SlideShare une entreprise Scribd logo
1  sur  22
Prof. Mukesh N Tekwani
2
What is Cyber Law?
1. Cyber law – all legal and regulatory aspects of the
Internet.
2. Cyber space - governed by a system of laws and
regulations called cyber law.
3. Why is cyber law needed? Millions of people around the
world use Internet for business, banking, social
interactions, and Internet is misused for criminal
activities. Hence the need for laws
3
Cyber Security Law – What you can do
1. In case you become a victim of cyber crime, what can you do?
2. Preserve the relevant incriminating electronic evidence.
3. Legal liability can be:
a) Civil liability
b) Criminal liability
4. Even if you are the victim, you still have a legal liability. The law
expects you to have the duty of due diligence.
5. If you are the victim, you must report the breach to the relevant
statutory authorities
6. Example – getting email from a bank with a bank statement/invoice
meant for someone else
4
Cyber Security Law – Challenges
1. The person committing cybercrime may not be located in your
country and so legal remedies could be difficult.
2. Anyone sitting in one country could target the network of a
company or a govt in another country.
3. There is no international legal law for such matters. So jurisdiction is
going to pay a very important role in tackling cybercrime.
5
International Cyber Law
1. There are no international cyber laws.
2. Every country has its own cyber laws – only for its citizens.
3. What happens if a cyber crime is committed on country X from
country Y ?
4. Some countries have come up with bilateral agreements with other
countries – but no international laws in place
5. July 2015 – Germany came up with cyber laws – laws to protect
critical infrastructure only. Equipment, plants that are important for
running the country.
6. June 2017 – China’s cyber security law – very broad – personal
information also covered
6
What should companies do?
1. Inform customers of the breach
2. Tell customers what to do in this case
3. Examples –
1. Yahoo password leaks.
2. British Airways credit card and other info leak
7
Copyright
1. Copyright is an intellectual property right attached to
original works – e.g., books, movies, music, logo,…
2. Copyright is a protection provided by law to authors of
original works. This includes literature, films, music,
paintings, etc
3. Copyright laws apply to published and unpublished
work.
4. Copyright law helps to determine authorship, duration
of protection and laws for transfering rights to others
8
Security
1. Security is an organisational concern.
2. Every business needs safeguards that protect computer
systems and data from damage or unlawful use.
3. Protect systems from hackers
4. Protect data from unlawful use.
9
Controls
1. What are controls? These are policies, procedures,
rules, techniques designed to prevent errors in data and
systems.
2. Examples are :
a. access privileges – who, what, when
b. Data validation – numeric data for DOB, no numeric
for name, etc
c. Input authorizations, view rights, edit rights
10
Privacy
1. Security is an organisational concern
2. Privacy is an individual concern.
3. People need assurance that their personal information
such as employment, financial records, medical records,
employment history will not be misused.
4. You must ensure that you don’t reveal your personal /
private information to others.
5. Info such as – bank details, date of birth, medical
history, employment records, educational records…..
11
Software Piracy
1. It is the unauthorized copying and distribution of
copyrighted software
2. How is it done ? – Downloading, copying, sharing, selling
copies of original software
3. Software license – how many copies can be installed. If
you install more than the specified number of copies, it is
piracy
4. Sharing login credentials used to access a web-based
software application – e.g. one person pays for an online
service and many use that service by sharing password.
12
Code of Ethics
1. Ethics => Ethics is a branch of philosophy. Ethics defines
what is good and bad, what is right and wrong, obligations.
2. All software professionals (programmers, systems admins,…)
have the responsibility to provide certain quality or work
and assure control, privacy and security in their services and
products.
3. What does a code of ethics do? It gives these norms and
principles. Code of ethics sets standards.
4. Code of ethics sets commitments, requirements and
responsibilities for members of an organization.
13
Code of Ethics for Computer Professionals
1. Fair Treatment – treat everyone fairly. No discrimination on
grounds of age, gender, post, etc
2. Access private info only when it is extremely necessary for
your official duties, after taking permissions from concerned
authorities.
3. Don’t use confidential information for your personal gain.
14
Code of Ethics for Computer Professionals
4. Maintain the privacy of users and professionals.
5. Maintain good communication with users – inform users of
which resources can be shared, legal obligations, etc.
6. Maintain good system integrity – regularly perform
maintenance of hardware and software, check network and
Internet availability. Analyze system performance
(download speeds, bootup times for computers, etc)
7. Prevent unauthorized access to systems and resources
(applications, printers, data, …)
15
Code of Ethics for Computer Professionals
8. Maintain healthy cooperation. ‘We’, not ‘I’.
9. Support your colleagues – cooperate with other colleagues.
Learn from them if you don’t know something. Train them
if they need help in learning
10. Acknowledge the responsibility of the team – the
community.
11. Be honest – honesty is the best policy. Take help of seniors
if it is necessary, to perform your duties efficiently.
12. Update yourself with latest technology, software, systems
practices. If necessary, go for training, self-study.
16
Code of Ethics for Computer Professionals
13. Update yourself on social ad legal issues relating to
computing. Share with others whatever new you have
learnt. Encourage others to adopt changes in policies – this
is social responsibility
14. If you make mistakes, admit them and correct them. Don’t
try to blame others for your mistakes. Maintain
professionalism while performing your duties.
15. Remove any wrong data about individuals.
17
Do’s for Computer Professionals
1. Use the Internet to enhance your knowledge. Take courses
from sites such as Udacity, Udemy, Coursera, MIT, etc
2. When communicating with strangers, don’t share your
personal data. Personal data = family, financial, job, health
3. Respect privacy of others
4. Avoid political discussions with strangers
5. Use antivirus software to protect your computer systems
6. Download software from reliable sites only
18
Don’ts for Computer Professionals
1. Don’t share your passwords and usernames with others
2. Don’t arrange to meet unknown persons whom you met on
Internet
3. Don’t use unauthorized or pirated software
4. Don’t break / hack into computers. It’s a crime.
5. Don’t answer any improper messages
6. Don’t fall prey to lottery, cashback, loan schemes.
7. Don’t fall into traps of friendship from strangers.
19
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
20
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
21
Cyber Insurance
Cyber Insurance covers the following:
i. A financial loss resulting from being a victim of email spoofing and
phishing
ii. Fraudulent online transactions in bank account, debit/credit card or e-
wallet
iii. Reputational liability, including claims alleging defamation and invasion of
privacy
iv. Losses and expenses related to defence and prosecution cost related to
identity theft
v. Restoration cost to retrieve data or computer program damaged by entry
of the malware
vi. Cyber extortion loss
THANK YOU
Prof Mukesh N Tekwani
mukeshtekwani@outlook.com
February 13, 2019

Contenu connexe

Tendances

Law Of Integrated Circuits And Layout Dseign In India
Law Of Integrated Circuits And Layout Dseign In IndiaLaw Of Integrated Circuits And Layout Dseign In India
Law Of Integrated Circuits And Layout Dseign In IndiaVijay Dalmia
 
TRIPs agreement - WTO
TRIPs agreement - WTOTRIPs agreement - WTO
TRIPs agreement - WTOkevin Richard
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxVinayPratap58
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Intellectual Property Rights and its Types
Intellectual Property Rights and its TypesIntellectual Property Rights and its Types
Intellectual Property Rights and its TypesR.Arun Kumar M.E (Ph.D.)
 
Prior Art Search - An Overview
Prior Art Search - An OverviewPrior Art Search - An Overview
Prior Art Search - An OverviewManoj Prajapati
 
Certification trademark
Certification trademarkCertification trademark
Certification trademarkSolubilis
 
Geographical indications
Geographical indicationsGeographical indications
Geographical indicationsSURYAKANTVERMA2
 
Technology Transfer Agreements - International Trade Law
Technology Transfer Agreements - International Trade LawTechnology Transfer Agreements - International Trade Law
Technology Transfer Agreements - International Trade LawPatrick Aboku
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Microsoft power point domain and cyber squatting [compatibility mode]
Microsoft power point   domain and cyber squatting [compatibility mode]Microsoft power point   domain and cyber squatting [compatibility mode]
Microsoft power point domain and cyber squatting [compatibility mode]sanjeev kumar chaswal
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPRDr. Prashant Vats
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceRIPE NCC
 

Tendances (20)

Law Of Integrated Circuits And Layout Dseign In India
Law Of Integrated Circuits And Layout Dseign In IndiaLaw Of Integrated Circuits And Layout Dseign In India
Law Of Integrated Circuits And Layout Dseign In India
 
TRIPs agreement - WTO
TRIPs agreement - WTOTRIPs agreement - WTO
TRIPs agreement - WTO
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Indian patent act
Indian patent actIndian patent act
Indian patent act
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Intellectual Property Rights and its Types
Intellectual Property Rights and its TypesIntellectual Property Rights and its Types
Intellectual Property Rights and its Types
 
Prior Art Search - An Overview
Prior Art Search - An OverviewPrior Art Search - An Overview
Prior Art Search - An Overview
 
Certification trademark
Certification trademarkCertification trademark
Certification trademark
 
Geographical indications
Geographical indicationsGeographical indications
Geographical indications
 
Cyber law
Cyber lawCyber law
Cyber law
 
COPYRIGHT REGISTRATION PROCESS
COPYRIGHT REGISTRATION PROCESSCOPYRIGHT REGISTRATION PROCESS
COPYRIGHT REGISTRATION PROCESS
 
Technology Transfer Agreements - International Trade Law
Technology Transfer Agreements - International Trade LawTechnology Transfer Agreements - International Trade Law
Technology Transfer Agreements - International Trade Law
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Microsoft power point domain and cyber squatting [compatibility mode]
Microsoft power point   domain and cyber squatting [compatibility mode]Microsoft power point   domain and cyber squatting [compatibility mode]
Microsoft power point domain and cyber squatting [compatibility mode]
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
 
Industrial design ipr
Industrial design iprIndustrial design ipr
Industrial design ipr
 
Trips
TripsTrips
Trips
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 

Similaire à Cyber laws

Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 

Similaire à Cyber laws (20)

Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
E commerce
E commerce E commerce
E commerce
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 

Plus de Mukesh Tekwani

Computer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelComputer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelMukesh Tekwani
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfThe Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfMukesh Tekwani
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - PhysicsMukesh Tekwani
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion Mukesh Tekwani
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Mukesh Tekwani
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversionMukesh Tekwani
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion Mukesh Tekwani
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversionMukesh Tekwani
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Mukesh Tekwani
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prismMukesh Tekwani
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surfaceMukesh Tekwani
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomMukesh Tekwani
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesMukesh Tekwani
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEMukesh Tekwani
 

Plus de Mukesh Tekwani (20)

Computer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelComputer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube Channel
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfThe Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdf
 
Circular motion
Circular motionCircular motion
Circular motion
 
Gravitation
GravitationGravitation
Gravitation
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - Physics
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversion
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversion
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prism
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surface
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrors
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atom
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lenses
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
XML
XMLXML
XML
 

Dernier

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 

Dernier (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Cyber laws

  • 1. Prof. Mukesh N Tekwani
  • 2. 2 What is Cyber Law? 1. Cyber law – all legal and regulatory aspects of the Internet. 2. Cyber space - governed by a system of laws and regulations called cyber law. 3. Why is cyber law needed? Millions of people around the world use Internet for business, banking, social interactions, and Internet is misused for criminal activities. Hence the need for laws
  • 3. 3 Cyber Security Law – What you can do 1. In case you become a victim of cyber crime, what can you do? 2. Preserve the relevant incriminating electronic evidence. 3. Legal liability can be: a) Civil liability b) Criminal liability 4. Even if you are the victim, you still have a legal liability. The law expects you to have the duty of due diligence. 5. If you are the victim, you must report the breach to the relevant statutory authorities 6. Example – getting email from a bank with a bank statement/invoice meant for someone else
  • 4. 4 Cyber Security Law – Challenges 1. The person committing cybercrime may not be located in your country and so legal remedies could be difficult. 2. Anyone sitting in one country could target the network of a company or a govt in another country. 3. There is no international legal law for such matters. So jurisdiction is going to pay a very important role in tackling cybercrime.
  • 5. 5 International Cyber Law 1. There are no international cyber laws. 2. Every country has its own cyber laws – only for its citizens. 3. What happens if a cyber crime is committed on country X from country Y ? 4. Some countries have come up with bilateral agreements with other countries – but no international laws in place 5. July 2015 – Germany came up with cyber laws – laws to protect critical infrastructure only. Equipment, plants that are important for running the country. 6. June 2017 – China’s cyber security law – very broad – personal information also covered
  • 6. 6 What should companies do? 1. Inform customers of the breach 2. Tell customers what to do in this case 3. Examples – 1. Yahoo password leaks. 2. British Airways credit card and other info leak
  • 7. 7 Copyright 1. Copyright is an intellectual property right attached to original works – e.g., books, movies, music, logo,… 2. Copyright is a protection provided by law to authors of original works. This includes literature, films, music, paintings, etc 3. Copyright laws apply to published and unpublished work. 4. Copyright law helps to determine authorship, duration of protection and laws for transfering rights to others
  • 8. 8 Security 1. Security is an organisational concern. 2. Every business needs safeguards that protect computer systems and data from damage or unlawful use. 3. Protect systems from hackers 4. Protect data from unlawful use.
  • 9. 9 Controls 1. What are controls? These are policies, procedures, rules, techniques designed to prevent errors in data and systems. 2. Examples are : a. access privileges – who, what, when b. Data validation – numeric data for DOB, no numeric for name, etc c. Input authorizations, view rights, edit rights
  • 10. 10 Privacy 1. Security is an organisational concern 2. Privacy is an individual concern. 3. People need assurance that their personal information such as employment, financial records, medical records, employment history will not be misused. 4. You must ensure that you don’t reveal your personal / private information to others. 5. Info such as – bank details, date of birth, medical history, employment records, educational records…..
  • 11. 11 Software Piracy 1. It is the unauthorized copying and distribution of copyrighted software 2. How is it done ? – Downloading, copying, sharing, selling copies of original software 3. Software license – how many copies can be installed. If you install more than the specified number of copies, it is piracy 4. Sharing login credentials used to access a web-based software application – e.g. one person pays for an online service and many use that service by sharing password.
  • 12. 12 Code of Ethics 1. Ethics => Ethics is a branch of philosophy. Ethics defines what is good and bad, what is right and wrong, obligations. 2. All software professionals (programmers, systems admins,…) have the responsibility to provide certain quality or work and assure control, privacy and security in their services and products. 3. What does a code of ethics do? It gives these norms and principles. Code of ethics sets standards. 4. Code of ethics sets commitments, requirements and responsibilities for members of an organization.
  • 13. 13 Code of Ethics for Computer Professionals 1. Fair Treatment – treat everyone fairly. No discrimination on grounds of age, gender, post, etc 2. Access private info only when it is extremely necessary for your official duties, after taking permissions from concerned authorities. 3. Don’t use confidential information for your personal gain.
  • 14. 14 Code of Ethics for Computer Professionals 4. Maintain the privacy of users and professionals. 5. Maintain good communication with users – inform users of which resources can be shared, legal obligations, etc. 6. Maintain good system integrity – regularly perform maintenance of hardware and software, check network and Internet availability. Analyze system performance (download speeds, bootup times for computers, etc) 7. Prevent unauthorized access to systems and resources (applications, printers, data, …)
  • 15. 15 Code of Ethics for Computer Professionals 8. Maintain healthy cooperation. ‘We’, not ‘I’. 9. Support your colleagues – cooperate with other colleagues. Learn from them if you don’t know something. Train them if they need help in learning 10. Acknowledge the responsibility of the team – the community. 11. Be honest – honesty is the best policy. Take help of seniors if it is necessary, to perform your duties efficiently. 12. Update yourself with latest technology, software, systems practices. If necessary, go for training, self-study.
  • 16. 16 Code of Ethics for Computer Professionals 13. Update yourself on social ad legal issues relating to computing. Share with others whatever new you have learnt. Encourage others to adopt changes in policies – this is social responsibility 14. If you make mistakes, admit them and correct them. Don’t try to blame others for your mistakes. Maintain professionalism while performing your duties. 15. Remove any wrong data about individuals.
  • 17. 17 Do’s for Computer Professionals 1. Use the Internet to enhance your knowledge. Take courses from sites such as Udacity, Udemy, Coursera, MIT, etc 2. When communicating with strangers, don’t share your personal data. Personal data = family, financial, job, health 3. Respect privacy of others 4. Avoid political discussions with strangers 5. Use antivirus software to protect your computer systems 6. Download software from reliable sites only
  • 18. 18 Don’ts for Computer Professionals 1. Don’t share your passwords and usernames with others 2. Don’t arrange to meet unknown persons whom you met on Internet 3. Don’t use unauthorized or pirated software 4. Don’t break / hack into computers. It’s a crime. 5. Don’t answer any improper messages 6. Don’t fall prey to lottery, cashback, loan schemes. 7. Don’t fall into traps of friendship from strangers.
  • 19. 19 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 20. 20 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 21. 21 Cyber Insurance Cyber Insurance covers the following: i. A financial loss resulting from being a victim of email spoofing and phishing ii. Fraudulent online transactions in bank account, debit/credit card or e- wallet iii. Reputational liability, including claims alleging defamation and invasion of privacy iv. Losses and expenses related to defence and prosecution cost related to identity theft v. Restoration cost to retrieve data or computer program damaged by entry of the malware vi. Cyber extortion loss
  • 22. THANK YOU Prof Mukesh N Tekwani mukeshtekwani@outlook.com February 13, 2019