100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CYBER LAWS AND ETHICS £2.99
Add to cart

Presentation

CYBER LAWS AND ETHICS

 536 views  1 purchase

THIS PPT IS BASED ON CYBER LAW AND ETHICS and Cyber law is the legal issues that is, it is the standard rules and regulation (law) adopted by any government or organizations to control and minimize the computer crime and it is related to the use of inter-networked information technology. 1.  Cyb...

[Show more]

Preview 10 out of 14  pages

  • December 14, 2020
  • 14
  • 2020/2021
  • Presentation
  • Unknown
book image

Book Title:

Author(s):

  • Edition:
  • ISBN:
  • Edition:
All documents for this subject (1)
avatar-seller
mrdp
CYBER LAWS
AND THE IMPORTANCE OF CYBER LAWS

,WHAT IS CYBER LAW :

• Cyber law can be considered as a part of the overall legal
system that deals with the Internet, E-commerce, digital
contracts, electronic evidence, cyberspace, and their
respective legal issues. Cyber law covers a fairly broad area,
encompassing several subtopics including freedom of
expression, data protection, data security, digital
transactions, electronic communication, access to and usage
of the Internet, and online privacy.

,IMPORTANCE OF CYBER LAW :

• Cyber law or internet law is important because it touches almost all
aspects of transactions and activities on and involving the internet, World
Wide Web and cyberspace. Every action and reaction in cyberspace has
some legal and cyber legal perspectives.
• Such crimes may threaten a nation’s security and financial health. Issues
surrounding this type of crime has become high-profile, mainly those
surrounding cracking, copyright infringement. There are problems of
privacy when private information is lost or intercepted, lawfully or
otherwise. To ignore these threats we need cyber laws.

,OBJECTIVES OF IT ACT, 2000 :

• It is objective of I.T. Act 2000 to give legal recognition to any transaction which is done by
electronic way or use of internet.
• To give legal recognition to digital signature for accepting any agreement via computer.
• To provide facility of filling document online relating to school admission or registration in
employment exchange.
• According to I.T. Act 2000, any company can store their data in electronic storage.
• To stop computer crime and protect privacy of internet users.
• To give legal recognition for keeping books of accounts by bankers and other companies in
electronic form.
• To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime.

,THREE MAJOR CATEGORIES OF CYBER
CRIMES :

• CYBER CRIMES AGAINST PERSONS.
• CYBER CRIMES AGAINST PROPERTY.
• CYBER CRIMES AGAINST GOVERNMENT.

,CYBER CRIMES AGAINST PERSONS :

• Crimes that happen in the Cyber space against persons include
various crimes such as transmission of child-pornography, cybe
harassment, cyber stalking, cyber bullying, cyber defamation,
revenge porn, email spoofing, cracking, carding, sms spoofing,
pornography, credit card frauds, online libel / slander, cyber
smearing, trafficking, financial frauds, identity theft, etc.

,CYBER CRIMES AGAINST PROPERTY :


• Cyber crimes against property includes computer vandalism,
IPR violations, cyber squatting, typo squatting, cyber
trespass, DDOS attacks, worm attacks, hacking, transmitting
viruses, intellectual property theft, infringement, etc.

,CYBER CRIMES AGAINST GOVERNMENT :


• Cyber crimes against government are serious in nature as it
is considered as an act of war against the Sovereignty. Cyber
crimes such as cyber terrorism, cyber warfare, pirated
software, possessing of unauthorised information, hacking
into confidential military data are some of the real dangers
that Governments face these days.

,THE VARIOUS OFFENCES RELATED TO
INTERNET WHICH HAVE BEEN MADE
PUNISHABLE UNDER THE IT ACT,2000
AND THE IPC ARE ENUMERATED ON THE
NEXT THREE SLIDES

JUST TAKE A LOOK :

, 1. CYBER CRIMES UNDER THE IT ACT,
2000:

• Tampering with Computer source documents – Sec.65
• Hacking with Computer systems, Data alteration – Sec.66
• Publishing obscene information – Sec.67
• Un-authorized access to protected system -- Sec.70
• Breach of Confidentiality and Privacy – Sec.72
• Publishing false digital signature certificates – Sec.73

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller mrdp. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £2.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50843 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£2.99  1x  sold
  • (0)
Add to cart
Added