Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
7 years of Indian Cyber Law Rohas Nagpal President, Asian School of Cyber Laws.
CRIMINAL PROCEDURE CODE
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Cyber crime: a new challenge for law enforcers!
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
INFORMATION TECHNOLOGY ACT 2000 AN OVERVIEW. PRESENTATION OVERVIEW Need for the law Legal issues regarding offer, Acceptance and conclusion of contract.
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Cyber Crimes, Cyber Investigation and Cyber Evidence
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Network Security Amandeep Kaur Lecturer Computer Engg. GPC Khunimajra(Mohali)
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Business Law Module 4 Module IV: Information Technology Act 2000
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
Criminal Law and Procedure
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
“Cyber Crime in India”
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
Types of Electronic Infection
The law on Intermediary Liability in India
ASIAN PATENT ATTORNEYS ASSOCIATION Recognized Group of India, Report to the Anti-Counterfeiting Committee 50 th Council Meeting in Fukuoka, October 25,
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
C OMPANIES ACT,2013 Adv. Arun Saxena Saxena & Saxena Law Chambers Advocates & Attorneys , New Delhi House 27, Barakhamba Road, New Delhi –
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Indiana’s Access to Public Records Act Heather Willis Neal Public Access Counselor Brownsburg Police Department Brownsburg Police Department February 26,
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
C OMPANIES ACT,2013 CA. Arun Saxena Saxena & Saxena Chartered Accountants 811, Ansal Bhawan 16, Kasturba Gandhi Marg, New Delhi – Mob.:
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cyber Law And Ethics And Ethics.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Cyber Crime.  These are the crimes, which have been committed with the help of computer, computer system, computer network of communication device. IT.
Cell Phone Forensics Investigator - ICFECI
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
CS SONU LAKHANI AEO, ICSI CYBER CRIME PREVENTION & DETECTION.
CYBER AND SECURITY. CYBER LAW The primary source of cyber law in India is information technology act,2000(IT act) which came into force on 17 october.
Surveillance around the world
SECURITY STANDARDS AND CYBER LAWS
Cyber Laws in Pakistan.
Cyber Crime.
IT ACT 2000 and 2008 Important Sections Awareness Presentation
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Cyber Crime Today we will look at: Different types of cyber-crime
Societal Issues in Computing (COMP466)
Amended Section 41 of Criminal Procedure Code
Cyber Laws in Pakistan Hassan Khalil.
Pre-Trial Procedures Search and Seizure.
Digital Empowerment of Women in KP
Presentation transcript:

Rohas Nagpal, Asian School of Cyber Laws

 Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal Code, Evidence Act Code of Criminal Procedure

 Section 67 covers: Publishing Transmitting Causing to be published  In respect of pornography in the electronic form  Baazee case

 Section 67 applies to: SMS, s, websites, mp3 ??  Stringent punishment: 5 years + 1 lakh fine 10 years + 2 lakh fine

 Liability of receiver of pornography?  Is it a crime to watch pornography?  Is cyber café owner responsible?

Intention to cause wrongful loss or damage or Knowledge of the likelihood of wrongful loss or damage AND Destruction / deletion / alteration of information in a computer or diminishing value or utility of a computer resource or injuriously affecting a computer resource

 3 years jail and / or 2 lakh fine

 knowingly or intentionally conceals, destroys or alters  or intentionally or knowingly causes another to conceal, destroy or alter  any computer source code  required to be kept or maintained by law

 3 years jail and / or 2 lakh fine  Tata Indicom employees case

 Controller directs interception of electronic information sovereignty / integrity / security of India, friendly relations with foreign States public order preventing incitement to the commission of any cognizable offence  All facilities and technical assistance to decrypt the information are not offerred.

 7 years jail  Forgotten password (?)  Deleted private keys (?)  Unconstitutional (?)

 Save as otherwise provided by law  Police etc secured access to any electronic information  Discloses material without the consent of the person concerned

 2 years jail and / or Rs 1 lakh

 Unauthorised access  Unauthorized copying, downloading, extracting  Introducing computer worm / virus  Denial of service

 Facilitating unauthorized access  Computer fraud

 For investigation Controller of Certifying Authorities Deputy Superintendent of Police CERT-IND  For adjudication Adjudicating Officer Cyber Appellate Tribunal Criminal Courts

 Liability of Network Service Providers  Liability of Companies  Arrest without warrant  Search and seizure

 as evidence  Certificate u/s 65B of Indian Evidence Act  Bankers’ Books Evidence Act Applicable to cheque bouncing cases also  Digital signatures as evidence

Rohas Nagpal, Asian School of Cyber Laws