SlideShare une entreprise Scribd logo
1  sur  16
PRESENTATION ON
CYBER LAWS
BIBLIOGRAPHY
• LAWS RELATING TO
COMPUTER,INTERNET AND ECOMMERCE.
• LEGAL ASPECTS OF BUSINESS
• COMPANY LAW
•
•

www.google.com
www.altavista.com
CONTENTS
•
•
•
•
•

INTRODUCTION
NEED FOR CYBER LAWS
CYBER LAWS IN INDIA
CYBER CRIMES
OFFENCES AND LAWS IN CYBER
SPACE
• CYBER LAWS AMENDMENTS
• CONCLUSION
INTRODUCTION
• GROWTH OF
CYBER SPACE
• ONSET OF
INTERNET
• CYBER LAW OR
LAW OF
INTERNET
NEED FOR CYBER LAWS
• TACKLING CYBER
CRIMES
• INTELLECTUAL
PROPERTY RIGHTS
AND COPYRIGHTS
PROTECTION ACT
CYBER LAWS IN INDIA
• ITACT PASSED IN
2000
• INTERNET IN
INDIA
• IMPLEMENTATION
OF CYBER LAW
• REASONS FOR
DELAY IN
IMPLEMENTATION
OF CYBER LAWS IN
INDIA
IT ACT PROVISIONS
• email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
• Companies shall now be able to carry out
electronic commerce using the legal infrastructure
provided by the Act.
• Digital signatures have been given legal validity
and sanction in the Act.
 
IT ACT PROVISIONS
• The Act now allows Government to issue
notification on the web thus heralding egovernance
• statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies data
CYBER CRIMES
• CYBER CRIMES AGAINST
PERSONS
eg ‘melissa’and ‘lovebug’ virus
• CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
• CYBER CRIMES AGAINST
GOVERNMENT
• eg ‘Al-Qaeda’
CYBER CRIMES
CRIME THROUGH ORKUT
• Koushambi ,24-year
old software
professional
working for TCS
was brutally killed
by Manish Thakur,
in a hotel room at
Andheri.
INTERNET AND ITS EFFECT
• 20% - 30% of Internet
pornography consumption is by
children of ages 12 - 17.
• MySpace is being used by
predators to meet and entice
kids online.
• Specific marketing strategies
are being used to attract
children to porn sites.
OFFENCES AND LAWS IN
CYBER SPACE
• TAMPERING WITH
COMPUTER
DOCUMENTS
• HACKING WITH
COMPUTER SYSTEM
• PUBLISHING OBSCENE
MATERIAL ON
INTERNET
• BREACHING OF
CONFIDENTIALITY
AND PRIVACY
CYBER LAWS AMENDMENTS
• INDIAN PENAL CODE,1860
• INDIAN EVIDENCE ACT,1872
• BANKER’S BOOK EVIDENCE ACT,1891
• GENERAL CLAUSES ACT,1897
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
IN TODAYS WORLD OF INTERNET

• ACHIEVING GLOBAL PEACE AND
HARMONY
THANK YOU
•

QUERIES....???

Contenu connexe

Tendances

Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 

Tendances (19)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

En vedette

Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
Internet Law Center
 

En vedette (9)

How to Fix Three Common eCommerce Problems
How to Fix Three Common eCommerce ProblemsHow to Fix Three Common eCommerce Problems
How to Fix Three Common eCommerce Problems
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Electronic contracts
Electronic contractsElectronic contracts
Electronic contracts
 
Best practices for UI/UX in eCommerce
Best practices for UI/UX in eCommerceBest practices for UI/UX in eCommerce
Best practices for UI/UX in eCommerce
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Business ethisc and governance
Business ethisc and governanceBusiness ethisc and governance
Business ethisc and governance
 
Ecommerce Master Class Course
Ecommerce Master Class CourseEcommerce Master Class Course
Ecommerce Master Class Course
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 

Similaire à Cyber laws

Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Similaire à Cyber laws (20)

cyber-laws (1).ppt
cyber-laws (1).pptcyber-laws (1).ppt
cyber-laws (1).ppt
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Cyber laws

  • 2. BIBLIOGRAPHY • LAWS RELATING TO COMPUTER,INTERNET AND ECOMMERCE. • LEGAL ASPECTS OF BUSINESS • COMPANY LAW • • www.google.com www.altavista.com
  • 3. CONTENTS • • • • • INTRODUCTION NEED FOR CYBER LAWS CYBER LAWS IN INDIA CYBER CRIMES OFFENCES AND LAWS IN CYBER SPACE • CYBER LAWS AMENDMENTS • CONCLUSION
  • 4. INTRODUCTION • GROWTH OF CYBER SPACE • ONSET OF INTERNET • CYBER LAW OR LAW OF INTERNET
  • 5. NEED FOR CYBER LAWS • TACKLING CYBER CRIMES • INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
  • 6. CYBER LAWS IN INDIA • ITACT PASSED IN 2000 • INTERNET IN INDIA • IMPLEMENTATION OF CYBER LAW • REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA
  • 7. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.  
  • 8. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding egovernance • statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 9. CYBER CRIMES • CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus • CYBER CRIMES AGAINST PROPERTY eg computer vandalism • CYBER CRIMES AGAINST GOVERNMENT • eg ‘Al-Qaeda’
  • 11. CRIME THROUGH ORKUT • Koushambi ,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.
  • 12. INTERNET AND ITS EFFECT • 20% - 30% of Internet pornography consumption is by children of ages 12 - 17. • MySpace is being used by predators to meet and entice kids online. • Specific marketing strategies are being used to attract children to porn sites.
  • 13. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 14. CYBER LAWS AMENDMENTS • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872 • BANKER’S BOOK EVIDENCE ACT,1891 • GENERAL CLAUSES ACT,1897
  • 15. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY