Cyber law

G
GNIM,Mullana (Ambala)Management Student à GNIM,Mullana (Ambala)
By :
Vishali Pandita
MBA (College Roll No- 14060)
Guru Nanak Institutes,Mullana Ambala
CYBERLAW
 Cyber law is a much newer phenomenon having emerged
much after the onset of internet . It is a generic term which
refers to all the legal and regulatory aspects of internet and the
www.
 So it is the part of the overall legal system that deals with the
internet,cyberspace and their respective legal issues.
 In other words you can say Cyber law is the law governing
cyber space
And cyber space includes computers/w, data storage
devices,internet websites,emails,and even electronic devices
such as cell phones, ATM machines etc.
Generally cyber law has been referred to “ law of
the internet”.
CYBERLAWSININDIA
• In May 2000,both the houses of the Indian
Parliament passed the Information
Technology Bill. The bill received the assent of
the president in August 2000 and came to be
known as the Information Technology
Act,2000.
• Cyber laws are contained in the IT ACT 2000.
ITACT2000
IT ACT 2000,has 13 chapters,94 sections and 4 schedules
• First 14 sections deals with some legal aspects
concerning digital signatures
• Further other sections deals with certifying authorities
who are licensed to issue digital signatures.
• Sections 43 to 47 provide for penalties and
compensation.
• Section 48 to 64 deals with Tribunals a appeal to high
court.
• Section 65 to 79 of the act deals with offences.
• Section 80 to 94 deals with miscellaneous of the act.
Cyber law
“Digital signature” means authentication of any
electronic record by a subscriber by means of an
electronic method or procedure in accordance with the
provisions of Section 3.
It consist of public key and private key.
Private key is allocated to a individual which
enables the user to fix a digital signature.
Public key is available to all who want to check
authentication of records.
Cyber crime is the latest and perhaps the most
complicated problem in the cyber world.
Cyber crimes are unlawful acts where computer is
used either as a tool :or a target :or both.
It can be categories as :–
1. Cyber crime against persons
2. Cyber crime against property
3. Cyber crime against government
Cyber law covers the intellectual property laws that relate to
cyber space and its constituents . This includes:
Copyright law in relation to computer software ,computer
source code etc.
Trademark law in relation to domain names.
Semiconductor law ,which relates to the protection of
semiconductor design and layouts.
Patent law in relation to computer hardware and software.
Data protection and privacy laws aim to achieve a fair
balance between the privacy rights of the individual
and the interests of data controllers such as: banks,
hospitals , email service providers etc.
Many nations have enacted legislation relating to
data protection and privacy within their jurisdictions.
These laws would probably play a vital role, as the
dependence on insecure networks such as the internet
grows further.
AhmadabadBlastCase
5 minutes before the blast an e-mail was sent to national TV
Channels warning about blasts in Ahmedabad.The e-mail was traced
to Kenneth Haywood's computer, who stayed at Gunina apartment in
Navi Mumbai. Haywood claimed that his computer was hacked. A
technician associated with VSNL had asked him not to change the
password of his wireless Internet Network.Haywoods laptop and
computer was then sent to the forensic science laboratory at Kalian.
Wi-fi system was used to hack Haywood’s account to send e-mail
Need For Cyber Laws
1. Laws are necessary in all segments of society, and
e-commerce is exception .
2. All internet users , including minors , need to be assured of
their privacy and the safety of their personal information
online .
3. In today’s highly digitalized world , almost everyone is affected
by cyber law.
4. Almost all companies extensively depend upon their
computer networks and keep their valuable data in
electronic form.
5. Government forms including income tax returns , company
law forms etc are now filled in electronic forms.
6. Consumers are increasingly using credit cards for shopping.
ADVNATAGESOFCYBERLAW
1. IT ACT 2000 attempts to change outdated laws and
provides ways to deal with cyber crime.
2. Companies shall now be able to carry out electronic
commerce using legal infrastructure provided by the
act
3. Digital signatures have been given legal validity and
sanction in the Act.
4. The act now allows government to issue notification
on the web thus handling e-goverence.
5. The law sets up the territorial jurisdictions of the
adjudicating officers for cyber crimes and the crime
regulations appellate tribunal.
DONOT SHARE IT
WITH ANYONE ELSE
AND CHANGE IT AFTER
EVERY 3 MONTHS
1 sur 13

Recommandé

Introduction to cyber law. par
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law. PROF. PUTTU GURU PRASAD
864 vues23 diapositives
Cyber law par
Cyber lawCyber law
Cyber lawArnab Roy Chowdhury
108.4K vues31 diapositives
Need And Importance Of Cyber Law par
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
135.6K vues7 diapositives
Unit 3 Cyber Crimes and Torts 8 hr par
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
1.9K vues36 diapositives
Cyber Crime & Information technology Act 2000 par
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
13.1K vues21 diapositives
Cyber law2 par
Cyber law2Cyber law2
Cyber law2Setu Joshi
873 vues44 diapositives

Contenu connexe

Tendances

Cyber law par
Cyber lawCyber law
Cyber lawpremarhea
555 vues45 diapositives
Cybercrime Investigations and IT Act,2000 par
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
11.2K vues70 diapositives
IT Act 2000 par
IT Act 2000IT Act 2000
IT Act 2000Pradeep Tomar
854 vues19 diapositives
IT ACT 2000 par
IT ACT 2000IT ACT 2000
IT ACT 2000Sudarsan Subramanian
362 vues17 diapositives
Cyber crime and its types par
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
2K vues23 diapositives
It act 2000 par
It act 2000It act 2000
It act 2000Himal Rustagi
688 vues18 diapositives

Tendances(20)

Cybercrime Investigations and IT Act,2000 par Karnika Seth
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth11.2K vues
Information technology ACT - 2000 (Legal Aspect of Business) par Parth Patel
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
Parth Patel353 vues
Information technology act par AKSHAY KHATRI
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI12.1K vues
Indian Cyber laws par mulikaa
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa1.3K vues
Cybercrime a growing threat of 21 st century !!! par Asma Hossain
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain732 vues
Cyber law & Intellectual property issues par atuljaybhaye
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye9.9K vues
What constitutes a cyber crime in the country par Ujjwal Tripathi
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi4K vues
Cyber law In India: its need & importance par Aditya Shukla
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla83.6K vues
Information Technology Act par maruhope
Information Technology ActInformation Technology Act
Information Technology Act
maruhope11.9K vues

En vedette

Membership and securities (1), Company Law, Law of Business Associations 2 par
Membership and securities (1), Company Law, Law of Business Associations 2Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2Quincy Kiptoo
2.6K vues53 diapositives
Different kinds of conscience par
Different kinds of conscienceDifferent kinds of conscience
Different kinds of conscienceJoseph Christian Legaspi
65.1K vues8 diapositives
Cyber security awareness for students par
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
46.5K vues32 diapositives
borrowing powers par
borrowing powersborrowing powers
borrowing powersSonali Kukreja
9.5K vues19 diapositives
Understanding Preferential Allotment of Securities par
Understanding Preferential Allotment of SecuritiesUnderstanding Preferential Allotment of Securities
Understanding Preferential Allotment of SecuritiesPavan Kumar Vijay
21.3K vues54 diapositives
Borrowing powers par
Borrowing powersBorrowing powers
Borrowing powersPRIYANKA BHATI
25.2K vues12 diapositives

En vedette(16)

Membership and securities (1), Company Law, Law of Business Associations 2 par Quincy Kiptoo
Membership and securities (1), Company Law, Law of Business Associations 2Membership and securities (1), Company Law, Law of Business Associations 2
Membership and securities (1), Company Law, Law of Business Associations 2
Quincy Kiptoo2.6K vues
Cyber security awareness for students par Kandarp Shah
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah46.5K vues
Understanding Preferential Allotment of Securities par Pavan Kumar Vijay
Understanding Preferential Allotment of SecuritiesUnderstanding Preferential Allotment of Securities
Understanding Preferential Allotment of Securities
Pavan Kumar Vijay21.3K vues
Sale of goods act, 1930(conditions and warranties ) par Gurparvesh kaur
Sale of goods act, 1930(conditions and warranties )Sale of goods act, 1930(conditions and warranties )
Sale of goods act, 1930(conditions and warranties )
Gurparvesh kaur38.8K vues
Shares and its types par Vishnu NK
Shares and its typesShares and its types
Shares and its types
Vishnu NK185.1K vues
Companies Act 1956 par wizkidrx
Companies Act 1956Companies Act 1956
Companies Act 1956
wizkidrx65.9K vues
Consumer Protection Act par Atif Ghayas
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
Atif Ghayas294.5K vues

Similaire à Cyber law

India cyber par
India cyberIndia cyber
India cybersabariss
635 vues18 diapositives
Www.cccindia.co corecentre database_docs_doc_files_india_cyber par
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
365 vues18 diapositives
Cyber law – it act 2000,it act 2008 par
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
1.4K vues17 diapositives
Cyber Law & Crime (Information Technology Act, 2000) par
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
5.9K vues31 diapositives
Introduction to Cyber Crimes par
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
6.3K vues74 diapositives
Cyberlaws report par
Cyberlaws reportCyberlaws report
Cyberlaws reportAnirudhRaju6
50 vues4 diapositives

Similaire à Cyber law(20)

India cyber par sabariss
India cyberIndia cyber
India cyber
sabariss635 vues
Www.cccindia.co corecentre database_docs_doc_files_india_cyber par cloneseeyom
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
cloneseeyom365 vues
Cyber law – it act 2000,it act 2008 par ATHULYARAJDS
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
ATHULYARAJDS1.4K vues
Cyber Law & Crime (Information Technology Act, 2000) par Swant Anand
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand5.9K vues
Introduction to Cyber Crimes par atuljaybhaye
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye6.3K vues
Manoj 1 par manojnd
Manoj 1Manoj 1
Manoj 1
manojnd334 vues
Cyber law in India: Its need & importance par Aditya Shukla
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla3.9K vues
cyber law IT Act 2000 par Yash Jain
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain1.4K vues
SITA LAB REPORT (XYBER CRIME) par Asish Verma
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma2.5K vues

Dernier

231112 (WR) v1 ChatGPT OEB 2023.pdf par
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdfWilfredRubens.com
157 vues21 diapositives
The Open Access Community Framework (OACF) 2023 (1).pptx par
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
110 vues7 diapositives
Community-led Open Access Publishing webinar.pptx par
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
93 vues9 diapositives
Sociology KS5 par
Sociology KS5Sociology KS5
Sociology KS5WestHatch
70 vues23 diapositives
ICS3211_lecture 08_2023.pdf par
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
149 vues30 diapositives
The basics - information, data, technology and systems.pdf par
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdfJonathanCovena1
115 vues1 diapositive

Dernier(20)

The Open Access Community Framework (OACF) 2023 (1).pptx par Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc110 vues
Community-led Open Access Publishing webinar.pptx par Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc93 vues
The basics - information, data, technology and systems.pdf par JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1115 vues
Create a Structure in VBNet.pptx par Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 vues
Drama KS5 Breakdown par WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch79 vues
Narration lesson plan.docx par TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN112 vues
Dance KS5 Breakdown par WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch79 vues
Scope of Biochemistry.pptx par shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba133 vues
UWP OA Week Presentation (1).pptx par Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc88 vues
JiscOAWeek_LAIR_slides_October2023.pptx par Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc96 vues

Cyber law

  • 1. By : Vishali Pandita MBA (College Roll No- 14060) Guru Nanak Institutes,Mullana Ambala
  • 2. CYBERLAW  Cyber law is a much newer phenomenon having emerged much after the onset of internet . It is a generic term which refers to all the legal and regulatory aspects of internet and the www.  So it is the part of the overall legal system that deals with the internet,cyberspace and their respective legal issues.  In other words you can say Cyber law is the law governing cyber space And cyber space includes computers/w, data storage devices,internet websites,emails,and even electronic devices such as cell phones, ATM machines etc. Generally cyber law has been referred to “ law of the internet”.
  • 3. CYBERLAWSININDIA • In May 2000,both the houses of the Indian Parliament passed the Information Technology Bill. The bill received the assent of the president in August 2000 and came to be known as the Information Technology Act,2000. • Cyber laws are contained in the IT ACT 2000.
  • 4. ITACT2000 IT ACT 2000,has 13 chapters,94 sections and 4 schedules • First 14 sections deals with some legal aspects concerning digital signatures • Further other sections deals with certifying authorities who are licensed to issue digital signatures. • Sections 43 to 47 provide for penalties and compensation. • Section 48 to 64 deals with Tribunals a appeal to high court. • Section 65 to 79 of the act deals with offences. • Section 80 to 94 deals with miscellaneous of the act.
  • 6. “Digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of Section 3. It consist of public key and private key. Private key is allocated to a individual which enables the user to fix a digital signature. Public key is available to all who want to check authentication of records.
  • 7. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crimes are unlawful acts where computer is used either as a tool :or a target :or both. It can be categories as :– 1. Cyber crime against persons 2. Cyber crime against property 3. Cyber crime against government
  • 8. Cyber law covers the intellectual property laws that relate to cyber space and its constituents . This includes: Copyright law in relation to computer software ,computer source code etc. Trademark law in relation to domain names. Semiconductor law ,which relates to the protection of semiconductor design and layouts. Patent law in relation to computer hardware and software.
  • 9. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as: banks, hospitals , email service providers etc. Many nations have enacted legislation relating to data protection and privacy within their jurisdictions. These laws would probably play a vital role, as the dependence on insecure networks such as the internet grows further.
  • 10. AhmadabadBlastCase 5 minutes before the blast an e-mail was sent to national TV Channels warning about blasts in Ahmedabad.The e-mail was traced to Kenneth Haywood's computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet Network.Haywoods laptop and computer was then sent to the forensic science laboratory at Kalian. Wi-fi system was used to hack Haywood’s account to send e-mail
  • 11. Need For Cyber Laws 1. Laws are necessary in all segments of society, and e-commerce is exception . 2. All internet users , including minors , need to be assured of their privacy and the safety of their personal information online . 3. In today’s highly digitalized world , almost everyone is affected by cyber law. 4. Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. 5. Government forms including income tax returns , company law forms etc are now filled in electronic forms. 6. Consumers are increasingly using credit cards for shopping.
  • 12. ADVNATAGESOFCYBERLAW 1. IT ACT 2000 attempts to change outdated laws and provides ways to deal with cyber crime. 2. Companies shall now be able to carry out electronic commerce using legal infrastructure provided by the act 3. Digital signatures have been given legal validity and sanction in the Act. 4. The act now allows government to issue notification on the web thus handling e-goverence. 5. The law sets up the territorial jurisdictions of the adjudicating officers for cyber crimes and the crime regulations appellate tribunal.
  • 13. DONOT SHARE IT WITH ANYONE ELSE AND CHANGE IT AFTER EVERY 3 MONTHS