+ All Categories
Home > Documents > cyberlawcomp-121130031942-phpapp01

cyberlawcomp-121130031942-phpapp01

Date post: 03-Apr-2018
Category:
Upload: shruti-vadher
View: 214 times
Download: 0 times
Share this document with a friend

of 35

Transcript
  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    1/35

    A PRESENTATION

    BY

    PAVAN DUGGAL,

    ADVOCATE, SUPREME COURT OF

    INDIAPRESIDENT,CYBERLAW ASIA

    CYBERLAW CONSULTANT,

    MEMBER, MAC, ICANNNIRC-ICAI SEMINAR

    1-4-2006 , DELHI

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    2/35

    CYBERCRIMES

    AND

    DUE DILIGENCE

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    3/35

    CYBERCRIMES GALORE

    ARIF AZIM CASE

    Juvenile found guilty for sending threateningemail

    SHEKHAR VERMA CASE

    Juvenile Found guilty for sending thretingemail

    MANY MANY MORE THAT OCCUR BUT

    ARE NEVER REPORTED

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    4/35

    GROSS UNDER

    REPORTINGFOR EVERY 500 INSTANCES OF

    CYBERCRIMES THAT OCCUR IN

    INDIA,

    ONLY 50 ARE REPORTED AND

    OUT OF THE SAME, ONLY ONE CASE

    GETS REGISTERED BY THE POLICE.

    UNDER REPORTING DOES NOT

    EQUAL TO ABSENCE OF CYBERCRIME

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    5/35

    CYBERCRIME

    DEFINITIONCybercrime refers to all the activities done

    with criminal intent in cyberspace or using

    the medium of Internet.

    These could be either the criminal activities

    in the conventional sense or may be activities

    newly evolved with the growth of the newmedium.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    6/35

    CYBERCRIME IMPACT ON

    IT Cybercrime adversely impacts various activities in

    the electronic medium using computers, computersystems and computer networks

    Effect is not just destruction or adverse impact ondata.

    Cybercrimes also have the ability to disrupt or

    damage computers, computer systems andcomputer networks as also data or informationresident therein

    Cybercrimes directly inhibit e-commerce and the

    free use of the Internet and computers.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    7/35

    CYBERCRIME

    CATEGORIES

    Cybercrimes can be basically

    divided into 3 major categoriesbeing Cybercrimes

    against persons

    against property against Government

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    8/35

    STATISTICS

    The Asian School of Cyberlaws

    Computer Crime and Abuse Report

    (India) 2001-02 reports that Data Theft at33% makes up largest category of

    reported incidents of Cybercrime.

    Of this 37% of data stolen is theSource/Object Code.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    9/35

    INFORMATION

    TECHNOLOGY ACT, 2000 &

    CYBERCRIME

    Various cyber offences defined

    Cyber offences to be investigated only by

    a Police Officer not below the rank of the

    Deputy Superintendent of Police.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    10/35

    CYBER OFFENCES UNDER

    THE IT ACT

    Tampering with computer source

    documentsSection 65 Hacking - Section 66

    Publishing of information which is

    obscene in electronic form - Section 67

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    11/35

    SECTION 65

    Tampering with computer source documents

    Knowingly or intentionally concealing,

    destroying or altering or intentionally orknowingly causing another to conceal, destroy

    or alter any computer source code used for

    computer, computer programme, computer

    system or computer network, when thecomputer source code is required to be kept or

    maintained by law for the time being in force

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    12/35

    PUNISHMENT FOR

    TAMPERING COMPUTERSOURCE DOCUMENTS

    Imprisonment up to three years, or withfine which may extend up to two lakh

    rupees, or with both.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    13/35

    SECTION 66

    Hacking with computer system

    Occurs when there is intent to cause or

    knowledge that one is likely to cause wrongfulloss or damage to the public or any person by

    destroying or deleting or altering any

    information residing in a computer resource or

    diminishing its value or utility or affecting itinjuriously by any means

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    14/35

    PUNISHMENT FOR

    HACKING

    Imprisonment up to three years, or withfine which may extend upto two lakh

    rupees, or with both.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    15/35

    SECTION 67

    Publishing of information which is obscene inelectronic form

    Publishing or transmitting or causing to bepublished in the electronic form, any materialwhich is lascivious or appeals to the prurientinterest or if its effect is such as to tend todeprave and corrupt persons who are likely,having regard to all relevant circumstances, toread, see or hear the matter contained orembodied in it

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    16/35

    PUNISHMENT FOR

    PUBLISHING OBSCENEINFORMATION IN

    ELECTRONIC FORM On first conviction - imprisonment of either

    description for a term which may extend to fiveyears and with fine which may extend to one

    lakh rupees Second or subsequent conviction -

    imprisonment of either description for a termwhich may extend to ten years and also with

    fine which may extend to two lakh rupees.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    17/35

    CYBER OFFENCES UNDER

    THE IT ACT (contd)

    Breach of confidentiality and privacy Misrepresentation

    Publishing Digital Signature Certificate

    false in certain particulars and publicationfor fraudulent purposes.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    18/35

    NEW MANIFESTATIONS

    NEW FORMS AND

    MANIFESTATIONS OF

    CYBERCRIMES EMERGINGEVERYDAY.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    19/35

    IT ACT DEFICIENT

    The offences defines in the IT Act are by

    no means exhaustive.

    However, the drafting of the relevantprovisions of the IT Act make it appear as

    if the offences detailed in the said IT Act

    are the only Cyber offences possible andexisting.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    20/35

    NEED FOR

    INGENUITY

    Just as human mind is ingenious enough to

    devise new ways for perpetuating crime,

    similarly, human ingenuity needs to be

    channelised into developing effective legal and

    regulatory mechanisms to control and preventCybercrimes.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    21/35

    BREACH OF SECURITY

    Breach of security attracts consequences of civilliability.

    If a person without the permission of owner orany other person in charge of a computer,computer system or computer network, accessesor secures access to such computer, computersystem or computer network, he is liable to pay

    statutory damages by way of compensation, notexceeding one crore rupees to the person soaffected.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    22/35

    CIVIL LIABILITY

    Downloading, copying or extracting any data,

    computer database or information from such

    system or introducing any computer virus into

    the same or damaging, destructing or causingto be damaged or disruption of the same or

    denying the access to any authorized person

    of the same, and providing any assistance to

    any person for doing any of the acts mentioned

    above, would also attract the civil liability of

    damages by way of compensation not

    exceeding rupees one crore.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    23/35

    BREACH OF

    SECURITY (contd.)

    Breach of security is also implicitly

    recognized as a penal offence in the form

    of hacking.

    This offence is declared as a penal

    offence punishable with three years

    imprisonment and two lakh rupees fine.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    24/35

    INVESTIGATION

    For the purpose of investigating the

    offences detailed under the IT Act, 2000,

    police officers not below the rank ofDeputy Superintendent of Police have

    been duly authorized and who have also

    been given the power of entry, search andarrest without warrant in public places.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    25/35

    Section 79

    For the removal of doubts, it is hereby declaredthat no person providing any service as anetwork service provider shall be liable under

    this Act, rules or regulations made thereunderfor any third party information or data madeavailable by him if he proves that the offence orcontravention was committed without his

    knowledge or that he had exercised all duediligence to prevent the commission of suchoffence or contravention.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    26/35

    Network Service Providers:

    When Not Liable Explanation.For the purposes of this section,

    (a)"network service provider" means anintermediary;

    (b)"third party information" means any

    information dealt with by a network serviceprovider in his capacity as an intermediary.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    27/35

    OFFENCES BY

    COMPANIESWhere a person committing a contravention of

    any of the provisions of this Act or of any rule,

    direction or order made thereunder is a

    company, every person who, at the time thecontravention was committed, was in charge of,

    and was responsible to, the company for the

    conduct of business of the company as well asthe company, shall be guilty of the

    contravention and shall be liable to be

    proceeded against and punished accordingly:

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    28/35

    OFFENCES BY

    COMPANIES(contd)

    Provided that nothing contained in this

    sub-section shall render any such person

    liable to punishment if he proves that the

    contravention took place without his

    knowledge or that he exercised all due

    diligence to prevent such contravention.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    29/35

    CLAUSE 49, SEBI

    FOR LISTED COMPANIES

    CERTIFICATIONS BY CEO AND THE

    COMPLAINCE OFFICER CERTIFICATION OF DATA ,

    INFORMATION, COMPUTERS,

    COMPUTER SYSTEMS AND COMPUTER

    NETWORKS

    NEED FOR CYBER LEGAL DUE

    DILIGENCE

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    30/35

    DUE DILIGENCE

    Compliance with IT Act, IT Rules, notifications

    etc.

    Compliance with Indian Evidence Act.

    Information Technology Security Policy

    Legal Authentication of E- records.

    Retention of E-records as per law.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    31/35

    CONCLUSION

    Techno-Legal Risks in todays Business

    Environment.

    Need to have a systematic plan for to measure

    risk of exposure to the same.

    Due Diligence and Compliance only mantra of

    survival in todays E- world.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    32/35

    PDA DUE DILIGENCE VER 1.

    PAVAN DUGGAL ASSOCIATES

    PAVAN DUGGAL DUE DILIGENCE

    VERSION 1.

    33 PARAMETERS, COMPLIANCE WITH

    THE IT ACT, 2000

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    33/35

    CONCLUSION(contd)

    Limiting your liability for criminal activities

    done on your computers, computers and

    computer networks by others is absolutely

    essential lest we face some unpleasant

    situations.

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    34/35

    CONCLUSION(contd)

    CYBERLAW AUDIT OF YOUR OPERATIONS

    USING COMPUTERS, COMPTUER SYSTEMS

    AND COMPUTER NETWORKS CRITICAL FOR

    YOUR CONTINUED GROWTH.

    PAVAN DUGGAL ASSOCIATES UNDERTAKES

    CYBERLAW AUDITS FOR CLIENTS FOR

    LIMITING THEIR LIABILITY

  • 7/28/2019 cyberlawcomp-121130031942-phpapp01

    35/35

    THAT WAS A PRESENTATION

    BYPAVAN DUGGAL,

    ADVOCATE, SUPREME COURT OF

    INDIAHEAD, PAVAN DUGGAL

    ASSOCIATES,

    PRESIDENT,CYBERLAWS.NETEMAIL :[email protected]

    [email protected]


Recommended