SlideShare une entreprise Scribd logo
1  sur  30
GLOBAL BUSINESS SCHOOL, HUBLI. 
Assignment on 
cyber law 
Submitted By: 
Rajshekhar Gananur 
MBA13007072 
Submitted To 
Dr. Bhargav Revankar
•SEC 43:PENALTY AND COMPENSATION FOR DAMAGE TO COMPUTER, COMPUTER 
SYSTEM, ETC. 
If any person without permission of the owner or any other person who is in charge of a 
computer, computer system or computer network, or computer resource — 
•accesses or secures access to such computer, computer system or computer network; 
•downloads, copies or extracts any data, computer data base or information from such 
computer, computer system or computer network including information or data held or 
stored in any removable storage medium; 
•introduces or causes to be introduced any computer contaminant or computer virus into 
any computer, computer system or computer network; 
•damages or causes to be damaged any computer, computer system or computer 
network, data, computer data base or any other programmers residing in such computer, 
computer system or computer network; 
•disrupts or causes disruption of any computer, computer system or computer network;
• denies or causes the denial of access to any person authorized to access any computer, 
computer system or computer network by any means; (g) provides any assistance to any 
person to facilitate access to a computer, computer system or computer network in 
contravention of the provisions of this Act, rules or regulations made there under; 
• charges the services availed of by a person to the account of another person by 
tampering with or manipulating any computer, computer system, or computer network, 
he shall be liable to pay damages by way of compensation to the person so affected. 
• destroys, deletes or alters any information residing in a computer resource or diminishes 
its value or utility or affects it injuriously by any means; 
• steel, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter 
any computer source code used for a computer resource with an intention to cause 
damage
PUNISHMENT 
Compensation claims upto 1crore or 3 years imprisonment or both 
RELATED CASE LET:
Section 65 in the Information Technology Act, 2000: 
Tampering with computer source documents 
• Whoever knowingly or intentionally conceals, destroys or alters or intentionally or 
knowingly causes another to conceal, destroy, or alter any computer source code 
used for a computer, computer programme, computer system or computer network, 
when the computer source code is required to be kept or maintained by law for the 
time being in force 
• For the purposes of this section, "computer source code" means the listing of 
programmes, computer commands, design and layout and programme analysis of 
computer resource in any form."
• PUNISHMENTS: 
• Shall be punishable with imprisonment up to three years, or with fine which may 
extend up to two lakh rupees, or with both
• SECTION66. HACKING WITH THE COMPUTER SYSTEM: 
(1) Whoever with the intent to cause or knowing that he is likely to cause wrongful 
loss or damage to the public or any person destroys or deletes or alters any 
information residing in a computer resource or diminishes its value or utility or 
affects it injuriously by any means, commits hacking. 
(2) Whoever commits hacking shall be punished with imprisonment up to three 
years, or with fine which may extend up to two lakh rupees, or with both.
• EXPLANATION: The section tells about the hacking activity. 
Essential ingredients of the section: 
1. Whoever with intention or knowledge. 
2. Causing wrongful loss or damage to the public or any person. 
3. Destroying or altering any information residing in a computer resource. 
4. Or diminishes its value or utility or. 
5. Affects it injuriously by any means. 
PENALTIES: Punishment: Imprisoned up to three years and 
FINE: which may extend up to two lakh rupees.Or with both.
• CASE LAWS: 
1. R v/s Gold & Schifreen 
In this case it is observed that the accused gained access to the British telecom 
Prestl Gold computers networks file amount to dishonest trick and not criminal 
offence. 
2. R v/s Whiteley. 
In this case the accused gained unauthorized access to the Joint Academic 
Network (JANET) and deleted, added files and changed the passwords to deny 
access to the authorized users. 
The perspective of the section is not merely protect the information but to 
protect the integrity and security of computer resources from attacks by 
unauthorized person seeking to enter such resource, whatever may be the 
intention or motive.
• 66A. PUNISHMENT FOR SENDING OFFENSIVE MESSAGES 
THROUGH COMMUNICATION SERVICE, ETC. 
• Any person who sends, by means of a computer resource or a communication device,— 
• (a) Any information that is grossly offensive or has menacing character; or 
• (b) any information which he knows to be false, but for the purpose of causing annoyance, 
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or 
ill will, persistently by making use of such computer resource or a communication device, 
• (c) Any electronic mail or electronic mail message for the purpose of causing annoyance 
or inconvenience or to deceive or to mislead the addressee or recipient about the origin of 
such messages,shall be punishable with imprisonment for a term which may extend to 
three years and with fine.
• EXPLANATION.— For the purpose of this section, terms “electronic mail” and 
“electronic mail message” means a message or information created or transmitted or 
received on a computer, computer system, computer resource or communication device 
including attachments in text, images, audio, video and any other electronic record, which 
may be transmitted with the message 
• RELATED CASE : 
Fake profile of President posted by imposter On September 9, 2010, the imposter made a 
fake profile in the name of the Hon’ble President Pratibha Devi Patil. A complaint was 
made from Additional Controller, President Household, President Secretariat regarding 
the four fake profiles created in the name of Hon’ble President on social networking 
website, Facebook. The said complaint stated that president house has nothing to do 
with the facebook and the fake profile is misleading the general public. The First 
Information Report Under Sections 469 IPC and 66A Information Technology Act, 2000 
was registered based on the said complaint at the police station, Economic Offences 
Wing, the elite wing of Delhi Police which specializes in investigating economic crimes 
including cyber offences.
66 B. PUNISHMENT FOR DISHONESTLY RECEIVING STOLEN 
COMPUTER RESOURCE OR COMMUNICATION DEVICE 
• Whoever dishonestly receives or retains any stolen computer resource or 
communication device knowing or having reason to believe the same to be stolen 
computer resource or communication device. 
• PUNISHMENT 
shall be punished with imprisonment of either description for a term which may 
extend to three years or with fine which may extend to rupees one lakh or with 
both.
66C PUNISHMENT FOR IDENTITY THEFT 
• Whoever, fraudulently or dishonestly make use of the electronic signature, 
password or any other unique identification feature of any other person, 
• PUNISHMENT 
shall be punished with imprisonment of either description for a term which may 
extend to three years and shall also be liable to fine which may extend to rupees one 
lakh.
66D PUNISHMENT FOR CHEATING BY PERSONATION BY USING 
COMPUTER RESOURCE 
• Whoever, by means of any communication device or computer resource cheats by 
personation, shall be punished with imprisonment of either description for a term 
which may extend to, 
• PUNISHMENT: Three years and shall also be liable to fine which may extend to 
one lakh rupees.
• 66E PUNISHMENT FOR VIOLATION OF PRIVACY 
• Whoever, intentionally or knowingly captures, publishes or transmits the image of a 
private area of any person without his or her consent, under circumstances violating 
the privacy of that person. 
• Explanation.- For the purposes of this section– 
• (a) “transmit” means to electronically send a visual image with the intent that it be 
viewed by a person or persons; 
• (b) “capture”, with respect to an image, means to videotape, photograph, film or 
record by any means; 
• (c) “private area” means the naked or undergarment clad genitals, pubic area, 
buttocks or female breast; 
• (d) “publishes” means reproduction in the printed or electronic form and making it 
available for public; 
• (e) “under circumstances violating privacy” means circumstances in which a person 
can have a reasonable expectation that– 
• (i) he or she could disrobe in privacy, without being concerned that an image of his 
private area was being captured; or 
• (ii) any part of his or her private area would not be visible to the public, regardless 
of whether that person is in a public or private place. 
• PUNISHMENT:shall be punished with imprisonment which may extend to three 
years or with fine not exceeding two lakh rupees, or with both
66F. PUNISHMENT FOR CYBER TERRORISM 
• (1) Whoever,- 
• (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike 
terror in the people or any section of the people by – 
• (i) denying or cause the denial of access to any person authorized to access computer 
resource; or 
• (ii) attempting to penetrate or access a computer resource without authorisation or 
exceeding authorized access; or 
• (iii) introducing or causing to introduce any Computer Contaminant. and by means of 
such conduct causes or is likely to cause death or injuries to persons or damage to or 
destruction of property or disrupts or knowing that it is likely to cause damage or 
disruption of supplies or services essential to the life of the community
SECTION 67. PUBLISHING OF OBSCENE INFORMATION IN ELECTRONIC 
FORM: 
• Whoever publishes or transmits or causes to be published in the electronic form, any 
material which is lascivious or appeals to the prurient interest or if its effect is such as to 
tend to deprave and corrupt persons who are likely, having regard to all relevant 
circumstance, to read see or hear the matter contained or embodied in it, shall be 
punished on first conviction with imprisonment of either description for a term which 
may extend to five years and with fine which may extend to one lakh rupees and in the 
event of a second or subsequent conviction with imprisonment of either description for a 
term which may extend to ten years and also with fine which may extend to two lakh 
rupees.
• Essential ingredients of this section: 
• Publishing or transmitting, or causing to be published, pornographic material in 
electronic form. 
PENALTIES: 
• Punishment: (1) On first conviction --- imprisonment which may extend up to five 
years. 
Fine: up to on first conviction which may extend to one lakh rupees. 
(2) On second conviction ---- imprisonment up to which may extend to ten years 
and Fine which may extend up to two lakh rupees.
• CASE LAWS: 
The State of Tamil Nadu v/s Suhas Katti. 
Facts: This case is about posting obscene, defamatory and annoying message about a 
divorcee woman in the Yahoo message group. E-mails were forwarded to the victim for 
information by the accused through a false e- mail account opened by him in the name of 
the victim. These postings resulted in annoying phone calls to the lady. Based on the 
complaint police nabbed the accused. He was a known family friend of the victim and was 
interested in marrying her. She married to another person, but that marriage ended in 
divorce and the accused started contacting her once again. And her reluctance to marry 
him he started harassing her through internet. 
Held: The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 
2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 
years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced 
to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 
67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to 
run concurrently.”
• The accused paid fine amount and he was lodged at Central Prison, Chennai. This is 
considered the first case convicted under section 67 of Information Technology Act 
2000 in India. 
2. In a recent case, a groom's family received numerous emails containing defamatory 
information about the prospective bride. Fortunately, they did not believe the emails and 
chose to take the matter to the police. The sender of the emails turned out to be the girl's 
step-father, who did not want the girl to get married, as he would have lost control over 
her property, of which he was the legal guardian.
67 A PUNISHMENT FOR PUBLISHING OR TRANSMITTING OF 
MATERIAL CONTAINING SEXUALLY EXPLICIT ACT, ETC. IN 
ELECTRONIC FORM 
• Whoever publishes or transmits or causes to be published or transmitted in the electronic 
form any material which contains sexually explicit act or conduct 
• Exception: This section and section 67 does not extend to any book, pamphlet, paper, 
writing, drawing, painting, representation or figure in electronic form- 
• (i) the publication of which is proved to be justified as being for the public good on the 
ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is 
in the interest of science,literature,art,or learning or other objects of general concern; or 
• (ii) which is kept or used bona fide for religious purposes. 
• PUNISHMENT:shall be punished on first conviction with imprisonment of either 
description for a term which may extend to five years and with fine which may extend to ten 
lakh rupees and in the event of second or subsequent conviction with imprisonment of either 
description for a term which may extend to seven years and also with fine which may extend 
to ten lakh rupees.
67 B Punishment for publishing or transmitting of material depicting 
children in sexually explicit act, etc. in electronic form 
• Whoever,- 
• (a) publishes or transmits or causes to be published or transmitted material in any 
electronic form which depicts children engaged in sexually explicit act or conduct or 
• (b) creates text or digital images, collects, seeks, browses, downloads, advertises, 
promotes, exchanges or distributes material in any electronic form depicting children in 
obscene or indecent or sexually explicit manner or 
• (c) cultivates, entices or induces children to online relationship with one or more hildren 
for and on sexually explicit act or in a manner that may offend a reasonable adult on the 
computer resource or 
• (d) facilitates abusing children online or
• SECTION 68. POWER OF CONTROLLER TO GIVE DIRECTIONS: 
• The Controller may, by order, direct a Certifying Authority or any employee of such 
Authority to take such measures or cease carrying on such activities as specified in the 
order if those are necessary to ensure compliance with the provisions of this Act, rules or 
any regulations made there under. 
(2) Any person who fails to comply with any order under sub-section (1) shall be guilty 
of an offence and shall be liable on conviction to imprisonment for a term not exceeding 
three years or to a fine not exceeding two lakh rupees or to both.
• EXPLANATION: Any person who fails to comply with any order under sub 
section (1) of the above section, shall be guilty of an offence and shall be convicted 
for a term not less then three years or to a fine exceeding two lakh rupees or to both. 
The under this section is non-bailable & cognizable. 
PENALTIES: Punishment: imprisonment up to a term not exceeding three years 
Fine: not exceeding two lakh rupees.
• Section 69. Directions of Controller to a subscriber to extend facilities to decrypt 
information: 
(1) If the Controller is satisfied that it is necessary or expedient so to do in the interest of 
the sovereignty or integrity of India, the security of the State, friendly relations with 
foreign States or public order or for preventing incitement to the commission of any 
cognizable offence; for reasons to be recorded in writing, by order, direct any agency 
of the Government to intercept any information transmitted through any computer 
resource. 
(2) The subscriber or any person in charge of the computer resource shall, when 
called upon by any agency which has been directed under sub-section (1), extend all 
facilities and technical assistance to decrypt the information. 
(3) The subscriber or any person who fails to assist the agency referred to in 
subsection 
(2) shall be punished with an imprisonment for a term which may extend to 
seven years.
• SECTION 70. PROTECTED SYSTEM: 
(1) The appropriate Government may, by notification in the Official Gazette, declare that any 
computer, computer system or computer network to be a protected system. 
(2) The appropriate Government may, by order in writing, authorize the persons who are authorized 
to access protected systems notified under sub-section (1). 
(3) Any person who secures access or attempts to secure access to a protected system in 
contravention of the provision of this section shall be punished with imprisonment of either 
description for a term which may extend to ten years and shall also be liable to fine. 
Explanation: 
• This section grants the power to the appropriate government to declare any computer, computer 
system or computer network, to be a protected system. Only authorized person has the right to 
access to protected system. 
PENALTIES: Punishment: the imprisonment which may extend to ten years and 5 lakh fine.
• SECTION 71. PENALTY FOR MISREPRESENTATION: 
(1) Whoever makes any misrepresentation to, or suppresses any material fact from, the 
Controller or the Certifying Authority for obtaining any license or Digital Signature 
Certificate, as the case may be, shall be punished with imprisonment for a term which 
may extend to two years, or which fine which may extend to one lakh rupees, or with 
both. 
PENALTIES: Punishment: imprisonment which may extend to two years 
Fine: may extend to one lakh rupees or with both.
• 153 -Wantonly giving provocation with intent to cause riot-if rioting be 
committed-if not committed, 
• 153A - Promoting enmity between different groups on grounds of religion, 
race, place of birth, residence, language, etc., and doing acts prejudicial to 
maintenance of harmony, 
• 153AA - Punishment for knowingly carrying arms in any procession or 
organizing, or holding or taking part in any mass drill or mass training with 
arms, 
• 153B - Imputations, assertions prejudicial to national-integration 
• 420 – Cheating and dishonestly inducing delivery of property. 
• 426 - Punished for mischief 
• 469 - Forgery for purpose of harming reputation. 
• 509 -Word, gesture or act intended to insult the modesty of a woman

Contenu connexe

Tendances

Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 

Tendances (20)

Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Types of cyber crimes
Types of cyber crimesTypes of cyber crimes
Types of cyber crimes
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similaire à Cyber law assignment

Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignmentRubina Shaikh
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law casesSnavi
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
Nitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTANitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTASaurav Gupta
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 

Similaire à Cyber law assignment (20)

Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignment
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
IT ACT Sec 66.ppt
IT ACT Sec 66.pptIT ACT Sec 66.ppt
IT ACT Sec 66.ppt
 
Nitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTANitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTA
 
Indian cyber law & acts
Indian cyber law & actsIndian cyber law & acts
Indian cyber law & acts
 
Indian cyber law
Indian cyber lawIndian cyber law
Indian cyber law
 
Shilpa
ShilpaShilpa
Shilpa
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 

Cyber law assignment

  • 1. GLOBAL BUSINESS SCHOOL, HUBLI. Assignment on cyber law Submitted By: Rajshekhar Gananur MBA13007072 Submitted To Dr. Bhargav Revankar
  • 2.
  • 3. •SEC 43:PENALTY AND COMPENSATION FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM, ETC. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, or computer resource — •accesses or secures access to such computer, computer system or computer network; •downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; •introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; •damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmers residing in such computer, computer system or computer network; •disrupts or causes disruption of any computer, computer system or computer network;
  • 4. • denies or causes the denial of access to any person authorized to access any computer, computer system or computer network by any means; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made there under; • charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation to the person so affected. • destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; • steel, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage
  • 5. PUNISHMENT Compensation claims upto 1crore or 3 years imprisonment or both RELATED CASE LET:
  • 6. Section 65 in the Information Technology Act, 2000: Tampering with computer source documents • Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force • For the purposes of this section, "computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form."
  • 7. • PUNISHMENTS: • Shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both
  • 8. • SECTION66. HACKING WITH THE COMPUTER SYSTEM: (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 9. • EXPLANATION: The section tells about the hacking activity. Essential ingredients of the section: 1. Whoever with intention or knowledge. 2. Causing wrongful loss or damage to the public or any person. 3. Destroying or altering any information residing in a computer resource. 4. Or diminishes its value or utility or. 5. Affects it injuriously by any means. PENALTIES: Punishment: Imprisoned up to three years and FINE: which may extend up to two lakh rupees.Or with both.
  • 10. • CASE LAWS: 1. R v/s Gold & Schifreen In this case it is observed that the accused gained access to the British telecom Prestl Gold computers networks file amount to dishonest trick and not criminal offence. 2. R v/s Whiteley. In this case the accused gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users. The perspective of the section is not merely protect the information but to protect the integrity and security of computer resources from attacks by unauthorized person seeking to enter such resource, whatever may be the intention or motive.
  • 11. • 66A. PUNISHMENT FOR SENDING OFFENSIVE MESSAGES THROUGH COMMUNICATION SERVICE, ETC. • Any person who sends, by means of a computer resource or a communication device,— • (a) Any information that is grossly offensive or has menacing character; or • (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device, • (c) Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages,shall be punishable with imprisonment for a term which may extend to three years and with fine.
  • 12. • EXPLANATION.— For the purpose of this section, terms “electronic mail” and “electronic mail message” means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message • RELATED CASE : Fake profile of President posted by imposter On September 9, 2010, the imposter made a fake profile in the name of the Hon’ble President Pratibha Devi Patil. A complaint was made from Additional Controller, President Household, President Secretariat regarding the four fake profiles created in the name of Hon’ble President on social networking website, Facebook. The said complaint stated that president house has nothing to do with the facebook and the fake profile is misleading the general public. The First Information Report Under Sections 469 IPC and 66A Information Technology Act, 2000 was registered based on the said complaint at the police station, Economic Offences Wing, the elite wing of Delhi Police which specializes in investigating economic crimes including cyber offences.
  • 13. 66 B. PUNISHMENT FOR DISHONESTLY RECEIVING STOLEN COMPUTER RESOURCE OR COMMUNICATION DEVICE • Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device. • PUNISHMENT shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.
  • 14. 66C PUNISHMENT FOR IDENTITY THEFT • Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, • PUNISHMENT shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
  • 15. 66D PUNISHMENT FOR CHEATING BY PERSONATION BY USING COMPUTER RESOURCE • Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to, • PUNISHMENT: Three years and shall also be liable to fine which may extend to one lakh rupees.
  • 16. • 66E PUNISHMENT FOR VIOLATION OF PRIVACY • Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person. • Explanation.- For the purposes of this section– • (a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons; • (b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means; • (c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast; • (d) “publishes” means reproduction in the printed or electronic form and making it available for public; • (e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that– • (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or • (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place. • PUNISHMENT:shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
  • 17. 66F. PUNISHMENT FOR CYBER TERRORISM • (1) Whoever,- • (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by – • (i) denying or cause the denial of access to any person authorized to access computer resource; or • (ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorized access; or • (iii) introducing or causing to introduce any Computer Contaminant. and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community
  • 18. SECTION 67. PUBLISHING OF OBSCENE INFORMATION IN ELECTRONIC FORM: • Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstance, to read see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.
  • 19. • Essential ingredients of this section: • Publishing or transmitting, or causing to be published, pornographic material in electronic form. PENALTIES: • Punishment: (1) On first conviction --- imprisonment which may extend up to five years. Fine: up to on first conviction which may extend to one lakh rupees. (2) On second conviction ---- imprisonment up to which may extend to ten years and Fine which may extend up to two lakh rupees.
  • 20. • CASE LAWS: The State of Tamil Nadu v/s Suhas Katti. Facts: This case is about posting obscene, defamatory and annoying message about a divorcee woman in the Yahoo message group. E-mails were forwarded to the victim for information by the accused through a false e- mail account opened by him in the name of the victim. These postings resulted in annoying phone calls to the lady. Based on the complaint police nabbed the accused. He was a known family friend of the victim and was interested in marrying her. She married to another person, but that marriage ended in divorce and the accused started contacting her once again. And her reluctance to marry him he started harassing her through internet. Held: The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.”
  • 21. • The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered the first case convicted under section 67 of Information Technology Act 2000 in India. 2. In a recent case, a groom's family received numerous emails containing defamatory information about the prospective bride. Fortunately, they did not believe the emails and chose to take the matter to the police. The sender of the emails turned out to be the girl's step-father, who did not want the girl to get married, as he would have lost control over her property, of which he was the legal guardian.
  • 22. 67 A PUNISHMENT FOR PUBLISHING OR TRANSMITTING OF MATERIAL CONTAINING SEXUALLY EXPLICIT ACT, ETC. IN ELECTRONIC FORM • Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct • Exception: This section and section 67 does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form- • (i) the publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the interest of science,literature,art,or learning or other objects of general concern; or • (ii) which is kept or used bona fide for religious purposes. • PUNISHMENT:shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.
  • 23. 67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form • Whoever,- • (a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or • (b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or • (c) cultivates, entices or induces children to online relationship with one or more hildren for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or • (d) facilitates abusing children online or
  • 24. • SECTION 68. POWER OF CONTROLLER TO GIVE DIRECTIONS: • The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made there under. (2) Any person who fails to comply with any order under sub-section (1) shall be guilty of an offence and shall be liable on conviction to imprisonment for a term not exceeding three years or to a fine not exceeding two lakh rupees or to both.
  • 25. • EXPLANATION: Any person who fails to comply with any order under sub section (1) of the above section, shall be guilty of an offence and shall be convicted for a term not less then three years or to a fine exceeding two lakh rupees or to both. The under this section is non-bailable & cognizable. PENALTIES: Punishment: imprisonment up to a term not exceeding three years Fine: not exceeding two lakh rupees.
  • 26. • Section 69. Directions of Controller to a subscriber to extend facilities to decrypt information: (1) If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence; for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. (2) The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub-section (1), extend all facilities and technical assistance to decrypt the information. (3) The subscriber or any person who fails to assist the agency referred to in subsection (2) shall be punished with an imprisonment for a term which may extend to seven years.
  • 27. • SECTION 70. PROTECTED SYSTEM: (1) The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system. (2) The appropriate Government may, by order in writing, authorize the persons who are authorized to access protected systems notified under sub-section (1). (3) Any person who secures access or attempts to secure access to a protected system in contravention of the provision of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine. Explanation: • This section grants the power to the appropriate government to declare any computer, computer system or computer network, to be a protected system. Only authorized person has the right to access to protected system. PENALTIES: Punishment: the imprisonment which may extend to ten years and 5 lakh fine.
  • 28. • SECTION 71. PENALTY FOR MISREPRESENTATION: (1) Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or which fine which may extend to one lakh rupees, or with both. PENALTIES: Punishment: imprisonment which may extend to two years Fine: may extend to one lakh rupees or with both.
  • 29.
  • 30. • 153 -Wantonly giving provocation with intent to cause riot-if rioting be committed-if not committed, • 153A - Promoting enmity between different groups on grounds of religion, race, place of birth, residence, language, etc., and doing acts prejudicial to maintenance of harmony, • 153AA - Punishment for knowingly carrying arms in any procession or organizing, or holding or taking part in any mass drill or mass training with arms, • 153B - Imputations, assertions prejudicial to national-integration • 420 – Cheating and dishonestly inducing delivery of property. • 426 - Punished for mischief • 469 - Forgery for purpose of harming reputation. • 509 -Word, gesture or act intended to insult the modesty of a woman