PRESENTATION ON CYBER LAWS. BIBLIOGRAPHY LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE.LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE. BY:NANDAN.

Slides:



Advertisements
Similar presentations
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Advertisements

Electronic documents management market in Europe: technologies and solutions | DLM Forum | Dr. Ulrich Kampffmeyer | PROJECT CONSULT Unternehmensberatung | 1999
INFORMATION TECHNOLOGY ACT AND ITS IMPACT ON E-COMMERCE © of images belongs to the respective copyright holders.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
Technology for Computer Forensics by Alicia Castro.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Business Law Module 4 Module IV: Information Technology Act 2000
Computers and Legal Education at the Nicolaus Copernicus University in Toruń Methodology and Experiences Karol Dobrzeniecki, LLM.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Business Law for the Entrepreneur and Manager
Stop cyber bullying  Forms of digital communication and collaboration tools: Blog Online forum Social networking site.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
CYBER CRIME.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
IPR Intellectual Property Rights Violation of IPR – basically, this means knowingly or unknowingly stealing other people’s works and ideas.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
Lesson 15 : Networks And The Internet
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
Breaking the law. The danger Either knowingly or otherwise, children and young people can fall foul of the law or get into trouble with other Internet.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 WEB TECHNOLOGY UNIT – 1 THETOPPERSWAY.COM. 2 HISTORY AND GROWHT OF WEB The idea of a nonproprietary computer communication system was first conceived.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Seminar on IT ACTS Submitted By: Aditi Gupta 09ESKCS002 CS-A Submitted To: Mr. Pankaj Dadheech Dy. HoD C.S. Department.
Cyber Law And Ethics And Ethics.
9.1 Audience Appreciation
1 CS 5339 Web-Based Systems Contract Law. 2 General Contracting Principles Mixture of common law and code law Uniform Commercial Code (model law) Many.
Licensing & Technology Transfer to and from India : Evolution of Information Technology & Software Industry Presented by:- Indranil Chowdhury - Howrey,
SECURITY STANDARDS AND CYBER LAWS
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
PART III Ethical Issues in Business
Chapter 14 Online Commerce and E-Contracts
Overview of Electronic Commerce
Chapter 13 E-Commerce Contracts
Cyber Law and E-Commerce
Presentation transcript:

PRESENTATION ON CYBER LAWS

BIBLIOGRAPHY LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE.LAWS RELATING TO COMPUTER,INTERNET AND E- COMMERCE. BY:NANDAN KAMATH BY:NANDAN KAMATH LEGAL ASPECTS OF BUSINESSLEGAL ASPECTS OF BUSINESS BY:AKHILESHWAR PATHAKBY:AKHILESHWAR PATHAK COMPANY LAWCOMPANY LAW BY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLABY:KC GARG,VIJAY GUPTA,POONAM GUPTA AND R.C CHAWLA

CONTENTS INTRODUCTIONINTRODUCTION NEED FOR CYBER LAWSNEED FOR CYBER LAWS CYBER LAWS IN INDIACYBER LAWS IN INDIA CYBER CRIMESCYBER CRIMES OFFENCES AND LAWS IN CYBER SPACEOFFENCES AND LAWS IN CYBER SPACE CYBER LAWS AMENDMENTSCYBER LAWS AMENDMENTS CONCLUSIONCONCLUSION

INTRODUCTION GROWTH OF CYBER SPACEGROWTH OF CYBER SPACE ONSET OF INTERNETONSET OF INTERNET CYBER LAW OR LAW OF INTERNETCYBER LAW OR LAW OF INTERNET

NEED FOR CYBER LAWS TACKLING CYBER CRIMESTACKLING CYBER CRIMES INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACTINTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT

CYBER LAWS IN INDIA ITACT PASSED IN 2000ITACT PASSED IN 2000 INTERNET IN INDIAINTERNET IN INDIA IMPLEMENTATION OF CYBER LAWIMPLEMENTATION OF CYBER LAW REASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIAREASONS FOR DELAY IN IMPLEMENTATION OF CYBER LAWS IN INDIA

IT ACT PROVISIONS would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. Digital signatures have been given legal validity and sanction in the Act.Digital signatures have been given legal validity and sanction in the Act.

IT ACT PROVISIONS The Act now allows Government to issue notification on the web thus heralding e- governanceThe Act now allows Government to issue notification on the web thus heralding e- governance statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies datastatutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data

CYBER CRIMES CYBER CRIMES AGAINST PERSONSCYBER CRIMES AGAINST PERSONS eg melissaand lovebug virus eg melissaand lovebug virus CYBER CRIMES AGAINST PROPERTYCYBER CRIMES AGAINST PROPERTY eg computer vandalism eg computer vandalism CYBER CRIMES AGAINST GOVERNMENTCYBER CRIMES AGAINST GOVERNMENT eg Al-Qaedaeg Al-Qaeda

CYBER CRIMES

CRIME THROUGH ORKUT Koushambi,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.Koushambi,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.TCSManish ThakurTCSManish Thakur

INTERNET AND ITS EFFECT 20% - 30% of Internet pornography consumption is by children of ages % - 30% of Internet pornography consumption is by children of ages MySpace is being used by predators to meet and entice kids online.MySpace is being used by predators to meet and entice kids online. Specific marketing strategies are being used to attract children to porn sites.Specific marketing strategies are being used to attract children to porn sites.

OFFENCES AND LAWS IN CYBER SPACE TAMPERING WITH COMPUTER DOCUMENTSTAMPERING WITH COMPUTER DOCUMENTS HACKING WITH COMPUTER SYSTEMHACKING WITH COMPUTER SYSTEM PUBLISHING OBSCENE MATERIAL ON INTERNETPUBLISHING OBSCENE MATERIAL ON INTERNET BREACHING OF CONFIDENTIALITY AND PRIVACYBREACHING OF CONFIDENTIALITY AND PRIVACY

CYBER LAWS AMENDMENTS INDIAN PENAL CODE,1860 INDIAN PENAL CODE,1860 INDIAN EVIDENCE ACT,1872INDIAN EVIDENCE ACT,1872 BANKERS BOOK EVIDENCE ACT,1891BANKERS BOOK EVIDENCE ACT,1891 GENERAL CLAUSES ACT,1897GENERAL CLAUSES ACT,1897

CONCLUSION CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNETCYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET ACHIEVING GLOBAL PEACE AND HARMONYACHIEVING GLOBAL PEACE AND HARMONY

THANK YOU QUERIES WELCOMED QUERIES WELCOMED