logging in or signing up cyber laws n ethics new ppt aSGuest109680 Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 1565 Category: Education License: Some Rights Reserved Like it (0) Dislike it (0) Added: August 11, 2011 This Presentation is Public Favorites: 2 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript CONTENTS: CONTENTS INTRODUCTION CYBER LAWS IN INDA NEED FOR CYBER LAWS CYBER CRIMES OFFENCES AND LAWS IN CYBER SPACE ETHICS CONCLUSIONCYBER LAWS IN INDIA: CYBER LAWS IN INDIA ITACT PASSED IN 2000 IMPLEMENTATION OF CYBER LAW REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIANEED FOR CYBER LAWS: NEED FOR CYBER LAWS TACKLING CYBER CRIMES INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACTTypes of Cyber crimes: Types of Cyber crimes Credit card frauds Cyber pornography Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Defamation Cyber stalking (section 509 IPC) Phishing Cyber terrorismINTERNET AND ITS EFFECT: INTERNET AND ITS EFFECT 20% - 30% of Internet pornography consumption is by children of ages 12 - 17 . Criminal activity TerrorismTACKLING CYBER CRIME: TACKLING CYBER CRIME Observing human behavior Technological improvement Strong legal frameworkOFFENCES AND LAWS IN CYBER SPACE: OFFENCES AND LAWS IN CYBER SPACE TAMPERING WITH COMPUTER DOCUMENTS HACKING WITH COMPUTER SYSTEM PUBLISHING OBSCENE MATERIAL ON INTERNET BREACHING OF CONFIDENTIALITY AND PRIVACYCYBER LAWS AMENDMENTS: CYBER LAWS AMENDMENTS INDIAN PENAL CODE,1860 INDIAN EVIDENCE ACT,1872 BANKER’S BOOK EVIDENCE ACT,1891 GENERAL CLAUSES ACT,1897COMPUTER SECURITY: Avoid getting conned in cyberspace How to maintain your privacy online Virus prevention Internet Security COMPUTER SECURITYComputer security: Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site.Ethics: Ethics Each society establishes rules and limits on acceptable behaviour These rules form a moral code Sometimes the rules conflict In general they are beliefs or conventions on good and evil, good or bad conduct, justice and injustice The rules sometimes do not cover new situationsTen Commandments of Computer Ethics: Ten Commandments of Computer Ethics 1 . Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You Have Not Paid. 7 Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8 . Thou Shalt Not Appropriate Other People’s Intellectual Output. 9 . Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10 . Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans 7: QUERIES WELCOMED You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.