Sunteți pe pagina 1din 34

Cyber Law and Cyber

Submitted By:- Arjun Sabu
Class:- X - B
Roll No. 25
In the era of cyber world as the usage of computers became
more popular, there was expansion in the growth of
technology as well, and the term ‘Cyber’ became more
familiar to the people. The evolution of Information
Technology (IT) gave birth to the cyber space wherein
internet provides equal opportunities to all the people to
access any information, data storage, analyse etc. with the
use of high technology. Due to increase in the number of
netizens, misuse of technology in the cyberspace was
clutching up which gave birth to cyber crimes at the
domestic and international level as well.
What is Cyber Crime?
Cyber Crime can be defined as the criminal activities carried out by means of computers
or the Internet. It involves unlawful acts wherein the computer is either a tool or target or
both. Computer crime encompasses a broad range of activities:-

● Fraud and financial crimes

● Cyber terrorism
● Cyber Extortion
● Cyberwarfare
● Computer as a target
● Computer as a tool
Categories of Cybercrime

❖ Cybercrimes against persons.

❖ Cybercrimes against property.
❖ Cybercrimes against government.
Cyber Law?
Cyber Law is the law governing cyberspace.
Cyber space includes computers, networks, software, data
storage devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic devices such
as cell phones, ATM machines etc.
Why Do we need Cyber Laws?

1) Internet has dramatically changed the way we think, the way we

govern, the way we do commerce and the way we perceive
2) Information technology is encompassing all walks of life all over
the world.
3) Cyberspace creates moral, civil and criminal wrongs. It has now
given a new way to express criminal tendencies.
4) Cyberspace is open to participation by all.
5) “IT” has brought Transition from paper to paperless
6) The laws of real world cannot be interpreted in the light
of emerging cyberspace to include all aspects relating to
different activities in cyberspace.
7) Internet requires an enabling and supportive legal
infrastructure in tune with the times.
Cyber Law Deals with:-

1) Cyber Crimes
2) Electronic or Digital Signatures
3) Intellectual Property
4) Data Protection and Privacy
Cyber Laws of India
1) IT Act-2000
1) The Information Technology Act, 2000 (IT Act), came into force on
17 October 2000.
2) The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records
with the Government.
3) Information Technology Act 2000 consisted of 94 sections
segregated into 13 chapters.
IT Act-2000:- Objectives
1) To provide legal recognition for transactions.
2) To facilitate electronic filing of documents with the
Government agencies.
3) To amend the Indian Penal Code, The Indian Evidence
Act, 1872, The Banker's Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934.
4) Aims to provide the legal framework to all electronic
IT Act-2000
Important Cyber Law Provisions in
Offence Section under IT
1) Tampering with Computer source documents Sec.43
(without the permission of
in charge).

2) Hacking with Computer Sec.66

systems, Data alteration .

3) Publishing obscene Sec.67


4) Un-authorized access to protected system. Sec.70

5) Breach of Confidentiality and Privacy. Sec.72

6) Publishing false digital signature certificates. Sec.73

IT Act-2000
Crimes under Indian Penal Code and
Special Laws.
Offence Sections
1) Sending threatening & Defamatory Sec 503 & 499 IPC
messages by email. .

2) Forgery of electronic Sec 463 IPC

records .

3) Bogus websites, cyber frauds. Sec 420 IPC

4) Email spoofing & Abuse. Sec 463 & 500 IPC

5) Web-Jacking Sec 383 IPC

6) Online sale of Drugs NDPS Act

7) Online sale of Arms Arms Act

2) IT Act Amendment-2008
1) The Information Technology Amendment Act, 2008 (IT Act 2008) has been
passed by the parliament on 23rd December 2008.
2) It received the assent of President of India on 5th February, 2009.
3) The IT Act 2008 has been notified on October 27, 2009.
4) ITA-2008, is a new version of IT Act 2000.
5) Provides additional focus on Information Security.
6) Added several new sections on offences including Cyber Terrorism and Data
7) 124 sections and 14 chapters.
8) Schedule I and II have been replaced & Schedules III and IV are deleted.
Salient Features
1) Digital signature has been replaced with Electronic
2) Section 67 of the old Act is amended.
3) Sections 66A to 66F prescribe punishment for obscene
electronic message transmissions & cyber terrorism.
4) Amended section 69 gives power to the state.
5) Sections 69 A and B, grant power to the state to direct
blocking for public access of any information through any
computer resource.
3) National Cyber Security
Policy -2013.
To build a secure and resilient cyberspace for citizens,
businesses and Government.
1) To create a secure cyber ecosystem in the country, generate adequate trust & confidence
in IT systems and transactions in cyberspace and thereby enhance adoption of IT in all
sectors of the economy.

2) To create an assurance framework for design of security policies and for promotion and
enabling actions for compliance to global security standards and best practices by way of
conformity assessment (product, process, technology & people).

3) To strengthen the Regulatory framework for ensuring a Secure Cyberspace ecosystem.

4) To enhance and create National and Sectoral level 24 x 7 mechanisms for obtaining
strategic information regarding threats to ICT infrastructure, creating scenarios for response,
resolution and crisis management through effective predictive, preventive, protective,
response and recovery actions.
5) To enhance the protection and resilience of Nation’s critical information infrastructure by operating a 24x7
National Critical Information Infrastructure Protection Centre (NCIIPC) and mandating security practices
related to the design, acquisition, development, use and operation of information resources.

6) To develop suitable indigenous security technologies through frontier technology research, solution oriented
research, proof of concept, pilot development, transition, diffusion and commercialisation leading to
widespread deployment of secure ICT products / processes in general and specifically for addressing National
Security requirements.

7) To improve visibility of the integrity of ICT products and services by establishing infrastructure for testing &
validation of security of such products.

8) To create a workforce of 500,000 professionals skilled in cyber security in the next 5 years through capacity
building, skill development and training.

9) To provide fiscal benefits to businesses for adoption of standard security practices and processes.

10) To enable protection of information while in process, handling, storage & transit so as to safeguard privacy
of citizens data and for reducing economic losses due to cyber crime or data theft.
11) To enable effective prevention, investigation and prosecution of cybercrime
and enhancement of law enforcement capabilities through appropriate legislative

12) To create a culture of cyber security and privacy enabling responsible user
behaviour & actions through an effective communication and promotion strategy.

13) To develop effective public private partnerships and collaborative

engagements through technical and operational cooperation and contribution for
enhancing the security of cyberspace.

14) To enhance global cooperation by promoting shared understanding and

leveraging relationships for furthering the cause of security of cyberspace.
World & Cyber laws
1) The Great firewall of China monitors every movement in
cyber space and protect to publish any offensive
2) China have a hold on every content which is harmful or
dangerous for the government of China.
3) Brazil is considered world’s biggest airport for Hackers.
4) Iran is also a dangerous country for the Netizens. He
also have a Crime Police unit for crime in Cyberspace.
Importance of Cyber Law
1) We are living in highly digitalized world.
2) All companies depend upon their computer networks and keep their valuable data in
electronic form.
3) Government forms including income tax returns, company law forms etc are now filled in
electronic form.
4) Consumers are increasingly using credit cards for shopping.
5) Most people are using email, cell phones and SMS messages for communication.
6) Even in "non-cyber crime" cases, important evidence is found in computers /cell phones
e.g. in cases of divorce, murder, kidnapping, organized crime, terrorist operations,
counterfeit currency etc.
7) Since it touches all the aspects of transactions and activities on and concerning the
Internet, the World Wide Web and Cyberspace therefore Cyber Law is extremely important.
1) Cyber security standards are security
standards which enable organizations to
practice safe security techniques to minimize
the number of successful cyber security
2) Cyber security refers to the technologies and
processes designed to protect computers,
networks and data from unauthorized access,
vulnerabilities and attacks delivered via the
Internet by cyber criminals.
3) Though, cyber security is important for
network, data and application security.
What is…..? 3) Information
security-protection of
1) Communication
security-protecting information and its
organization critical elements ,
communication media , including the systems
technology , and content. and hardware that use
2) Network security-is the , store or transmit that
protection of networking
components, connection
and content.

Governments, military, corporations, financial institutions, hospitals and

other businesses collect, process and store a great deal of confidential
information on computers and transmit that data across networks to other
computers. With the growing volume and sophistication of cyber attacks,
ongoing attention is required to protect sensitive business and personal
information, as well as safeguard national security. Hence, Cyber security
is required.
Why should we care about Cyber Security?

1. It is a criminal activity committed on the internet.

2. Cyber crime-Where computer is either a tool or target or
Advantage of cyber security.

1) It will defend from hacks and virus.

2) The application of cyber security used in our PC
needs update every week.
3) The security developers will update their
database every week once. Hence the new virus
also deleted.
How can we protect our information? (safety tips)

➔ Read Privacy policy carefully when you submit the data through internet.
➔ Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.
➔ Disable remote connectivity.
➔ Use antivirus software
➔ Insert firewalls , pop up blocker
➔ Uninstall unnecessary software
➔ Maintain backup
➔ Check security settings
➔ Use secure connection
➔ Open attachments carefully
➔ Use strong passwords , don’t give personal information unless required.
Some Antivirus Softwares.

1) The only system which is truly secure is one which is

switched off and unplugged.
2) So , only way to be safe is Pay attention and Act smart.