+ All Categories

it act

Date post: 16-Jul-2015
Category:
Upload: devendraameta123
View: 89 times
Download: 0 times
Share this document with a friend
Popular Tags:
39
A Seminar Presntaion On Cyber Crime,IPC & IT Act 2008 Presented to: Mr. Pankaj Dadheech Reader, CSE Presented by: Dushyant Kr Marwal 11ESKCS047
Transcript
Page 1: it act

A Seminar PresntaionOn

Cyber CrimeIPC amp IT Act 2008

Presented toMr Pankaj DadheechReader CSE

Presented byDushyant Kr Marwal11ESKCS047

Contents

INTRODUCTION

HISTORY OF CYBER CRIME

TYPES OF CYBER CRIME

CYBER CRIMINALS

CATEGORIES OF CYBER CRIME

CYBER SECURITY

An dea about Cyber Crime

Crime committed using the computer and the internet to steal the personrsquos identity or illegal imports or malicious programs

Cyber Crime is nothing but where the computer is used as an object or a subject of crime

History of Cyber Crime

The first recorded cyber crime LOOM took place in the year 1820

After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)

Types of Cyber Crime

VirusWorm Attacks

Trojan Attacks

Email Bombing

Phishing

Denial of Service Attack

Web Jacking

Types of Cyber Crime(Contdhellip)

Child Pornography

Cyber Laundering

Cyber Stalking

Cyber Theft

Botnet

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 2: it act

Contents

INTRODUCTION

HISTORY OF CYBER CRIME

TYPES OF CYBER CRIME

CYBER CRIMINALS

CATEGORIES OF CYBER CRIME

CYBER SECURITY

An dea about Cyber Crime

Crime committed using the computer and the internet to steal the personrsquos identity or illegal imports or malicious programs

Cyber Crime is nothing but where the computer is used as an object or a subject of crime

History of Cyber Crime

The first recorded cyber crime LOOM took place in the year 1820

After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)

Types of Cyber Crime

VirusWorm Attacks

Trojan Attacks

Email Bombing

Phishing

Denial of Service Attack

Web Jacking

Types of Cyber Crime(Contdhellip)

Child Pornography

Cyber Laundering

Cyber Stalking

Cyber Theft

Botnet

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 3: it act

An dea about Cyber Crime

Crime committed using the computer and the internet to steal the personrsquos identity or illegal imports or malicious programs

Cyber Crime is nothing but where the computer is used as an object or a subject of crime

History of Cyber Crime

The first recorded cyber crime LOOM took place in the year 1820

After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)

Types of Cyber Crime

VirusWorm Attacks

Trojan Attacks

Email Bombing

Phishing

Denial of Service Attack

Web Jacking

Types of Cyber Crime(Contdhellip)

Child Pornography

Cyber Laundering

Cyber Stalking

Cyber Theft

Botnet

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 4: it act

History of Cyber Crime

The first recorded cyber crime LOOM took place in the year 1820

After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network)

Types of Cyber Crime

VirusWorm Attacks

Trojan Attacks

Email Bombing

Phishing

Denial of Service Attack

Web Jacking

Types of Cyber Crime(Contdhellip)

Child Pornography

Cyber Laundering

Cyber Stalking

Cyber Theft

Botnet

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 5: it act

Types of Cyber Crime

VirusWorm Attacks

Trojan Attacks

Email Bombing

Phishing

Denial of Service Attack

Web Jacking

Types of Cyber Crime(Contdhellip)

Child Pornography

Cyber Laundering

Cyber Stalking

Cyber Theft

Botnet

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 6: it act

Types of Cyber Crime(Contdhellip)

Child Pornography

Cyber Laundering

Cyber Stalking

Cyber Theft

Botnet

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 7: it act

Cyber Criminals

Those who are doing crimes by using the computer as an target or object

o Children and adolescents between the age group of 6-18 years

o Dissatisfied employees

o Professional hackers crackers

bull Organized hackers

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 8: it act

Categories of Cyber Crime

Cyber crimes can be basically divided into three categories

o Cyber crimes against persons

o Cyber crimes against property

o Cyber crimes against government

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 9: it act

Against persons

Harassment via E-mails Harassment through e-mails is not a new concept It is very similar to harassing through letters

Email Spoofing A mail which misrepresents its origin It shows itrsquos origin to be different from which actually it originates

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 10: it act

Against property

Computer vandalism Damaging or destroying data

rather than stealing or misusing them is called Computer

vandalism

Transmitting virus These are programs that attach

themselves to a file and then circulate They usually affect

the data on a computer either by altering or deleting it

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 11: it act

Against Government

Cyber Terrorism

bull Terrorist attacks on internet is by

o Distributed denial of service attacks

o Fake websites and fake emails

o Attacks on sensitive computer networks etc

bull In this terrorists are using 512 bit encryption which is

impossible to decrypt

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 12: it act

How can we protect it

Keep Software up to Date If the seller releases patches for the

software operating your device install them as soon as possible

Use Good Passwords Select passwords that are difficult to guess Do

not options that allows your computer to remember the password

Disable Remote Connectivity Some PDArsquos amp Phones are equipped

with wireless technologies such as Bluetooth You should disable

these features when they are not in use

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 13: it act

Intellectual Property Right

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 14: it act

Contents

Introduction

Importance of IPR

Forms of IPR

Patent

Copyright

Trademark

Laws in india

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 15: it act

What is Intellectual Property

Creation of human mind

Idea or a concept or a thought at thebeginning

Research and Development to lead the idea

The outcome of these ideas may bedevelopment of products processes anddesign etc

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 16: it act

Why IPR is important

bullReward original efforts

bullPrevent duplication of work

bullCommercial value in research

bullTechnical information for research amp

to prevent litigation

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 17: it act

Patent

Patent defined in Patents Act as ldquopatent

granted for any invention under the Actrdquo

Granted by the Government

To inventor

To prevent third parties not having his consent

from making using offering for sale (Sec 48)

For a limited period of time (20 years)

Qualified rights with duties

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 18: it act

Copyright Act

Objective To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to authors

and other owners of original works

Exclusive privilege to authors to reproduce

distribute perform or display their creative works

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 19: it act

FilmsLiterary Dramatic Musical Artistic

What is covered by copyright

What is not covered by copyright Ideas

Facts

Recipes

Names titles or short phrases

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 20: it act

Trademark

Word or symbol used by manufacturers to identify goods

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 21: it act

Types of trademark

TM - a Trade Marktrade - used before registration

SM - a Service Mark SM - used before registration

Rights by Registrationreg

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 22: it act

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

Color

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 23: it act

Duration of protection

YEARS RENEWABLE

Patents 20 No

Trade marks 6-10 Yes

Designs 6-10 Yes

Copyright 70 after death No

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 24: it act

CYBER LAWS(IT ACT 2000)

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 25: it act

Content

Cyber law

Need of Cyber law

Cyber Laws in India

Challenges facing law enforcement

Positive Initiatives

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 26: it act

Need of cyber law

Tackling cyber crime

Successful and smooth functioning of e-commerce and virtual communication

Cloud computing is proving to be a major threat

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 27: it act

Cyber Law

oCyber law is a term that encapsulates the legal

issues related to use of the Internet

oThe abuse of computers has also given birth to a new

age crimes that are addressed by the Information

Technology Act 2000

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 28: it act

CYBER LAWS IN INDIA

IT act 2000 passes

Up gradation of IT act 2000-introducing IT act 2008

IPC acts

Copy right act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 29: it act

The IT ACT 2000

o Legal Recognition of Electronic Documents

o Legal Recognition of Digital Signatures

oOffenses and Contraventions

o Justice Dispensation Systems for cybercrimes

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 30: it act

Contdhellip

oCivil Wrongs under IT Act

oSection 46 IT Act

oSection 65 Source Code

oSection 66 Hacking

oSec 67 Pornography

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 31: it act

Contdhellip

o Sec 69 Decryption of information

oSec 70 Protected System

oEmail spoofing

oCyber stalking

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 32: it act

Information Technology Act 2008

o Information Security

oNew sections on offences

oData Protection

o Section 69 empowers the C GovS Gov

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 33: it act

Computer Related Crimes under IPCand Special Laws

Arms ActOnline sale of Arms

Sec 383 IPCWeb -Jacking

NDPS ActOnline sale of Drugs

Sec 416 417 463 IPCEmail spoofing

Sec 420 IPCBogus websites cyber frauds

Sec 463 470 471 IPCForgery of electronic records

Sec 499 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 34: it act

Challenges facing law enforcement

oMost not trained in the technologies

o Multiple jurisdictions

o Retrofit new crimes to existing laws

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 35: it act

POSITIVE INITIATIVES

o More Cyber crime police cells set up across the country

o Websites aid in creating awareness and encouraging reporting of cyber crime cases

o Specialized Training

o Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 36: it act

ASLU Survey published in March 2014-Incidence of Cyber crime in India

UNAUTHORISEDACCESS 19

E-MAIL ABUSE 21

DATA THEFT 33

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 37: it act

Conclusion

Cyber crime is indeed getting the recognition it deserves

It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law

Create yourself rather than using otherrsquos creations

Technological advancement made the job of the CREATOR easy

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 38: it act

Copyright Law of the USA Chapter 1 Section 121

Schechter Roger E and John R Thomas Intellectual Property The Law of

Copyrights Patents and Trademarks

Trend micro incorporated research paper

A TO Z OF Cyber Crime By Aayushi shah

Computer Security Policy Guidebook(WILEY publication)

Moore R (2005) Cyber crime Investigating High-Technology Computer Crime

Anderson Publishing

Refrences

Thank youhellip

Page 39: it act

Thank youhellip


Recommended