SlideShare une entreprise Scribd logo
1  sur  18
Cyber Crimes: The biggest
threat in the digital age.
Presented by:
Atul S. Jaybhaye
Assistant Professor (Law)
Hidayatullah National Law University, Raipur
B.A.LL.M.NET
What is Cyber Law?
 A law which relates to computer, Internet and cyberspace
related issues.
 It is also called as Information Technology Law/Internet Law.
 Cyber Law In India – The Information Technology Act, 2000.
 Cyberspace has no any geographic boundaries.
Need for Cyber Law:
 Prevention of cyber crimes.
 To recognize Electronic and Digital signature.
 To promote E-commerce and E-governance.
 To protect Intellectual Property in cyberspace.
 Data protection and privacy.
What is cyber crime?
 Cyber crime is a crime where computer is used as a target
or tool to commit a crime.
 Cyber crime is a crime where ‘computer resource’ is
involved.
 Difference between cyber crimes and traditional crimes.
 Difference between cyber crimes and cyber torts.
Categories of cyber crimes:
Person
Property
Government
Phishing:
 Phishing:
Phishing is a method of trying to gather personal
information using deceptive e-mails and websites.
 Vishing:
When you receive fake calls over mobile phone, landline
to gain access to your confidential information. (Jamtara
scam)
 Smishing:
Just like phishing, smishing uses cell phone text messages
to lure consumers in.
ATM Skimming fraud:
ATM skimming is a theft of card
information, where a small device,
known as a skimmer, is used to steal
the information during a
legitimate ATM transaction.
Hacking:
 Unauthorized access to computer system with the
intention of stealing information, causing damage,
wrongful loss to individual/entity/govt.
 Punishable under Sec. 66 of IT Act, i.e. Computer related
offences.
 Difference between ethical and unethical hacking.
 Types of Hackers- white hat, black hat hackers.
Violation of privacy:
 Whoever, intentionally or knowingly,
 captures,
 publishes or transmits,
 the image of a private area of any person without his or
her consent, under circumstances violating the privacy of
that person,
 Commits offence under Sec. 66-E of IT Act.
Cyber stalking:
“ Any man who:-
I. follows a woman and contacts, or attempts to contact
such woman to foster personal interaction repeatedly
despite a clear indication of disinterest by such woman;
or
II. monitors the use by a woman of the internet, email or
any other form of electronic communication commits the
offence of stalking”
 Punishable under Sec. 354-D of IPC,1860.
Cyber defamation:
 The term ‘Cyber Defamation’ basically means publishing of
false statement about an individual in cyberspace that can
injure or harm the reputation of that individual.
 Punishable under section 500 of IPC, 1860.
 Initially, cyber defamation, hate speech was punishable under
Sec. 66-A of IT Act, 2000.
 However, Sec.66-A has been struck down now.
Child pornography:
Acts prohibited under Sec. 67- B of the IT Act:
 Depicting children in sexually explicit act/conduct,
 Publishing or transmitting,
 browsing or downloading ,
 Inducing children to online relationship, or
 Facilitates abusing children online.
Identity theft:
 Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique
identification feature of any other person, commits the
offence of Identity theft.
 Punishable under Sec. 66-C of IT Act, 2000.
Other cyber crimes at a glance:
 Spamming.
 Denial of Service attack (DOS).
 Tampering with computer source documents.
 Dishonestly receiving stolen computer
resource/communication device.
 Cyber terrorism.
 Obscenity.
 Cheating by personation.
 Computer vandalism etc.
Investigation of a cyber crime:
 Investigation to be conducted by a police officer not below the rank of
Inspector. (Sec.78 IT Act, 2000.)
 Admissibility of E-records/ Digital evidence in a court of law. Sec. 65-B
Indian Evidence Act,1872.
 Digital Evidence in cyber crimes: CPU, Computer/lap top, Mobile
phone, CCTV footage, scanner, color printer, Hard disk, CD, DVD,
Modem, pen drive or any other e-record and communication device.
 Role of Cyber cell, CERT and Cyber Forensic Experts.
 Challenges involved: Issues of jurisdiction in cyberspace, Lack of
skilled investigators in cyber crimes, production of digital evidence in
court etc.
Do’s and don'ts:
 Never handover your ATM card for swapping to others. Do
it yourself.
 Use 2 step verification method to sign in e-mails.
 Skimmers are usually used for ATM card frauds. Before
inserting ATM card check machine minutely.
 Be cautious at hotels, petrol pumps while making online
transactions.
 Report all cyber crimes on cybercrime.gov.in
 Always browse through https sites and not http.
Do’s and don'ts:
 Always reach to banking sites through address bar and not from
Google.
 Keep changing your passwords frequently. Don't set password as your
name, date of birth, mobile number, vehicle number.
 Don't use public Wi-Fi.
 Don't share your mobile number, e-mails unnecessarily at shops,
hotels.
 Inform bank within 24 hours if card is not used by you.
 Do the test transaction at ATM machine in case money is withdrawn
from your account by other person. Purpose is to prove your
presence at relevant time in that city/country. Even if you block
card, do the test transaction to get back your money.
Be Alert..Be Safe..
Thank you…

Contenu connexe

Tendances (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remedies
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber law
Cyber lawCyber law
Cyber law
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 

Similaire à Cyber crimes in the digital age

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 

Similaire à Cyber crimes in the digital age (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 

Plus de atuljaybhaye

Procedure for registration of patents
Procedure for registration of patentsProcedure for registration of patents
Procedure for registration of patentsatuljaybhaye
 
Patentable inventions
Patentable inventionsPatentable inventions
Patentable inventionsatuljaybhaye
 
Non patentable inventions in india
Non patentable inventions in indiaNon patentable inventions in india
Non patentable inventions in indiaatuljaybhaye
 
Introduction to patents
Introduction to patentsIntroduction to patents
Introduction to patentsatuljaybhaye
 
Infringement of patents and remedies
Infringement of patents and remediesInfringement of patents and remedies
Infringement of patents and remediesatuljaybhaye
 
Copyright amendment Act, 2012
Copyright amendment Act, 2012Copyright amendment Act, 2012
Copyright amendment Act, 2012atuljaybhaye
 
Assignment of trademark
Assignment of trademarkAssignment of trademark
Assignment of trademarkatuljaybhaye
 
Amendments under patent law
Amendments under patent lawAmendments under patent law
Amendments under patent lawatuljaybhaye
 
Concept of passing off sem vi
Concept of passing off   sem viConcept of passing off   sem vi
Concept of passing off sem viatuljaybhaye
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in indiaatuljaybhaye
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in indiaatuljaybhaye
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 

Plus de atuljaybhaye (20)

Procedure for registration of patents
Procedure for registration of patentsProcedure for registration of patents
Procedure for registration of patents
 
Patentable inventions
Patentable inventionsPatentable inventions
Patentable inventions
 
Non patentable inventions in india
Non patentable inventions in indiaNon patentable inventions in india
Non patentable inventions in india
 
Introduction to patents
Introduction to patentsIntroduction to patents
Introduction to patents
 
Infringement of patents and remedies
Infringement of patents and remediesInfringement of patents and remedies
Infringement of patents and remedies
 
Copyright amendment Act, 2012
Copyright amendment Act, 2012Copyright amendment Act, 2012
Copyright amendment Act, 2012
 
Assignment of trademark
Assignment of trademarkAssignment of trademark
Assignment of trademark
 
Amendments under patent law
Amendments under patent lawAmendments under patent law
Amendments under patent law
 
Concept of passing off sem vi
Concept of passing off   sem viConcept of passing off   sem vi
Concept of passing off sem vi
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
E governance
E  governanceE  governance
E governance
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Labour law ii
Labour law  iiLabour law  ii
Labour law ii
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Trademark law ppt
Trademark law pptTrademark law ppt
Trademark law ppt
 
Specific offences
Specific offencesSpecific offences
Specific offences
 
Law of evidence
Law of evidenceLaw of evidence
Law of evidence
 

Dernier

昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Attestation presentation under Transfer of property Act
Attestation presentation under Transfer of property ActAttestation presentation under Transfer of property Act
Attestation presentation under Transfer of property Act2020000445musaib
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 

Dernier (20)

昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Attestation presentation under Transfer of property Act
Attestation presentation under Transfer of property ActAttestation presentation under Transfer of property Act
Attestation presentation under Transfer of property Act
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 

Cyber crimes in the digital age

  • 1. Cyber Crimes: The biggest threat in the digital age. Presented by: Atul S. Jaybhaye Assistant Professor (Law) Hidayatullah National Law University, Raipur B.A.LL.M.NET
  • 2. What is Cyber Law?  A law which relates to computer, Internet and cyberspace related issues.  It is also called as Information Technology Law/Internet Law.  Cyber Law In India – The Information Technology Act, 2000.  Cyberspace has no any geographic boundaries.
  • 3. Need for Cyber Law:  Prevention of cyber crimes.  To recognize Electronic and Digital signature.  To promote E-commerce and E-governance.  To protect Intellectual Property in cyberspace.  Data protection and privacy.
  • 4. What is cyber crime?  Cyber crime is a crime where computer is used as a target or tool to commit a crime.  Cyber crime is a crime where ‘computer resource’ is involved.  Difference between cyber crimes and traditional crimes.  Difference between cyber crimes and cyber torts.
  • 5. Categories of cyber crimes: Person Property Government
  • 6. Phishing:  Phishing: Phishing is a method of trying to gather personal information using deceptive e-mails and websites.  Vishing: When you receive fake calls over mobile phone, landline to gain access to your confidential information. (Jamtara scam)  Smishing: Just like phishing, smishing uses cell phone text messages to lure consumers in.
  • 7. ATM Skimming fraud: ATM skimming is a theft of card information, where a small device, known as a skimmer, is used to steal the information during a legitimate ATM transaction.
  • 8. Hacking:  Unauthorized access to computer system with the intention of stealing information, causing damage, wrongful loss to individual/entity/govt.  Punishable under Sec. 66 of IT Act, i.e. Computer related offences.  Difference between ethical and unethical hacking.  Types of Hackers- white hat, black hat hackers.
  • 9. Violation of privacy:  Whoever, intentionally or knowingly,  captures,  publishes or transmits,  the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person,  Commits offence under Sec. 66-E of IT Act.
  • 10. Cyber stalking: “ Any man who:- I. follows a woman and contacts, or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman; or II. monitors the use by a woman of the internet, email or any other form of electronic communication commits the offence of stalking”  Punishable under Sec. 354-D of IPC,1860.
  • 11. Cyber defamation:  The term ‘Cyber Defamation’ basically means publishing of false statement about an individual in cyberspace that can injure or harm the reputation of that individual.  Punishable under section 500 of IPC, 1860.  Initially, cyber defamation, hate speech was punishable under Sec. 66-A of IT Act, 2000.  However, Sec.66-A has been struck down now.
  • 12. Child pornography: Acts prohibited under Sec. 67- B of the IT Act:  Depicting children in sexually explicit act/conduct,  Publishing or transmitting,  browsing or downloading ,  Inducing children to online relationship, or  Facilitates abusing children online.
  • 13. Identity theft:  Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, commits the offence of Identity theft.  Punishable under Sec. 66-C of IT Act, 2000.
  • 14. Other cyber crimes at a glance:  Spamming.  Denial of Service attack (DOS).  Tampering with computer source documents.  Dishonestly receiving stolen computer resource/communication device.  Cyber terrorism.  Obscenity.  Cheating by personation.  Computer vandalism etc.
  • 15. Investigation of a cyber crime:  Investigation to be conducted by a police officer not below the rank of Inspector. (Sec.78 IT Act, 2000.)  Admissibility of E-records/ Digital evidence in a court of law. Sec. 65-B Indian Evidence Act,1872.  Digital Evidence in cyber crimes: CPU, Computer/lap top, Mobile phone, CCTV footage, scanner, color printer, Hard disk, CD, DVD, Modem, pen drive or any other e-record and communication device.  Role of Cyber cell, CERT and Cyber Forensic Experts.  Challenges involved: Issues of jurisdiction in cyberspace, Lack of skilled investigators in cyber crimes, production of digital evidence in court etc.
  • 16. Do’s and don'ts:  Never handover your ATM card for swapping to others. Do it yourself.  Use 2 step verification method to sign in e-mails.  Skimmers are usually used for ATM card frauds. Before inserting ATM card check machine minutely.  Be cautious at hotels, petrol pumps while making online transactions.  Report all cyber crimes on cybercrime.gov.in  Always browse through https sites and not http.
  • 17. Do’s and don'ts:  Always reach to banking sites through address bar and not from Google.  Keep changing your passwords frequently. Don't set password as your name, date of birth, mobile number, vehicle number.  Don't use public Wi-Fi.  Don't share your mobile number, e-mails unnecessarily at shops, hotels.  Inform bank within 24 hours if card is not used by you.  Do the test transaction at ATM machine in case money is withdrawn from your account by other person. Purpose is to prove your presence at relevant time in that city/country. Even if you block card, do the test transaction to get back your money.