7 years of Indian Cyber Law Rohas Nagpal President, Asian School of Cyber Laws.

Slides:



Advertisements
Similar presentations
Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
By Andy Scott, Michael Murray and Adam Kanopa
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Today’s Agenda Study, Study, Study Pre-Quiz A Little More History Finish Bill of Rights Name That Amendment.
+ Arrest and Detention. + Arrests Suspects are questioned after physical evidence has been collected. Depending on the amount of evidence collected, arrests.
The Bill of Rights and the Criminal Trial Process.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
2 Language of Computer Crime Investigation
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
INTRODUCTION TO THE LAW OF EVIDENCE
The Copyright, Designs and Patent Act.  Software copyright is protected by law for 50 years after it is published  It also includes data stored on computer.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
The Bill of Rights Jessica Seo, Jay Kim, and Nensi Karaj.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Administrative Practices Outcome 1
The Impact of Physical Security on Network Security
By Mr. Abdalla A. Shaame.  ICT is an acronym that stands for Information Communications Technology  However, apart from explaining an acronym, there.
The Bill of Rights The First 10 Amendments to the Constitution
Information Ethics Objective: Students will understand how to use information ethically.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
Cyber crime & Security Prepared by : Rughani Zarana.
{ Criminal Trial Procedure What happens when the police arrest a criminal suspect?
Chapter 4 Section 2 Other Guarantees in the Bill of Rights.
Computer Security Management: Assessment and Forensics Session 8.
The law on Intermediary Liability in India
ASIAN PATENT ATTORNEYS ASSOCIATION Recognized Group of India, Report to the Anti-Counterfeiting Committee 50 th Council Meeting in Fukuoka, October 25,
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Bill of Rights The First 10 Amendments to the Constitution Take notes on the slides as they appear. Draw pictures to represent at least five of the.
DIGITAL SIGNATURE.
The U.S. Bill of Rights. 1st Amendment The 1st Amendment guarantees freedom of religion, speech, the press, assembly, and petition. This means that we.
The Bill of Rights and the Criminal Trial Process.
 Sandhyarani Das Gupta was a minor girl who was staying with her mother in the Refugee Colony at Ghola.  Manibala Majumdar induced this girl with the.
SECRETARIAT OF POLICE1 Presentation to Select Committee on Security and Constitutional Affairs on the Criminal Procedures (Forensic) Amendment Act 28 July.
RTI RIGHT TO INFORMATION ACT (RTI Act) Presented By – Pratik Maru Durlabh Giripunje.
Cyber Law And Ethics And Ethics.
The Bill of Rights Quick! Write down as many rights as you can remember!
Article III: The Judicial Branch Chapters: 11,12
CYBER AND SECURITY. CYBER LAW The primary source of cyber law in India is information technology act,2000(IT act) which came into force on 17 october.
Courts System Search Warrants.
SECURITY STANDARDS AND CYBER LAWS
Necessity defence of self defence
Protection Or Violation ?
Guide to Computer Forensics and Investigations Fifth Edition
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
The Bill of Rights and the Criminal Trial Process
Unit 1: The Law and Civil Rights
The Rights of American Citizens
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
The Bill of Rights and the Criminal Trial Process
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Digital Empowerment of Women in KP
Differences and similarities
Presentation transcript:

7 years of Indian Cyber Law Rohas Nagpal President, Asian School of Cyber Laws

Cyber Pornography

Section 67 of IT Act – Publishing, transmitting, causing to be published – Porn in the electronic form Strict punishment – 5 years jail (SI or RI) + 1 lakh fine – 10 years jail (SI or RI) + 2 lakh fine

Baazee case

Obscene MMS clipping listed for sale on 27 th November, “DPS Girl having fun". Some copies sold through Baazee.com Avnish Bajaj (CEO) arrested and his bail application was rejected by the trial court.

Points of the prosecution The accused did not stop payment through banking channels after learning of the illegal nature of the transaction. The item description "DPS Girl having fun" should have raised an alarm.

Points of the defence Section 67 relates to publication of obscene material and not transmission. Remedial steps were taken within 38 hours, since the intervening period was a weekend.

Findings of the Court It has not been established from the evidence that any publication took place by the accused, directly or indirectly. The actual obscene recording/clip could not be viewed on the portal of Baazee.com. The sale consideration was not routed through the accused.

Findings of the Court Prima facie Baazee.com had endeavored to plug the loophole. The accused had actively participated in the investigations. The nature of the alleged offence is such that the evidence has already crystallized and may even be tamper proof.

Findings of the Court Even though the accused is a foreign citizen, he is of Indian origin with family roots in India. The evidence indicates – only that the obscene material may have been unwittingly offered for sale on the website. – the heinous nature of the alleged crime may be attributable to some other person.

Court order The court granted bail to Mr. Bajaj subject to furnishing two sureties of Rs. 1 lakh each. The court ordered Mr. Bajaj to – surrender his passport – not to leave India without Court permission – to participate and assist in the investigation.

Protected Systems

Gazette notification for declaring protected system. Government order authorizing persons to access protected systems. 10 years jail for accessing or attempting to access protected systems.

Firos vs. State of Kerala Govt of Kerala declared the FRIENDS application software as a protected system. The author of the application software challenged the notification and the constitutional validity of section 70. The Court upheld the validity of both

Tampering with source code

Computer source code need not only be in the electronic form. It can be printed on paper (e.g. printouts of flowcharts for designing a software application).

Tampering with source code Following are punishable with 3 years jail and / or 2 lakh fine: – Concealing – Altering – Destroying

Syed Asifuddin case Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65.

Digital Evidence

Parliament attack case Several terrorists attacked Parliament House on 13-Dec-01 Digital evidence played an important role during their prosecution. The accused had argued that computers and digital evidence can easily be tampered and hence should not be relied upon.

Parliament attack case A laptop, several smart media storage disks and devices were recovered from a truck intercepted at Srinagar pursuant to information given by two of the suspects. These articles were deposited in the police “malkhana” on 16-Dec-01 but some files were written onto the laptop on 21-Dec-01.

Parliament attack case Evidence found on the laptop included: – fake identity cards, – video files containing clippings of political leaders with Parliament in background shot from TV news channels, – scanned images of front and rear of a genuine identity card,

Parliament attack case – image file of design of Ministry of Home Affairs car sticker, – the game 'wolf pack' with the user name 'Ashiq'. Ashiq was the name in one of the fake identity cards used by the terrorists.

Parliament attack case No forensic backup was taken. Court held that: – Challenges to the accuracy of computer evidence should be established by the challenger. – Mere theoretical and generic doubts cannot be cast on the evidence.

General Overview

General overview Information Technology Act Filing complaints Power of the police (search, arrest etc) Hacking

General overview Malicious code DOS attacks Piracy

Rohas Nagpal President Asian School of Cyber Laws rohasnagpal.com