Download - Sajish Cybr Laws
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 1/14
10/14/2010 Cyber Law 1
CYBER LAWS
SAJISH V.S.
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 2/14
10/14/2010 Cyber Law 2
HierarchyHierarchyLaw
I.P.C.: Indian
PenalCode
Cr.P.C: Criminal
ProcedureCourt
Evidence Act
I.T. Act 2000
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 3/14
Laws relating to computer,internet and
e-commerce
Mr.Pavan Duggal,President CYBER LAW-India
10/14/2010 Cyber Law 3
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 4/14
IT Amendment ActsIT Amendment Acts
The Information Technology Act, 2000 is t he Mot herLegislation t hat deals wit h issues related to use of
computers, computer systems , computer networks andt he Internet.
Information Technology Amendment Bill, 2006
Information technology amendment act, 2008
10/14/2010 Cyber Law 4
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 5/14
ContdContd««
TheThe newnew amendmentsamendments havehave addedadded identityidentity t heft t heft
andand phishingphishing asas cybercrimescybercrimes ..
HaveHave alsoalso coveredcovered breachbreach of of privacy,privacy,
childchild pornographypornography asas specificspecific offencesoffences
10/14/2010 Cyber Law 5
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 6/14
Off encesOff ences
Offence under IT ActsOffence under IT Acts
Tampering wit h Computer source documentsTampering wit h Computer source documents
Hacking wit h Computer systems, Data alterationHacking wit h Computer systems, Data alteration
Publishing obscene informationPublishing obscene information
UnUn--aut horisedaut horised access to protected systemaccess to protected system
Breach of Confidentiality and PrivacyBreach of Confidentiality and Privacy
Publishing false digital signature certificatesPublishing false digital signature certificates
10/14/2010 Cyber Law 6
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 7/14
10/14/2010 Cyber Law 7
Sections in Law & PenaltiesSections in Law & Penalties
Section 43Section 43:: of t he act reads: If any person wit hout permission of
t he owner
a) ACCESS to such computer
b)
DO
WNLO AD, C
OPIES, or EX
TRAC
TS any data from suc
hcomputer
c) Introduces COMPUTER VIRUS so as to contaminate t he system
d) DAMAGES such computer network
e) CAUSES DISRUPTION to such computer system
f) DENY t he user to access
g) CHANGES ACCOUNT SETTINGS
Punishment:Punishment:
He shall be liable to pay damages by t he way of compensationHe shall be liable to pay damages by t he way of compensation
not exceedingnot exceeding One crore to person soto person so affected..
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 8/14
10/14/2010 Cyber Law 8
Section 66Section 66
Hacking wit h Computer SystemHacking wit h Computer System
(1) If Information residing in a computer resources get :(1) If Information residing in a computer resources get : DestroyedDestroyed
DeletedDeleted
Altered Altered Diminished in value or utilityDiminished in value or utility
Affected Injuriously Affected Injuriously
Punishment Punishment::3 yrs. Or Fine up to 23 yrs. Or Fine up to 2 laclac for hacking.for hacking.
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 9/14
10/14/2010 Cyber Law 9
Section 67Section 67
Section 67 of t he Act reads: Whoever publishes orSection 67 of t he Act reads: Whoever publishes ortransmitted in t he electronic form any material which transmitted in t he electronic form any material which contains sexually explicit acts or conduct :contains sexually explicit acts or conduct :
Fine of tenFine of ten lakhlakh rupees as punishment on first rupees as punishment on first convictionconviction
In t he event of second or subsequent convictionIn t he event of second or subsequent conviction
Imprisonment of eit her description for a term which mayImprisonment of eit her description for a term which may
extend to seven years and also wit h
fine wh
ich
mayextend to seven years and also wit h
fine wh
ich
mayextend to tenextend to ten lakhlakh rupees.rupees.
If t he same t hing is repeated imprisonment of 10 yrs.
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 10/14
10/14/2010 Cyber Law 10
Section 65Section 65
Tampering wit h computer source document:
Punishment:
Offences are punishable wit h imprisonment upto 3 yrs. And / or fine up to Rs. 2 lakh
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 11/14
10/14/2010 Cyber Law 11
Section 69Section 69
Deals wit h t he Interception, monitoring orDeals wit h t he Interception, monitoring ordecryption of any information in t he interest of decryption of any information in t he interest of t he sovereignty, integrity, Security or defense of t he sovereignty, integrity, Security or defense of
India, friendly relations wit h t he foreign statesIndia, friendly relations wit h t he foreign statesetc.etc.
Punishment:Punishment:
22 lakhlakh and /or jail not exceeding 5 yrsand /or jail not exceeding 5 yrs..
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 12/14
10/14/2010 Cyber Law 12
Some other Sections«Some other Sections«
Section 72Section 72:: Violation of t he Violation of t he privacy policyprivacy policy------FineFineup to 5up to 5 lakhlakh, jail not extending 2 yrs., jail not extending 2 yrs.
Section 502ASection 502A:: Publishing, Transmitting images Publishing, Transmitting images
of t heof t he private areaprivate area of a person wit hout his or herof a person wit hout his or herconsentconsent------2yrs./22yrs./2 lakhlakh..
Section 419 ASection 419 A:: Cheating by any communication Cheating by any communication
device or computer resourcedevice or computer resource ------ 5yrs.5yrs.
Section 417ASection 417A:: Identity Theft Identity Theft------ 2yrs.2yrs.
8/8/2019 Sajish Cybr Laws
http://slidepdf.com/reader/full/sajish-cybr-laws 13/14
ConclusionsConclusions
TheThe newnew amendmentsamendments havehave strengt henedstrengt hened t het he handshands of of t het he nationnation byby increasingincreasing t het he reachreach of of t het he powerspowers of of interceptioninterception of of t het he Government Government..
GenerateGenerate awarenessawareness && orientationorientation about about t het he compliancecompliancerequirementsrequirements of of IndianIndian CyberCyber LawLaw
SensitizeSensitize peoplepeople about about ::
The
The levellevel of of compliancescompliances of of t
heirt heir respectiverespectiveorganizationsorganizations pertainingpertaining toto IndianIndian CyberCyber LawLaw..
10/14/2010 Cyber Law 13