Madhushreesybaf5109 151216121236

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

 Cyber law is the area of law that deals with the

Internet's relationship to technological and


electronic elements, including computers,
software, hardware and information systems
(IS).
 Cyber law is also known as Cyber Law or Internet
Law.
 Cyber laws prevent or reduce large scale damage
from cybercriminal activities by protecting
information access, privacy, communications,
intellectual property (IP) and freedom of speech
related to the use of the Internet, websites,
email, computers, cell phones, software and
hardware, such as data storage devices.
 The increase in Internet traffic has led to a
higher proportion of legal issues worldwide.
 Because cyber laws vary by jurisdiction and
country, enforcement is challenging, and
restitution ranges from fines to
imprisonment.
 The Information Technology Amendment Act,
2008 (IT Act 2008) is a substantial addition to
India's Information Technology Act (ITA-2000).
 The IT Amendment Act was passed by the Indian
Parliament in October 2008 and came into force
a year later. The Act is administered by the
Indian Computer Emergency Response Team
(CERT-IN).
 The original Act was developed to promote the IT
industry, regulate e-commerce, facilitate e-
governance and prevent cybercrime.
 The Act also sought to foster security practices
within India that would serve the country in a
global context.
 The Amendment was created to address issues
that the original bill failed to cover and to
accommodate further development of IT and
related security concerns since the original law
was passed.
 Changes in the Amendment include: redefining
terms such as "communication device" to reflect
current use; validating electronic signatures and
contracts; making the owner of a given IP
address responsible for content accessed or
distributed through it; and making corporations
responsible for implementing effective data
security practices and liable for breaches.
 The following are its main objectives of I T
Act 2000
 1. It is objective of I.T. Act 2000 to give legal
recognition to any transaction which is done by
electronic way or use of internet.
 2. To give legal recognition to digital signature
for accepting any agreement via computer.
 3. To provide facility of filling document online
relating to school admission or registration in
employment exchange.
 4. According to I.T. Act 2000, any company can
store their data in electronic storage.
 5. To stop computer crime and protect privacy of
internet users.
 6. To give legal recognition for keeping books of
accounts by bankers and other companies in
electronic form.
 7. To make more power to IPO, RBI and Indian
Evidence act for restricting electronic crime.
 1. Thou shalt not copy or use proprietary software
for which you have not paid.
 2. Thou shalt not use other people's computer
resources without authorization or proper
compensation.
 3. Thou shalt not appropriate other people's
intellectual output.
 4. Thou shalt think about the social consequences of
the program you are writing or the system you are
designing.
 5. Thou shalt always use a computer in ways that
ensure consideration and respect for your fellow
humans.
 6. Thou shalt not use a computer to harm
other people.
 7. Thou shalt not interfere with other
people's computer work.
 8. Thou shalt not snoop around in other
people's computer files.
 9. Thou shalt not use a computer to steal.
 10. Thou shalt not use a computer to bear
false witness.
 Computer crime, or cybercrime, is any crime that
involves a computer and a network.
 Dr. Debarati Halder and Dr. K. Jaishankar (2011) define
Cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal motive
to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication networks such
as Internet (Chat rooms, emails, notice boards and groups)
and mobile phones (SMS/MMS)".
 Such crimes may threaten a nation’s security and financial
health.
 Surrounding these types of crimes have become high-
profile, particularly those surrounding hacking, copyright
infringement , child pornography, and child grooming.
 The computer may have been used in the commission of a
crime, or it may be the target.
 There are also problems of privacy when
confidential information is intercepted or disclosed,
lawfully or otherwise.
 Internationally, both governmental and non-state actors
engage in cybercrimes, including espionage, financial
theft, and other cross-border crimes. Activity crossing
international borders and involving the interests of at least
one nation state is sometimes referred to as cyber
welfare.
 The international legal system is attempting to hold actors
accountable for their actions through the International
Criminal Court.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy