cyber laws n ethics new ppt

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

CONTENTS:

CONTENTS INTRODUCTION CYBER LAWS IN INDA NEED FOR CYBER LAWS CYBER CRIMES OFFENCES AND LAWS IN CYBER SPACE ETHICS CONCLUSION

CYBER LAWS IN INDIA:

CYBER LAWS IN INDIA ITACT PASSED IN 2000 IMPLEMENTATION OF CYBER LAW REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA

NEED FOR CYBER LAWS:

NEED FOR CYBER LAWS TACKLING CYBER CRIMES INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT

Types of Cyber crimes:

Types of Cyber crimes Credit card frauds Cyber pornography Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Defamation Cyber stalking (section 509 IPC) Phishing Cyber terrorism

INTERNET AND ITS EFFECT:

INTERNET AND ITS EFFECT 20% - 30% of Internet pornography consumption is by children of ages 12 - 17 . Criminal activity Terrorism

TACKLING CYBER CRIME:

TACKLING CYBER CRIME Observing human behavior Technological improvement Strong legal framework

OFFENCES AND LAWS IN CYBER SPACE:

OFFENCES AND LAWS IN CYBER SPACE TAMPERING WITH COMPUTER DOCUMENTS HACKING WITH COMPUTER SYSTEM PUBLISHING OBSCENE MATERIAL ON INTERNET BREACHING OF CONFIDENTIALITY AND PRIVACY

CYBER LAWS AMENDMENTS:

CYBER LAWS AMENDMENTS INDIAN PENAL CODE,1860 INDIAN EVIDENCE ACT,1872 BANKER’S BOOK EVIDENCE ACT,1891 GENERAL CLAUSES ACT,1897

COMPUTER SECURITY:

Avoid getting conned in cyberspace How to maintain your privacy online Virus prevention Internet Security COMPUTER SECURITY

Computer security:

Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site.

Ethics:

Ethics Each society establishes rules and limits on acceptable behaviour These rules form a moral code Sometimes the rules conflict In general they are beliefs or conventions on good and evil, good or bad conduct, justice and injustice The rules sometimes do not cover new situations

Ten Commandments of Computer Ethics:

Ten Commandments of Computer Ethics 1 . Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You Have Not Paid. 7 Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8 . Thou Shalt Not Appropriate Other People’s Intellectual Output. 9 . Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10 . Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans 7

:

QUERIES WELCOMED

authorStream Live Help