Documente Academic
Documente Profesional
Documente Cultură
07-04-2014
Content
What is Cyber law? Need of cyber law Cyber pornography and its rules. Phishing and its rules. Tampering with source code and its rules. Accessing protected system. Evidences. Query.
SLBS ENGINEERING COLLEGE
07-04-2014
07-04-2014
Continue
Cyber crimes-Cyber crimes are unlawful acts where the computer is used either as a tool or a target or both. Electronic signatures are used to authenticate electronic records. Digital signatures are one type of electronic signature. Intellectual property is refers to creations of the human mind e.g. a story, a song, a painting, a design etc. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc.
07-04-2014 SLBS ENGINEERING COLLEGE
continue
Cyberspace is absolutely open to participation by all. A tenyear-old in Bhutan can have a live chat session with an eightyear-old in Bali without any regard for the distance or the anonymity between them.
Cyberspace offers enormous potential for anonymity to its members. Readily available encryption software and steganography tools that seamlessly hide information within image and sound files ensure the confidentiality of information exchanged between cyber-citizens.
07-04-2014
continue
Cyberspace offers never-seen-before economic efficiency. Billions of dollars worth of software can be traded over the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.
Electronic information has become the main object of cyber crime. It is characterized by extreme mobility, which exceeds by far the mobility of persons, goods or other services. International computer networks can transfer huge amounts of data around the globe in a matter of seconds.
A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release.
07-04-2014 SLBS ENGINEERING COLLEGE
Continue
Theft of corporeal information (e.g. books, papers, CD ROMs, floppy disks) is easily covered by traditional penal provisions. However, the problem begins when electronic records are copied quickly, inconspicuously and often via telecommunication facilities. Here the original information, so to say, remains in the possession of the owner and yet information gets stolen.
07-04-2014
07-04-2014
07-04-2014
continue
Obscene MMS clipping listed for sale on 27th November, 2004 - DPS Girl having fun". Some copies sold through Baazee.com
Avnish Bajaj (CEO) arrested and his bail application was rejected by the trial court.
07-04-2014
07-04-2014
One Doctor from Dehgam, Gujarat had registered a crime stating that some persons (perpetrators) have perpetrated certain acts through misleading emails ostensibly emanating from ICICI Banks email ID. Such acts have been perpetrated with an intent to defraud the Customers.
07-04-2014 SLBS ENGINEERING COLLEGE
continue
The investigation was carried out with the help of the mail received by the customer, bank account IP details & domain IP information, the place of offence at Meerut was searched for evidence. Investigation Report Documents Mail Received by Dr.C.F.Shah ---------- Forwarded message ---------From: ICICI BANK <customercare@icicibank.com> To: cf_shah@yahoo.com Date: Fri, 05 Oct 2007 20:42:43 -0500 Subject: Alert!!! Verify Your Internet Banking Account Immediately Otherwise Your Account Get Blocked!!!
07-04-2014 SLBS ENGINEERING COLLEGE
07-04-2014
The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65.
07-04-2014
Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this Section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine.
07-04-2014 SLBS ENGINEERING COLLEGE
Digital Evidence
Emails evidence Certificate u/s65B of Indian Evidence Act Bankers Books Evidence Act Applicable to cheque bouncing cases also Digital signatures as evidence
07-04-2014
The accused had argued that computers and digital evidence can easily be tampered and hence should not be relied upon.
A laptop, several smart media storage disks and devices were recovered from a truck intercepted at Srinagar pursuant to information given by two of the suspects.
07-04-2014
continue
Evidence found on the laptop included: fake identity cards, video files containing clippings of political leaders with Parliament in background shot from TV news channels, scanned images of front and rear of a genuine identity card. image file of design of Ministry of Home Affairs car sticker, the game 'wolf pack' with the user name 'Ashiq'. Ashiq was the name in one of the fake identity cards used by the terrorists.
07-04-2014
Continue
No forensic backup was taken. Court held that: Challenges to the accuracy of computer evidence should be established by the challenger. Mere theoretical and generic doubts cannot be cast on the evidence.
07-04-2014
Mr.Nadeem Lohani
Queries
07-04-2014