ago) Hey can u plz send me the presentation on my email d i.e. email@example.com........its urgent so plz send asap....i ll be grateful to u... Saving..... Edit Comment Close By: nadardeepak (33 month(s) ago) Great Job fantastic insight on cyber crime Saving..... Post Reply Close By: prateeksharmamay (25 month(s) ago) Hey can u plz send me the presentation on my email d i.e. firstname.lastname@example.org........its urgent so plz send asap....i ll be grateful to u... Saving..... Edit Comment Close By: gauravsahoo89 (35 month(s) ago) very goood Saving..... Post Reply Close By: prateeksharmamay (25 month(s) ago) Hey can u plz send me the presentation on my email d i.e. email@example.com........its urgent so plz send asap....i ll be grateful to u... Saving..... Edit Comment Close Premium member Presentation Transcript WHAT IS CYBER LAW?: WHAT IS CYBER LAW? Rapid growth of the Internet and cyberspace It refers to all legal and regulatory aspects of internet and the world wide web. Thus Cyber space is governed by a system of law and regulations called cyber law. It include the IPR, PRIVACY LAWS…NEED & IMPORTANCE OF CYBER LAWS: NEED & IMPORTANCE OF CYBER LAWS Tackling Cyber Crime Successful and smooth functioning of e –commerce and virtual communication No Jurisdictional Boundaries.Slide 3: Increasing use of Net banking and Mobile banking Cloud Computing is proving to be a major threat Economic EfficiencyA MODERN PROVERB: A MODERN PROVERB " The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". –National Research Council, U S A "Computers at Risk”.1991TYPES OF CYBER CRIME: TYPES OF CYBER CRIME Against Individual :- Harassments via emails Cyber stalking SpamSlide 6: Against society :- Pornography Trafficking Cyber terrorism Against Organization :- Pirated software Unauthorized informationCYBER CRIME: CYBER CRIME The Computer as a Target. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The Computer as a Weapon. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.AREAS COVERED UNDER CYBER LAW: AREAS COVERED UNDER CYBER LAW These include : Copyright law Software Trademark law Patent law Data Protection and Privacy LawsSOME OTHER CONCEPTS: SOME OTHER CONCEPTS These concepts are not included in the IT Act, 2000. Shareware Freeware Public domain softwareINFORMATION TECHNOLOGY ACT, 2000: INFORMATION TECHNOLOGY ACT, 2000 12 th nation in the world to enact a Cyber law. Came into existence on October 17, 2000Slide 11: OBJECTIVES To provide legal frame work and infrastructure for e-commerce and INTERNET. Also so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.ESSENCE OF THE ACT: ESSENCE OF THE ACT Legal recognition Electronic filling Electronic contract Authentication of electronic recordsADVANTAGES: ADVANTAGES Helpful to promote e-commerce Enhance the Corporate Business Filling Online FormsSlide 14: High penalty for Cyber Crime E – governance Statutory remedy to CorporatesSHORTCOMINGS OF I.T. ACT, 2000: SHORTCOMINGS OF I.T. ACT, 2000 No protection for Domain Names. The act is not applicable on the IPR, Trademarks, Copyrights and Patents. No right to insist on Electronic Filling Regulations of PaymentsDIGITAL SIGNATURES: DIGITAL SIGNATURES Authentication using a Digital Signature (chapter 2) Verification of Digital Signatures Legal recognition of the Digital SignaturesARIF AZIM CASE : ARIF AZIM CASE First case of cyber crime conviction in india Sony- sambandh.Com,website enabled NRIS to send sony products in india In may 2002 someone under the identity of barbara campa logged in and ordered a few items. A lady gave her credit card number for payment and requested that the products be delivered to arif azim in noida . . The payment was duly cleared by the credit card agency and the transaction processed. Card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase.Slide 18: Company lodged a complaint for online cheating at the CBI Investigation and arif azim was arrested. Investigations revealed that arif azim , while working at a call centre in noida gained access to the credit card number of an american national which he misused on the company’s site. The accused admitted his guilt and he was convicted under section 418, 419 and 420 of the indian penal code — this being the first time that a cyber crime has been convicted. Punishment- the court released the accused on probation for one year.Conclusion : Conclusion We gather from all the above information that cyber laws are very necessary in any country for the proper regulation of Internet activities. The Information Technology Act, 2000 is a historical step taken by the country to solve the problem of increasing number of cyber crimes. Although this act covers a lot of areas, it also has its shortcomings and thus, a few amendments are needed for correct regulation of cyber crimes. You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.