You are on page 1of 24

PRESENTATION ON

CYBER LAWS
CONTENTS
• INTRODUCTION
• NEED FOR CYBER LAWS
• CYBER LAWS IN INDIA
• CYBER CRIMES
• OFFENCES AND LAWS IN CYBER SPACE
• CYBER LAWS AMENDMENTS
• CONCLUSION
INTRODUCTION
• GROWTH OF CYBER
SPACE

• ONSET OF INTERNET

• CYBER LAW OR LAW


OF INTERNET
NEED FOR CYBER LAWS

• TACKLING CYBER CRIMES

• INTELLECTUAL
PROPERTY RIGHTS AND
COPYRIGHTS
PROTECTION ACT
CYBER LAWS IN INDIA

Aims to provide a legal and regulatory framework


for promotion of e-Commerce and e-Governance.

Enacted on 7th June 2000 and was notified in the


official gazette on 17th October 2000.

India became the 12th nation in the world to


enact a Cyber law.

Review on 2005 - Draft Amendments published


IT ACT PROVISIONS
• Extends to the whole of India

• Electronic contracts will be legally valid

• Legal recognition of digital signatures

• Security procedure for electronic records and


digital signature

• Appointment of Controller of Certifying


Authorities to license and regulate the working
of Certifying Authorities
IT ACT PROVISIONS

Certifying Authorities to get License from the
Controller to issue digital signature certificates

Various types of computer crimes defined and
stringent penalties provided under the Act

Appointment of Adjudicating Officer for holding
inquiries under the Act


Establishment of Cyber Regulatory Appellate
Tribunal under the Act
IT ACT PROVISIONS
• Appeal from order of Adjudicating Officer to Cyber
Appellate Tribunal and not to any Civil Court

• Appeal from order of Cyber Appellate Tribunal to


High Court

• Act to apply for offences or contraventions


committed outside India

• Network service providers not to be liable in certain


cases
IT ACT Enables
• Legal recognition of digital signature is at par with
the handwritten signature

• Electronic Communication by means of reliable


electronic record

• Acceptance of contract expressed by electronic


means

• Electronic filing of documents

• Retention of documents in electronic form


IT ACT Enables

• Uniformity of rules, regulations and standards


regarding the authentication and integrity of
electronic records or documents

• Publication of official gazette in the electronic


form

• Interception of any message transmitted in the


electronic or encrypted form
Digital Signatures
• If a message should be readable but not modifiable, a
digital signature is used to authenticate the sender
Parameter Paper Electronic

Authenticity May be forged Cannot be copied

Integrity Signature independent of Signature depends on the


the document contents of the
document

Non-repudiation ●
Handwriting expert ●
Any computer user
needed ●
Error free

Error prone
Civil Offences under the IT Act 2000 (Section 43 )

• Unauthorised copying, extracting and downloading of any data,


database

• Unauthorised access to computer, computer system or computer


network

• Introduction of virus

• Damage to computer System and Computer Network

• Disruption of Computer, computer network Denial of access to


authorised person to computer

• Providing assistance to any person to facilitate unauthorised


access to a computer

• Charging the service availed by a person to an account of another


person by tampering and manipulation of other computer
Criminal Offences under the IT Act 2000
(Sections 65 to 75)

• Tampering with computer source documents

• Hacking with computer system

"Whoever with the intent to cause or knowing that he is


likely to cause wrongful loss or damage to the public or any
person destroys or deletes or alters any information
residing in a computer resource or diminishes its value or
utility or affects it injuriously by any means, commits
hacking."

• …shall be punishable with imprisonment up to three years,


or with fine which may extend up to two lakh rupees, or
with both.
Criminal Offences under the IT Act 2000 …
• Electronic forgery I.e. affixing of false digital signature,
making false electronic record

• Electronic forgery for the purpose of cheating

• Electronic forgery for the purpose of harming reputation


• Using a forged electronic record

• Publication of digital signature certificate for fraudulent


purpose

• Offences and contravention by companies


Criminal Offences under the IT Act 2000 …

• Confiscation of computer, network, etc.

• Unauthorised access to protected system (Sec. 70)

• Misrepresentation or suppressing of material facts for


obtaining Digital Signature Certificates

• Directions of Controller to a subscriber to extend facilities


to decrypt information (Sec. 69)

• Breach of confidentiality and Privacy (Sec. 72)


Common Web exploits ..

• Password guessing
• HTML comments
• “Forgot password” implementations
• Keystroke loggers
• SQL injection
• Command injection
• URL manipulation
• XSS
Scams

• There are several scams that are using the


Internet and print media to circulate:
– Nigeria (419) scam
– Auction fraud
– Patent medication (Cialis, herbal viagra)
– Pump-and-dump stock market scam
– Viruses
– Chain letters (“Microsoft will pay you $25”)
– Identity theft
– Lottery
Identity theft
When someone appropriates your personal information
in order to commit fraud or theft

Credentials (Name, email, address, social security


number, credit card number) can be obtained through a
variety of mechanisms (including a lost wallet)

In the West, ID theft can be serious, as the fraudster


can completely take over the ID (and deny the original
owner of medical care, bank credit and even mail!)
Phishing
Phishing is the criminally fraudulent process of attempting to
acquire sensitive information such as usernames, passwords and
credit card details by masquerading as a trustworthy entity in an
electronic communication.

A high-tech scam of spoofing trusted sites by misleading links


(esp. in HTML mail or a link like
www.ebay.com@members.tripod.com)

Aimed to fool inexperienced (and some experienced) users

Can result in loss of user credentials and financial loss


CRIME THROUGH ORKUT
• Koushambi ,24-
year old software
professional
working for TCS
was brutally killed
by Manish Thakur,
in a hotel room at
Andheri.
INTERNET AND ITS EFFECT
• 20% - 30% of Internet
pornography consumption is
by
children of ages 12 - 17.

• MySpace is being used by


predators to meet and entice
kids online.

• Specific marketing strategies


are being used to attract
children to porn sites.
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
IN TODAYS WORLD OF INTERNET

• ACHIEVING GLOBAL PEACE AND


HARMONY
THANK YOU

You might also like