0% found this document useful (0 votes)
128 views17 pages

Constituional Law & Ethics

This document summarizes key cyber laws in India related to bandwidth theft, grooming, harassment, obscenity, morphing, child abuse, and offenses under Section 43 of the Information Technology Act. It defines each topic and outlines the relevant sections of Indian law. For example, it notes that bandwidth theft refers to directly linking to files on another site without permission, and this is governed by Section 43. Grooming involves befriending a child online with the intent of sexual abuse, prohibited under Sections 67B and 66E. Cyber harassment and obscenity are also explained along with applicable legal sections.

Uploaded by

Amrutha Anup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views17 pages

Constituional Law & Ethics

This document summarizes key cyber laws in India related to bandwidth theft, grooming, harassment, obscenity, morphing, child abuse, and offenses under Section 43 of the Information Technology Act. It defines each topic and outlines the relevant sections of Indian law. For example, it notes that bandwidth theft refers to directly linking to files on another site without permission, and this is governed by Section 43. Grooming involves befriending a child online with the intent of sexual abuse, prohibited under Sections 67B and 66E. Cyber harassment and obscenity are also explained along with applicable legal sections.

Uploaded by

Amrutha Anup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

CONSTITUIONAL LAW & ETHICS

Faculty of Law
CONSTITUTIONAL LAW & ETHICS

UNIT 3- Cyber Law

Faculty of Law
CYBER LAWS
Bandwidth theft/ Hotlinking

• Bandwidth refers to the amount of data transferred from a


web site to a user's computer. When you view a web page,
you are using that site's bandwidth to display the files.
Since web hosts charge based on the amount of data
transferred, bandwidth is an issue. If a site is over its
monthly bandwidth, it's billed for the extra data or taken
offline.
• Bandwidth theft or "hotlinking" is direct linking to a web
site's files (images, video, etc.).
• Law
• Section 43
CYBER LAWS
Grooming
CYBER LAWS
Grooming

• Cyber grooming is the process of ‘befriending’ a young


person online “to facilitate online sexual contact and/or a
physical meeting with them with the goal of committing
sexual abuse.
• The child or teen can also unknowingly initiate the
grooming process when they partake in websites or forums
with lucrative offers such as money in exchange for contact
details or intimate photos of themselves.
• Law
• Section 67 B
• Section 66 E
CYBER LAWS
Harassment
CYBER LAWS
Harassment

• Cyberbullying is bullying with the use of digital


technologies. It can take place on social media, messaging
platforms, gaming platforms and mobile phones. It is a
repeated behaviour, aimed at scaring, angering or shaming
those who are targeted. Examples include:
• spreading lies about or posting embarrassing photos of
someone on social media
• sending hurtful messages or threats via messaging
platforms
• impersonating someone and sending mean messages
to others on their behalf.
CYBER LAWS
Harassment

• Law
• Section 66 A
CYBER LAWS
Obscenity

• A very offensive or sexually shocking word, photos, videos


etc.
• Section 67- Publishing of information which is obscene in
electronic form
• Whoever publishes or transmits or causes to be
published in the electronic form, any material which is
lascivious or appeals to the prurient interest or if its
effect is such as to tend to deprave and corrupt persons
who are likely, having regard to all relevant
circumstances, to read, see or hear the matter
contained or embodied in it.
CYBER LAWS
Obscenity

• Section 67 A- Punishment for publishing or transmitting of


material containing sexually explicit act, etc.
• Whoever publishes or transmits or causes to be
published or transmitted in the electronic form any
material which contains sexually explicit act or conduct
shall be punished.
• Section 67 B- Punishment for publishing or transmitting of
material depicting children in sexually explicit act, etc. in
electronic form.
CYBER LAWS
Morphing

• To gradually change, or change someone or something,


from one thing to another.
• Morphing is not recognized as an offence under IPC or The
I.T Act.
• Laws that may be applicable if morphed pictures are
transmitted or published
• Section- 66 E, 67, 67 A, 67 B of I.T Act.
• Section- 509, 354, 500 of IPC.
• Indecent Representation of Women (Prevention) Act.
CYBER LAWS
Child abuse

• Child is anyone under the age of 18.


• Online child abuse most commonly includes grooming, live
streaming, consuming child sexual abuse material, and
coercing and blackmailing children for sexual purposes.
• Online child abuse often occurs across multiple
jurisdictions, with victims and offenders often in different
countries.
• Abuse may be sexual, physical, emotional and also includes
sexual exploitation.
CYBER LAWS
Child Abuse

• Section 67 B Punishment for publishing or transmitting of


material depicting children in sexually explicit act, etc. in
electronic form
a. publishes or transmits or causes to be published or
transmitted material.
b. depicting children in obscene or indecent or sexually
explicit manner through images, videos etc.
c. Cultivates, entices or induces children to online
relationship.
d. facilitates abusing children online.
e. records in any electronic form own abuse or that of others
pertaining to sexually explicit act with children.
CYBER LAWS
Offences under Sec- 43

• Section 43 Penalty and Compensation for damage to


computer, computer system, etc.
• If any person without permission of the owner or any other
person who is in-charge of a computer, computer system,
computer resource or computer network:-

• Accesses or secures access to such computer etc.


• Downloads, copies or extracts any data, computer data
base or information from such computer etc, including
information or data held or stored in any removable
storage medium.
CYBER LAWS
Offences under Sec- 43

• Introduces or causes to be introduced any computer


contaminant or computer virus into any computer, etc.
• Damages or causes to be damaged any computer, any
other programs residing in such computer etc.
• Disrupts or causes disruption of any computer etc.
• Denies or causes the denial of access to any person
authorized to access any computer etc.
• Provides any assistance to any person to facilitate access to
a computer etc, in contravention of the provisions of this
Act, rules or regulations made there under.
CYBER LAWS
Offences under Sec- 43

• Charges the services availed of by a person to the account


of another person by tampering with or manipulating any
computer, computer system, or computer network;
• Destroys, deletes or alters any information residing in a
computer resource or diminishes its value or utility or
affects it injuriously by any means and
• Steals, conceals, destroys or alters or causes any person to
steal, conceal, destroy or alter any computer source code
used for a computer resource with an intention to cause
damage,
he shall be liable to pay damages by way of
compensation to the person so affected.
THANK YOU

Kavyashree Bhandary
Faculty of Law
kavyashreebk@pes.edu
+91 9986583856

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy