Date post: | 16-Jul-2015 |
Category: |
Internet |
Upload: | devendraameta123 |
View: | 89 times |
Download: | 0 times |
A Seminar PresntaionOn
Cyber CrimeIPC amp IT Act 2008
Presented toMr Pankaj DadheechReader CSE
Presented byDushyant Kr Marwal11ESKCS047
Contents
INTRODUCTION
HISTORY OF CYBER CRIME
TYPES OF CYBER CRIME
CYBER CRIMINALS
CATEGORIES OF CYBER CRIME
CYBER SECURITY
An dea about Cyber Crime
Crime committed using the computer and the internet to steal the personrsquos identity or illegal imports or malicious programs
Cyber Crime is nothing but where the computer is used as an object or a subject of crime
History of Cyber Crime
The first recorded cyber crime LOOM took place in the year 1820
After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)
Types of Cyber Crime
VirusWorm Attacks
Trojan Attacks
Email Bombing
Phishing
Denial of Service Attack
Web Jacking
Types of Cyber Crime(Contdhellip)
Child Pornography
Cyber Laundering
Cyber Stalking
Cyber Theft
Botnet
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Contents
INTRODUCTION
HISTORY OF CYBER CRIME
TYPES OF CYBER CRIME
CYBER CRIMINALS
CATEGORIES OF CYBER CRIME
CYBER SECURITY
An dea about Cyber Crime
Crime committed using the computer and the internet to steal the personrsquos identity or illegal imports or malicious programs
Cyber Crime is nothing but where the computer is used as an object or a subject of crime
History of Cyber Crime
The first recorded cyber crime LOOM took place in the year 1820
After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)
Types of Cyber Crime
VirusWorm Attacks
Trojan Attacks
Email Bombing
Phishing
Denial of Service Attack
Web Jacking
Types of Cyber Crime(Contdhellip)
Child Pornography
Cyber Laundering
Cyber Stalking
Cyber Theft
Botnet
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
An dea about Cyber Crime
Crime committed using the computer and the internet to steal the personrsquos identity or illegal imports or malicious programs
Cyber Crime is nothing but where the computer is used as an object or a subject of crime
History of Cyber Crime
The first recorded cyber crime LOOM took place in the year 1820
After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)
Types of Cyber Crime
VirusWorm Attacks
Trojan Attacks
Email Bombing
Phishing
Denial of Service Attack
Web Jacking
Types of Cyber Crime(Contdhellip)
Child Pornography
Cyber Laundering
Cyber Stalking
Cyber Theft
Botnet
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
History of Cyber Crime
The first recorded cyber crime LOOM took place in the year 1820
After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)
Types of Cyber Crime
VirusWorm Attacks
Trojan Attacks
Email Bombing
Phishing
Denial of Service Attack
Web Jacking
Types of Cyber Crime(Contdhellip)
Child Pornography
Cyber Laundering
Cyber Stalking
Cyber Theft
Botnet
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Types of Cyber Crime
VirusWorm Attacks
Trojan Attacks
Email Bombing
Phishing
Denial of Service Attack
Web Jacking
Types of Cyber Crime(Contdhellip)
Child Pornography
Cyber Laundering
Cyber Stalking
Cyber Theft
Botnet
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Types of Cyber Crime(Contdhellip)
Child Pornography
Cyber Laundering
Cyber Stalking
Cyber Theft
Botnet
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Cyber Criminals
Those who are doing crimes by using the computer as an target or object
o Children and adolescents between the age group of 6-18 years
o Dissatisfied employees
o Professional hackers crackers
bull Organized hackers
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Categories of Cyber Crime
Cyber crimes can be basically divided into three categories
o Cyber crimes against persons
o Cyber crimes against property
o Cyber crimes against government
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Against persons
Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters
Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Against property
Computer vandalism Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism
Transmitting virus These are programs that attach
themselves to a file and then circulate They usually affect
the data on a computer either by altering or deleting it
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Against Government
Cyber Terrorism
bull Terrorist attacks on internet is by
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks etc
bull In this terrorists are using 512 bit encryption which is
impossible to decrypt
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
How can we protect it
Keep Software up to Date If the seller releases patches for the
software operating your device install them as soon as possible
Use Good Passwords Select passwords that are difficult to guess Do
not options that allows your computer to remember the password
Disable Remote Connectivity Some PDArsquos amp Phones are equipped
with wireless technologies such as Bluetooth You should disable
these features when they are not in use
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Intellectual Property Right
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Contents
Introduction
Importance of IPR
Forms of IPR
Patent
Copyright
Trademark
Laws in india
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
What is Intellectual Property
Creation of human mind
Idea or a concept or a thought at thebeginning
Research and Development to lead the idea
The outcome of these ideas may bedevelopment of products processes anddesign etc
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Why IPR is important
bullReward original efforts
bullPrevent duplication of work
bullCommercial value in research
bullTechnical information for research amp
to prevent litigation
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Patent
Patent defined in Patents Act as ldquopatent
granted for any invention under the Actrdquo
Granted by the Government
To inventor
To prevent third parties not having his consent
from making using offering for sale (Sec 48)
For a limited period of time (20 years)
Qualified rights with duties
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Copyright Act
Objective To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to authors
and other owners of original works
Exclusive privilege to authors to reproduce
distribute perform or display their creative works
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright
What is not covered by copyright Ideas
Facts
Recipes
Names titles or short phrases
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Trademark
Word or symbol used by manufacturers to identify goods
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Types of trademark
TM - a Trade Marktrade - used before registration
SM - a Service Mark SM - used before registration
Rights by Registrationreg
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
CYBER LAWS(IT ACT 2000)
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Content
Cyber law
Need of Cyber law
Cyber Laws in India
Challenges facing law enforcement
Positive Initiatives
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Need of cyber law
Tackling cyber crime
Successful and smooth functioning of e-commerce and virtual communication
Cloud computing is proving to be a major threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act 2000
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
CYBER LAWS IN INDIA
IT act 2000 passes
Up gradation of IT act 2000-introducing IT act 2008
IPC acts
Copy right act
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
The IT ACT 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
oOffenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Contdhellip
oCivil Wrongs under IT Act
oSection 46 IT Act
oSection 65 Source Code
oSection 66 Hacking
oSec 67 Pornography
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Contdhellip
o Sec 69 Decryption of information
oSec 70 Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Information Technology Act 2008
o Information Security
oNew sections on offences
oData Protection
o Section 69 empowers the C GovS Gov
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Computer Related Crimes under IPCand Special Laws
Arms ActOnline sale of Arms
Sec 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416 417 463 IPCEmail spoofing
Sec 420 IPCBogus websites cyber frauds
Sec 463 470 471 IPCForgery of electronic records
Sec 499 500 IPCSending defamatory messages by email
Sec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
POSITIVE INITIATIVES
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging reporting of cyber crime cases
o Specialized Training
o Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
ASLU Survey published in March 2014-Incidence of Cyber crime in India
UNAUTHORISEDACCESS 19
E-MAIL ABUSE 21
DATA THEFT 33
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Conclusion
Cyber crime is indeed getting the recognition it deserves
It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law
Create yourself rather than using otherrsquos creations
Technological advancement made the job of the CREATOR easy
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Copyright Law of the USA Chapter 1 Section 121
Schechter Roger E and John R Thomas Intellectual Property The Law of
Copyrights Patents and Trademarks
Trend micro incorporated research paper
A TO Z OF Cyber Crime By Aayushi shah
Computer Security Policy Guidebook(WILEY publication)
Moore R (2005) Cyber crime Investigating High-Technology Computer Crime
Anderson Publishing
Refrences
Thank youhellip
Thank youhellip