Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.

Slides:



Advertisements
Similar presentations
Workshop on “Cyber Crime”
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
7 years of Indian Cyber Law Rohas Nagpal President, Asian School of Cyber Laws.
Breaking Trust On The Internet
INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Cyber Crimes, Cyber Investigation and Cyber Evidence
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Law & Islamic Ethics
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Phishing is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords, usernames, login.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
Cyber Crimes.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Summary of Nepal's Civil Society Report on Optional Protocol to the CRC on the Sale of Children, Child Prostitution and Child Pornography Kapil Aryal 1.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
“Cyber Crime in India”
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
FERA TO FEMA. Objectives To facilitate external trade and payments To promote the orderly development and maintenance of foreign exchange market.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
SEXTING. Is this ever ok? (click Yes, No or Maybe TWICE as applicable) 1. Sending a sexually explicit selfie at age Sending a sexually explicit.
ASIAN PATENT ATTORNEYS ASSOCIATION Recognized Group of India, Report to the Anti-Counterfeiting Committee 50 th Council Meeting in Fukuoka, October 25,
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Minimum Wages Act 1948.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cyber Law And Ethics And Ethics.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Cell Phone Forensics Investigator - ICFECI
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
CS SONU LAKHANI AEO, ICSI CYBER CRIME PREVENTION & DETECTION.
CYBER AND SECURITY. CYBER LAW The primary source of cyber law in India is information technology act,2000(IT act) which came into force on 17 october.
SECURITY STANDARDS AND CYBER LAWS
Cyber Crime.
IT ACT 2000 and 2008 Important Sections Awareness Presentation
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Information Technology Act
HOW DO I KEEP MY COMPUTER SAFE?
Digital Empowerment of Women in KP
Presentation transcript:

Rohas Nagpal Asian School of Cyber Laws

 Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal Code  Evidence Act

 Voyeurism is now specifically covered.  Acts like hiding cameras in changing rooms, hotel rooms etc is punishable with jail upto 3 years.  This would apply to cases like the infamous Pune spycam incident where a 58-year old man was arrested for installing spy cameras in his house to ‘snoop’ on his young lady tenants.

 Publishing sexually explicit acts in the electronic form is punishable with jail upto 3 years.  This would apply to cases like the Delhi MMS scandal where a video of a young couple having sex was spread through cell phones around the country.

 Collecting, browsing, downloading etc of child pornography is punishable with jail upto 5 years for the first conviction.  For a subsequent conviction, the jail term can extend to 7 years. A fine of upto Rs 10 lakh can also be levied.

 The punishment for spreading obscene material by , websites, sms has been reduced from 5 years jail to 3 years jail.  This covers acts like sending ‘dirty’ jokes and pictures by or sms.  Bangalore student sms case

 Compensation is not restricted to Rs 1 crore anymore on cyber crimes like: accessing or securing access to a computer downloading, copying or extracting data computer contaminant or virus damaging computer disrupting computer

 Compensation is not restricted to Rs 1 crore anymore on cyber crimes like: providing assistance to facilitate illegal access computer fraud destroying, deleting or altering or diminishing value or utility or affecting injuriously stealing, concealing, destroying or altering computer source code

 The Adjudicating Officers will have jurisdiction for cases where the claim is upto Rs. 5 crore.  Above that the case will need to be filed before the civil courts.

 A special liability has been imposed on call centers, BPOs, banks and others who hold or handle sensitive personal data.  If they are negligent in “implementing and maintaining reasonable security practices and procedures”, they will be liable to pay compensation.

 It may be recalled that India’s first major BPO related scam was the multi crore MphasiS-Citibank funds siphoning case in  Under the new law, in such cases, the BPOs and call centers could also be made liable if they have not implemented proper security measures.

 Refusing to hand over passwords to an authorized official could land a person in prison for upto 7 years.  The offence of cyber terrorism has been specially included in the law. A cyber terrorist can be punished with life imprisonment.

 Sending threatening s and sms are punishable with jail upto 3 years.  Hacking into a Government computer or website, or even trying to do so in punishable with imprisonment upto 10 years.

 Cyber crime cases can now be investigated by Inspector rank police officers.  Earlier such offences could not be investigated by an officer below the rank of a deputy superintendent of police.

 The Information Technology Act, 2000 took a "technology dependent" approach to the issue of electronic authentication.  This was done by specifying digital signatures as the means of authentication.

 The defect in this approach is that the law is bound by a specific technology, which in due course of time may be proven weak.  The advantage of using a technology neutral approach is that if one technology is proven weak, others can be used without any legal complexities arising out of the issue.

 An example of this is the MD5 hash algorithm that at one time was considered suitable.  MD5 was prescribed as suitable by Rule 6 of the Information Technology (Certifying Authorities) Rules, 2000.

 MD5 was subsequently proven weak by mathematicians.  In fact, Asian School of Cyber Laws had filed a public interest litigation in the Bombay High Court on the same issue.

 Subsequently, the Information Technology (Certifying Authorities) Amendment Rules, 2009 amended the Rule 6 mentioned above.  MD5 was replaced by SHA-2.

 The Information Technology (Amendment) Act, 2008 amends the technology dependent approach.  It introduces the concept of electronic signatures in addition to digital signatures.

 Digital signatures are one type of technology coming under the wider term “electronic signatures”.

 1. based on the knowledge of the user or the recipient e.g. passwords, personal identification numbers (PINs)  2. those based on the physical features of the user (e.g. biometrics)  3. those based on the possession of an object by the user (e.g. codes or other information stored on a magnetic card).

 Digital signatures within a public key infrastructure (PKI)  biometric devices

 PINs  user-defined or assigned passwords,  scanned handwritten signatures,  signature by means of a digital pen,  clickable “OK” or “I accept” boxes.

 Hybrid solution like combined use of passwords and secure sockets layer (SSL)  It is a technology using a mix of public and symmetric key encryptions.

 Fraudulently or dishonestly using someone else’s electronic signature, password or any other unique identification feature  3 years jail and fine upto Rs 1 lakh.  New provision

 Section 65  Conceal / destroy / alter source code  3 years jail and / or fine upto Rs 2 lakh  Unchanged provision

 Section 66  3 years jail and / or fine upto 5 lakh  New provision  Replaces ‘hacking’

 dishonestly or fraudulently: accessing or securing access to a computer downloading, copying or extracting data computer contaminant or virus damaging computer disrupting computer denial of access

 dishonestly or fraudulently: providing assistance to facilitate illegal access computer fraud destroying, deleting or altering or diminishing value or utility or affecting injuriously stealing, concealing, destroying or altering computer source code

 Section 66A  3 years jail and fine  New provision

 Covers following sent by sms / grossly offensive menacing false information sent for causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will phishing, spoofing

 spoofing  SMS spoofing  Phishing

Asian School of Cyber Laws