ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

How to protect yourself, your computer, and others on the internet
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 14 Crime and Justice in the New Millennium
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Unit 4 – Impact of the use of IT on Business Systems.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Mrs. Jefferson Business Information Management I.
Computer Legislation The need for computer laws Go to Contents.
“Cyber Crime in India”
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
IPR DISPUTES IN RELATION TO INFORMATION TECHNOLOGY.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
COMPUTER ETHICS AND LEGAL ISSUES
Seminar on IT ACTS Submitted By: Aditi Gupta 09ESKCS002 CS-A Submitted To: Mr. Pankaj Dadheech Dy. HoD C.S. Department.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
By: Micah Stevens Identity Theft in the World Today.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
by John Bagby and F. William McCarty
A Project on CYBER SECURITY
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
MODUS OPERANDI OF CYBER CRIME
Seminar On Cyber Crime Submitted To: Submitted By:
Cyber Crime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 13 Security and Ethical Challenges.
Georgia Law and Consequences Regarding Computer / Internet Usage for Students E. Logan Butler Attorney at Law Patterson Moore Butler, LLC
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG

FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber Crime (4) Cyber Crime - Remedies and Punishment

CYBER LAWS VIOLATIONS: IPR (a) Copyright, Trademark infringement – Internet (b) Illegal Copying, Distribution – Software (c) Trade Secret, Reverse Engineering, Patents - Software

VIOLATIONS OTHERS THAN IPR Computer/ Communication Device (i) Object/ Target (ii) Instrument to Commit – Offence (iii) Other Violations under the IT Act Civil - Chapters IX & X Offences - Chapter XI

a.S-65 Tampering with computer source documents b.S-66 Computer related offences – Virus, DoS Attack, Spyware & Adware c.S-66F Committing or conspiring to commit Cyber terrorism d.S-70 Securing or attempting to secure access to a protected system COMPUTER - OBJECT/ TARGET

PUNCH CARD

PIDGIN PART OF SOURCE CODE #include „proxy.h“ #include „signals.h“ #include „sslconn.h“ #include „sound.h“ struct PidginCore { char *ui; void *reserved;}; static PidginCoreUiOps *_ops = NULL; static PidginCore *_core = NULL;

b.S-66 Computer related offences – Virus, DoS Attack, Spyware & Adware c.S-66F Committing or conspiring to commit Cyber terrorism d.S-70 Securing or attempting to secure access a protected system COMPUTER - OBJECT/ TARGET

CRIME – USING COMPUTER OR COMMUNICATION DEVICE (i) Offence under IT Act (ii) Offences under Enactments other than IT Act Offence under IT Act (a) Of offences Affecting the Human Body/ Person (b) Of offences Affecting Decency and Morals (c) Of offences Affecting Property

(a) AFFECTING HUMAN BODY/ PERSON S-66A Punishment for sending offensive messages Spam and Spim Phishing Cyber Bullying Cyber Stalking Shreya Singhal Vs Union of India S-66E Punishment for Violation of Privacy

(b) AFFECTING DECENCY & MORALS Publishing or Transmitting in Electronic form S-67 Obscene material S-67A Sexually explicit act or conduct S-67B Child pornography – very wide Exceptions S67-67B is in Proviso to S-67B

(C) AFFECTING PROPERTY S-66B Dishonestly Receiving … knowing or reasons to believe to be stolen S-66C Identity Theft S-66D Cheating by personation using … Financial crimes/ Credit card fraud u/s 66 C & 66D Phishing u/s 66D

OFFENCES OTHER THAN IT ACT HATE CRIMES - IPC S-124A Sedition S-153A Promoting enmity between... groups … S-153B Imputations … prejudicial to national interest S-295A … to outrage religious feelings … C-XXI Defamation C-XXII Criminal Intimidation Insult & Annoyance

PETER STEINER THE NEW YORKER 15 JULY 1993