SlideShare a Scribd company logo
INTRODUCTION TO  CYBER LAW Adv. Dipak G. Parmar B. Com.,  LL. M. , C. S. (Inter),  Adv. Dip. in Cyber Law   Founder, Cyber-IPR 27/01/2011 Copyright Dipak G. Parmar  Meant for educational purpose only
INTRODUCTION
Pre 1990: People are not connected 1990: Connecting People to Information  2000: Connecting People to People 2010: Everything is connected
 
 
 
We are now living in e-world… dominated by numbers of “e”. e-friend…e-music…e-network…e-ticket…e-commerce… and very soon e-service of notice in commercial matters of our supreme court. Recently, our Supreme Court had decided to serve email notice in commercial matters in addition to the regular notice by R. P. A. D.  in order to cut down the delay in the servicing notice. In my opinion, right to life includes right to e-life.
 
Technology is growing at lightening speed. While the technology brings lot of good things, it also brings equal amount of risks and challenges.  Every day, we read in the newspapers about the various cyber crimes, like Credit card cloning, spoofing, phishing, stalking, etc.  Some of the youngsters indulge in misusing the technology and get caught by the Police Authorities.
A recent study revealed that 80 percent of the cyber crimes in the Corporate Houses are committed by the ‘insiders’.  More than 95 percent of the cases do not get reported to the Police Authorities. Only 3% of cyber crime complaints filed in Mumbai are being converted in FIR.
CYBERSPACE
Cyberspace  is the electronic medium of computer networks, in which online communication takes place. It is readily identified with the interconnected information technology required to achieve the wide range of system capabilities associated with the transport of communication and control products and services. The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson.
Now, the term has become a conventional means to describe anything associated with computers, information technology, the internet and the diverse internet culture.  Cyberspace includes  The Internet, websites  computers, networks software, data storage devices, emails  electronic devices (cell phones, ATM machines etc) Cyber Law governs cyberspace
Cyber space is an intangible and provides an extreme mobility events taking place on the internet are not happening in the locations where participants or servers are physically located, but "in cyberspace".  Cyber space offers great economic efficiency. Billions of dollars worth of software can be traded over the  Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.
Cyber space has Complete disrespect for national boundaries. A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone.
Cyber space is absolutely open to participation by all. A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
 
Cyber space offers enormous potential for anonymity to its members. "On the Internet, nobody knows you're a dog" is an adage which began as the caption of a cartoon by Peter Steiner published by The New Yorker on July 5, 1993. The cartoon features two dogs: one sitting on a chair in front of a computer, speaking the caption to a second dog sitting on the floor.  http://www.unc.edu/depts/jomc/academics/dri/idog.html
On the Internet, it is very easier to create several copies and transmitting the same in different locations of world in few minutes. For these reasons, the Internet has been described as “the world’s biggest copy machine”.  “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
The IT Act gives legal recognition to electronic records and digital and electronic signature. Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of electronic/digital signature affixed in such manner as may be prescribed by the Central Government. Use of Electronic Records and Electronic Signature in Government and its agencies
Penalty, Compensation  and Offences
If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a)  to (j) Then he shall be l iable to pay unlimited damages to affected the  person.
If any person,  dishonestly  or   fraudulently , does any act referred to in section 43,  Punishment: Jailed upto three years and/or fine upto five lakh rupees. Dishonestly-  the intention of causing wrongful gain to one person  or   wrongful loss to another person Fraudulently  – the intention to defraud but not otherwise
If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a)  accesses  or  secures access  to such computer, computer system or computer network or computer resource
Access means  Gaining entry into,  Instructing with the logical, arithmetical, or memory function resources  of Communicating with the logical,  arithmetical, or memory function resources  of  a computer, computer system or computer network (widely defined to cover every with a computer chip)
Access means  Gaining entry into a computer, computer system or computer network (widely defined to cover  Applies to physical access too Examples Unauthorized access to a room storing a server/super computers Unscrews the cabinet of computer
Access means  Instructing or communicating with the logical, arithmetical, or memory function resources  of a computer, computer system or computer network (widely defined to cover  Instructing means giving order or directing (one way process) Communicating means exchange of information (one way process)
Examples (instructing or communicating ) Remotely shutting down computer by sending SMS Port scanning?? A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.
Section 43 (a) covers  access  or  secures access Secure means to make certain To make certain that access can be achieved as and when desired by the person seeking to access.  Example X, network administrator of ABC Limited, stores passwords of main servers in his personal laptop. Y, a friend of X, with X permission, access X’s laptop and note down passwords of main server. Y secured access to  main servers of ABC Limited.
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (g) provides any  assistance  to any person to  facilitate  access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder,
Assistances – is act of helping or aiding Facilitate – to make easier or to  make less difficult or to assist in the progress of… Examples Handing over password by the existing officer Deliberately ignoring warnings of  IDS Putting firewall on disable mode
Secured access  or  attempts to secure access  to a protected system Punishment : jailed upto 10 years and/or fine Protected system declared by the Government Examples: Computers of India Army, Mumbai Police, Forest Dept of Government etc.  Examples (attempts) Unsuccessful attempt to break password Unsuccessful DOS attack Unsuccessful attempt to send a Trojan
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (b)  downloads ,  copies  or  extracts  any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;
To download is to transfer information from one computer to another To copy is to imitate or reproduce an exact replica of the original To extract is to take out, distil, deduce, derive or quote from any source
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network – (d)  damages  or  causes to be damaged  any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;
Damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means Examples Changing an image from .gif format to .jpg format Deleting/changing  of code/URL/ excel file
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (e) disrupts or causes disruption of any computer, computer system or computer network; Disruption- could be total or partial  To prevent the normal continuance of To throw into confusion or disorder To interupt or impede the progress  of
Examples of Disruption Spreading worms in a global network…slowing down of the network Switching off the wi-fi modem Using the slow internet connection for heavy download…it is not available to other legitimate users.
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; Examples: DOS and DDOS attacks
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (h) charges the services availed of by a person to the account of another person by  tampering with  or  manipulating  any computer, computer system, or computer network, Examples: internet time theft, misuse of credit card etc
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (j)  Steals, conceals, destroys or alters  or  causes any person to steal, conceal, destroy or alter  any  computer source code  used for a computer resource with an intention to cause damage ,
Any person  knowingly or intentionally  conceals ,  destroys or alters  or  intentionally or knowingly  causes another to conceal, destroy or alter  any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force,  Punishment: jailed up to three years and/or fine up to two lakh rupees. Case-Law: Syed  Asifuddin & others v/s State of A. P and another
Where a body corporate, possessing, dealing or handling any  sensitive  personal data  or information in a computer resource which it owns, controls or operates, is  negligent  in implementing and maintaining  reasonable security practices and procedures  and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.  Example: BPO outsourcing contract
Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract,  has secured access to any  material containing personal information  about another person,  with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain  discloses,  without the consent  of the person concerned, or  in breach of a lawful contract , such  material to any other person ,  Punishment: Jailed upto  three  years, or/and fine upto five lakh rupees
Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly offensive or has menacing character; or Punishment: Jailed upto  three  years, or/and fine
Any person who sends, by means of a computer resource or a communication device,- b) any information which he knows to be  false , but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, Punishment: Jailed upto  three  years, or/and fine
Any person who sends, by means of a computer resource or a communication device,- c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages Punishment: Jailed upto  three  years, or/and fine Examples: SPAM, spoofing
67. Punishment for publishing or transmitting obscene material in electronic form 67 A Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form 67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
If any person, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person,  Punishment: Jailed upto  three  years, or/and fine upto two lakhs “ private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast
66 B. Punishment for dishonestly receiving stolen computer resource or communication device 66C. Punishment for identity theft 66D. Punishment for cheating by personation by using computer resource 66F. Punishment for cyber terrorism
Sec 75 Act to apply for offence or contraventions committed outside India by any person irrespective of his nationality. if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.
PReSENSE, Issue No 32 – Oct 2008 (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on 27-09-2009)  Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws  (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) A False Bargain: The  Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011) presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-5162852  Accessed on 13-09-2010)
Thank You Adv. DIPAK G. PARMAR [email_address] 09820196971

More Related Content

PPS
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
PPTX
Cyber law
Umang Maheshwari
 
PPTX
introduction to cyber law and cyber crime
Abhinav Tyagi
 
PPTX
Cyber law
Arnab Roy Chowdhury
 
PPTX
Cyber law In India: its need & importance
Aditya Shukla
 
PPTX
Risk Assessment: Creating a Risk Matrix
EtQ, Inc.
 
PPTX
Security Operation Center Fundamental
Amir Hossein Zargaran
 
PPTX
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Cyber law
Umang Maheshwari
 
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Cyber law In India: its need & importance
Aditya Shukla
 
Risk Assessment: Creating a Risk Matrix
EtQ, Inc.
 
Security Operation Center Fundamental
Amir Hossein Zargaran
 
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 

What's hot (20)

PPTX
Information technology act 2000
Akash Varaiya
 
PPTX
IT act 2008
sujithsunil
 
PPTX
Introduction to Cyber Crimes
atuljaybhaye
 
PPTX
It act 2000
Vidhu Arora
 
PPTX
Jurisdiction issues in cyberspace
atuljaybhaye
 
PPT
Cyberlaw An Overview
Talwant Singh
 
PPTX
Cyber Terrorism
Shivam Lohiya
 
PPTX
Information technology act 2000.avi
avinashmsy
 
PPT
Information Technology Act 2000
Vijay Dalmia
 
PPTX
Cyber crime and its types
DINESH KAMBLE
 
PPTX
Computer Vandalism
Aditya Singh
 
PPTX
Cyber law & Intellectual property issues
atuljaybhaye
 
PPTX
IT Act 2000
Sreelekshmi Mohan
 
DOCX
Cyber laws with case studies
Bhagya Bgk
 
PPTX
Cyber Law And Ethics
Madhushree Shettigar
 
PPTX
Cyber Obscenity
sneha164
 
PPTX
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
PPTX
Information Technology Act 2000
Dr. Heera Lal IAS
 
PDF
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
PPTX
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Information technology act 2000
Akash Varaiya
 
IT act 2008
sujithsunil
 
Introduction to Cyber Crimes
atuljaybhaye
 
It act 2000
Vidhu Arora
 
Jurisdiction issues in cyberspace
atuljaybhaye
 
Cyberlaw An Overview
Talwant Singh
 
Cyber Terrorism
Shivam Lohiya
 
Information technology act 2000.avi
avinashmsy
 
Information Technology Act 2000
Vijay Dalmia
 
Cyber crime and its types
DINESH KAMBLE
 
Computer Vandalism
Aditya Singh
 
Cyber law & Intellectual property issues
atuljaybhaye
 
IT Act 2000
Sreelekshmi Mohan
 
Cyber laws with case studies
Bhagya Bgk
 
Cyber Law And Ethics
Madhushree Shettigar
 
Cyber Obscenity
sneha164
 
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Information Technology Act 2000
Dr. Heera Lal IAS
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Ad

Similar to Introduction to Cyber Law (20)

DOCX
Cyber law assignment
cparimala
 
PPT
New internet security
university of mumbai
 
PPT
NewIinternet security
university of mumbai
 
PDF
Cyber Law and more information about lawpdf
manjushreeraman
 
TXT
Cyber crime
samuelrajueda
 
PDF
Cyber Law .pdf
KrishnaVashistha4
 
PPTX
Information Technology and IT Act for STudents.pptx
prasoona4
 
PPT
Cybercrime
nayakslideshare
 
PDF
Part-A An Overview of Cyber Law.pdf
SunilSaklani6
 
PPTX
Ethical hacking
Md Mudassir
 
PDF
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
PPSX
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
PPTX
Cyber crime ✔
hubbysoni
 
PPTX
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
PPTX
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
PPTX
Cyber Space
DINESH KAMBLE
 
PDF
Need For Ethical & Security Issue In It
Sonali Srivastava
 
PPT
Computer
faisalbhatti
 
PPT
Slideshare is
Ashu Pandita Kaul
 
DOCX
Chapter 10.0
Adebisi Tolulope
 
Cyber law assignment
cparimala
 
New internet security
university of mumbai
 
NewIinternet security
university of mumbai
 
Cyber Law and more information about lawpdf
manjushreeraman
 
Cyber crime
samuelrajueda
 
Cyber Law .pdf
KrishnaVashistha4
 
Information Technology and IT Act for STudents.pptx
prasoona4
 
Cybercrime
nayakslideshare
 
Part-A An Overview of Cyber Law.pdf
SunilSaklani6
 
Ethical hacking
Md Mudassir
 
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber crime ✔
hubbysoni
 
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
Cyber Space
DINESH KAMBLE
 
Need For Ethical & Security Issue In It
Sonali Srivastava
 
Computer
faisalbhatti
 
Slideshare is
Ashu Pandita Kaul
 
Chapter 10.0
Adebisi Tolulope
 
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
PPTX
SSRF exploit the trust relationship
n|u - The Open Security Community
 
PDF
Metasploit primary
n|u - The Open Security Community
 
PDF
Api security-testing
n|u - The Open Security Community
 
PDF
Introduction to TLS 1.3
n|u - The Open Security Community
 
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
PDF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
PPTX
Building active directory lab for red teaming
n|u - The Open Security Community
 
PPTX
Owning a company through their logs
n|u - The Open Security Community
 
PPTX
Introduction to shodan
n|u - The Open Security Community
 
PDF
Detecting persistence in windows
n|u - The Open Security Community
 
PPTX
Frida - Objection Tool Usage
n|u - The Open Security Community
 
PDF
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
PDF
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
PDF
Extensible markup language attacks
n|u - The Open Security Community
 
PPTX
Linux for hackers
n|u - The Open Security Community
 
PDF
Android Pentesting
n|u - The Open Security Community
 
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
n|u - The Open Security Community
 
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
n|u - The Open Security Community
 

Recently uploaded (20)

PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
The Future of Artificial Intelligence (AI)
Mukul
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Software Development Methodologies in 2025
KodekX
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 

Introduction to Cyber Law

  • 1. INTRODUCTION TO CYBER LAW Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), Adv. Dip. in Cyber Law Founder, Cyber-IPR 27/01/2011 Copyright Dipak G. Parmar Meant for educational purpose only
  • 3. Pre 1990: People are not connected 1990: Connecting People to Information 2000: Connecting People to People 2010: Everything is connected
  • 4.  
  • 5.  
  • 6.  
  • 7. We are now living in e-world… dominated by numbers of “e”. e-friend…e-music…e-network…e-ticket…e-commerce… and very soon e-service of notice in commercial matters of our supreme court. Recently, our Supreme Court had decided to serve email notice in commercial matters in addition to the regular notice by R. P. A. D. in order to cut down the delay in the servicing notice. In my opinion, right to life includes right to e-life.
  • 8.  
  • 9. Technology is growing at lightening speed. While the technology brings lot of good things, it also brings equal amount of risks and challenges. Every day, we read in the newspapers about the various cyber crimes, like Credit card cloning, spoofing, phishing, stalking, etc. Some of the youngsters indulge in misusing the technology and get caught by the Police Authorities.
  • 10. A recent study revealed that 80 percent of the cyber crimes in the Corporate Houses are committed by the ‘insiders’. More than 95 percent of the cases do not get reported to the Police Authorities. Only 3% of cyber crime complaints filed in Mumbai are being converted in FIR.
  • 12. Cyberspace  is the electronic medium of computer networks, in which online communication takes place. It is readily identified with the interconnected information technology required to achieve the wide range of system capabilities associated with the transport of communication and control products and services. The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson.
  • 13. Now, the term has become a conventional means to describe anything associated with computers, information technology, the internet and the diverse internet culture. Cyberspace includes The Internet, websites computers, networks software, data storage devices, emails electronic devices (cell phones, ATM machines etc) Cyber Law governs cyberspace
  • 14. Cyber space is an intangible and provides an extreme mobility events taking place on the internet are not happening in the locations where participants or servers are physically located, but "in cyberspace". Cyber space offers great economic efficiency. Billions of dollars worth of software can be traded over the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.
  • 15. Cyber space has Complete disrespect for national boundaries. A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone.
  • 16. Cyber space is absolutely open to participation by all. A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  • 17.  
  • 18. Cyber space offers enormous potential for anonymity to its members. "On the Internet, nobody knows you're a dog" is an adage which began as the caption of a cartoon by Peter Steiner published by The New Yorker on July 5, 1993. The cartoon features two dogs: one sitting on a chair in front of a computer, speaking the caption to a second dog sitting on the floor. http://www.unc.edu/depts/jomc/academics/dri/idog.html
  • 19. On the Internet, it is very easier to create several copies and transmitting the same in different locations of world in few minutes. For these reasons, the Internet has been described as “the world’s biggest copy machine”. “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
  • 20. The IT Act gives legal recognition to electronic records and digital and electronic signature. Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of electronic/digital signature affixed in such manner as may be prescribed by the Central Government. Use of Electronic Records and Electronic Signature in Government and its agencies
  • 21. Penalty, Compensation and Offences
  • 22. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a) to (j) Then he shall be l iable to pay unlimited damages to affected the person.
  • 23. If any person, dishonestly or fraudulently , does any act referred to in section 43, Punishment: Jailed upto three years and/or fine upto five lakh rupees. Dishonestly- the intention of causing wrongful gain to one person or wrongful loss to another person Fraudulently – the intention to defraud but not otherwise
  • 24. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a) accesses or secures access to such computer, computer system or computer network or computer resource
  • 25. Access means Gaining entry into, Instructing with the logical, arithmetical, or memory function resources of Communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover every with a computer chip)
  • 26. Access means Gaining entry into a computer, computer system or computer network (widely defined to cover Applies to physical access too Examples Unauthorized access to a room storing a server/super computers Unscrews the cabinet of computer
  • 27. Access means Instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover Instructing means giving order or directing (one way process) Communicating means exchange of information (one way process)
  • 28. Examples (instructing or communicating ) Remotely shutting down computer by sending SMS Port scanning?? A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.
  • 29. Section 43 (a) covers access or secures access Secure means to make certain To make certain that access can be achieved as and when desired by the person seeking to access. Example X, network administrator of ABC Limited, stores passwords of main servers in his personal laptop. Y, a friend of X, with X permission, access X’s laptop and note down passwords of main server. Y secured access to main servers of ABC Limited.
  • 30. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder,
  • 31. Assistances – is act of helping or aiding Facilitate – to make easier or to make less difficult or to assist in the progress of… Examples Handing over password by the existing officer Deliberately ignoring warnings of IDS Putting firewall on disable mode
  • 32. Secured access or attempts to secure access to a protected system Punishment : jailed upto 10 years and/or fine Protected system declared by the Government Examples: Computers of India Army, Mumbai Police, Forest Dept of Government etc. Examples (attempts) Unsuccessful attempt to break password Unsuccessful DOS attack Unsuccessful attempt to send a Trojan
  • 33. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (b) downloads , copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;
  • 34. To download is to transfer information from one computer to another To copy is to imitate or reproduce an exact replica of the original To extract is to take out, distil, deduce, derive or quote from any source
  • 35. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
  • 36. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network – (d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;
  • 37. Damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means Examples Changing an image from .gif format to .jpg format Deleting/changing of code/URL/ excel file
  • 38. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (e) disrupts or causes disruption of any computer, computer system or computer network; Disruption- could be total or partial To prevent the normal continuance of To throw into confusion or disorder To interupt or impede the progress of
  • 39. Examples of Disruption Spreading worms in a global network…slowing down of the network Switching off the wi-fi modem Using the slow internet connection for heavy download…it is not available to other legitimate users.
  • 40. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; Examples: DOS and DDOS attacks
  • 41. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, Examples: internet time theft, misuse of credit card etc
  • 42. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage ,
  • 43. Any person knowingly or intentionally conceals , destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, Punishment: jailed up to three years and/or fine up to two lakh rupees. Case-Law: Syed Asifuddin & others v/s State of A. P and another
  • 44. Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected. Example: BPO outsourcing contract
  • 45. Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract , such  material to any other person , Punishment: Jailed upto three years, or/and fine upto five lakh rupees
  • 46. Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly offensive or has menacing character; or Punishment: Jailed upto three years, or/and fine
  • 47. Any person who sends, by means of a computer resource or a communication device,- b) any information which he knows to be false , but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, Punishment: Jailed upto three years, or/and fine
  • 48. Any person who sends, by means of a computer resource or a communication device,- c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages Punishment: Jailed upto three years, or/and fine Examples: SPAM, spoofing
  • 49. 67. Punishment for publishing or transmitting obscene material in electronic form 67 A Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form 67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
  • 50. If any person, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, Punishment: Jailed upto three years, or/and fine upto two lakhs “ private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast
  • 51. 66 B. Punishment for dishonestly receiving stolen computer resource or communication device 66C. Punishment for identity theft 66D. Punishment for cheating by personation by using computer resource 66F. Punishment for cyber terrorism
  • 52. Sec 75 Act to apply for offence or contraventions committed outside India by any person irrespective of his nationality. if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.
  • 53. PReSENSE, Issue No 32 – Oct 2008 (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on 27-09-2009) Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011) presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-5162852 Accessed on 13-09-2010)
  • 54. Thank You Adv. DIPAK G. PARMAR [email_address] 09820196971