introduction to cyber law

54
1 INTRODUCTION TO INTRODUCTION TO CYBER LAW CYBER LAW Adv. Dipak G. Parmar Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), Adv. Dip. in Cyber Law B. Com., LL. M. , C. S. (Inter), Adv. Dip. in Cyber Law Founder, Cyber-IPR Founder, Cyber-IPR 27/01/2011 Copyright Dipak G. Parmar Meant for educational purpose only

Upload: nu-the-open-security-community

Post on 02-Nov-2014

268 views

Category:

Technology


53 download

DESCRIPTION

Introduction to Cyber Law by Dipak Parmar @ null Mumbai Meet in January, 2011

TRANSCRIPT

Page 1: Introduction to Cyber Law

1

INTRODUCTION TO INTRODUCTION TO

CYBER LAWCYBER LAW

Adv. Dipak G. ParmarAdv. Dipak G. ParmarB. Com., LL. M. , C. S. (Inter), Adv. Dip. in Cyber LawB. Com., LL. M. , C. S. (Inter), Adv. Dip. in Cyber Law

Founder, Cyber-IPRFounder, Cyber-IPR

27/01/2011

Copyright Dipak G. Parmar Meant for educational

purpose only

Page 2: Introduction to Cyber Law

INTRODUCTION

Page 3: Introduction to Cyber Law

Pre 1990: People are not connectedPre 1990: People are not connected

1990: Connecting People to Information 1990: Connecting People to Information

2000: Connecting People to People2000: Connecting People to People

2010: Everything is connected2010: Everything is connected

Page 4: Introduction to Cyber Law
Page 5: Introduction to Cyber Law
Page 6: Introduction to Cyber Law
Page 7: Introduction to Cyber Law

We are now living in e-world… dominated by numbers of “e”.

e-friend…e-music…e-network…e-ticket…e-commerce… and very soon e-service of notice in commercial matters of our supreme court.

Recently, our Supreme Court had decided to serve email notice in commercial matters in addition to the regular notice by R. P. A. D. in order to cut down the delay in the servicing notice.

In my opinion, right to life includes right to e-life.

Page 8: Introduction to Cyber Law
Page 9: Introduction to Cyber Law

Technology is growing at lightening speed. While the technology brings lot of good things, it also brings equal amount of risks and challenges.

Every day, we read in the newspapers about the various cyber crimes, like Credit card cloning, spoofing, phishing, stalking, etc.

Some of the youngsters indulge in misusing the technology and get caught by the Police Authorities.

Page 10: Introduction to Cyber Law

A recent study revealed that 80 percent of the cyber crimes in the Corporate Houses are committed by the ‘insiders’.

More than 95 percent of the cases do not get reported to the Police Authorities.

Only 3% of cyber crime complaints filed in Mumbai are being converted in FIR.

Page 11: Introduction to Cyber Law

CYBERSPACE

Page 12: Introduction to Cyber Law

Cyberspace is the electronic medium of computer networks, in which online communication takes place.

It is readily identified with the interconnected information technology required to achieve the wide range of system capabilities associated with the transport of communication and control products and services.

The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson.

Page 13: Introduction to Cyber Law

Now, the term has become a conventional means to describe anything associated with computers, information technology, the internet and the diverse internet culture.

Cyberspace includes Cyberspace includes ◦ The Internet, websites The Internet, websites ◦ computers, networkscomputers, networks◦ software, data storage devices, emails software, data storage devices, emails ◦ electronic devices (cell phones, ATM machines etc)electronic devices (cell phones, ATM machines etc)

Cyber Law governs cyberspaceCyber Law governs cyberspace

Page 14: Introduction to Cyber Law

Cyber space is an intangible and provides Cyber space is an intangible and provides an extreme mobilityan extreme mobility◦ events taking place on the internet are not happening events taking place on the internet are not happening

in the locations where participants or servers are in the locations where participants or servers are physically located, but "in cyberspace". physically located, but "in cyberspace".

Cyber space offers great economic Cyber space offers great economic efficiency.efficiency.◦ Billions of dollars worth of software can be traded over

the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.

Page 15: Introduction to Cyber Law

Cyber space has Complete disrespect for Cyber space has Complete disrespect for national boundaries.national boundaries.◦ A person in India could break into a bank’s electronic

vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone.

Page 16: Introduction to Cyber Law

Cyber space is absolutely open to Cyber space is absolutely open to participation by all.participation by all.◦ A ten year-old to an eighty year-old grand mother

without any regard for the distance or the anonymity between them.

Page 17: Introduction to Cyber Law
Page 18: Introduction to Cyber Law

Cyber space offers enormous potential for Cyber space offers enormous potential for anonymity to its members.anonymity to its members.◦ "On the Internet, nobody knows you're a dog" is an

adage which began as the caption of a cartoon by Peter Steiner published by The New Yorker on July 5, 1993.

◦ The cartoon features two dogs: one sitting on a chair in front of a computer, speaking the caption to a second dog sitting on the floor.

◦ http://www.unc.edu/depts/jomc/academics/dri/idog.html

Page 19: Introduction to Cyber Law

On the Internet, it is very easier to create On the Internet, it is very easier to create several copies and transmitting the same in several copies and transmitting the same in different locations of world in few minutes. For different locations of world in few minutes. For these reasons, the Internet has been described these reasons, the Internet has been described as “the world’s biggest copy machine”. as “the world’s biggest copy machine”.

“ “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).

Page 20: Introduction to Cyber Law

The IT Act gives legal recognition to electronic records and digital and electronic signature.

Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of electronic/digital signature affixed in such manner as may be prescribed by the Central Government.

Use of Electronic Records and Electronic Signature in Government and its agencies

Page 21: Introduction to Cyber Law

Penalty, Compensation and

Offences

Page 22: Introduction to Cyber Law

22

If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network -◦(a) to (j)

Then he shall be liable to pay unlimited damages to affected the person.

Page 23: Introduction to Cyber Law

If any person, dishonestly or fraudulently, does any act referred to in section 43,

Punishment: Jailed upto three years and/or fine upto five lakh rupees.

Dishonestly- the intention of causing wrongful gain to one person or wrongful loss to another person

Fraudulently – the intention to defraud but not otherwise

Page 24: Introduction to Cyber Law

If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network -

◦(a) accesses or secures access to such computer, computer system or computer network or computer resource

Page 25: Introduction to Cyber Law

Access means Gaining entry into, Instructing with the logical, arithmetical, or

memory function resources of Communicating with the logical,

arithmetical, or memory function resources of

a computer, computer system or computer network (widely defined to cover every with a computer chip)

Page 26: Introduction to Cyber Law

Access means Gaining entry into a computer, computer

system or computer network (widely defined to cover

Applies to physical access too Examples

Unauthorized access to a room storing a server/super computers

Unscrews the cabinet of computer

Page 27: Introduction to Cyber Law

Access means Instructing or communicating with the

logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover

Instructing means giving order or directing (one way process)

Communicating means exchange of information (one way process)

Page 28: Introduction to Cyber Law

Examples (instructing or communicating )

Remotely shutting down computer by sending SMS Port scanning??

A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.

Page 29: Introduction to Cyber Law

Section 43 (a) covers access or secures access◦ Secure means to make certain

To make certain that access can be achieved as and when desired by the person seeking to access.

Example X, network administrator of ABC Limited, stores

passwords of main servers in his personal laptop. Y, a friend of X, with X permission, access X’s laptop and note down passwords of main server. Y secured access to main servers of ABC Limited.

Page 30: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -

◦(g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder,

Page 31: Introduction to Cyber Law

Assistances – is act of helping or aiding Facilitate – to make easier or to make less

difficult or to assist in the progress of…

Examples Handing over password by the existing officer Deliberately ignoring warnings of IDS Putting firewall on disable mode

Page 32: Introduction to Cyber Law

Secured access or attempts to secure access to a protected system

Punishment : jailed upto 10 years and/or fine Protected system declared by the Government

Examples: Computers of India Army, Mumbai Police, Forest Dept of Government etc.

Examples (attempts) Unsuccessful attempt to break password Unsuccessful DOS attack Unsuccessful attempt to send a Trojan

Page 33: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -

◦(b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;

Page 34: Introduction to Cyber Law

To download is to transfer information from one computer to another

To copy is to imitate or reproduce an exact replica of the original

To extract is to take out, distil, deduce, derive or quote from any source

Page 35: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -

◦(c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;

Page 36: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network –

◦(d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;

Page 37: Introduction to Cyber Law

Damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means

Examples Changing an image from .gif format to .jpg format Deleting/changing of code/URL/ excel file

Page 38: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -

◦(e) disrupts or causes disruption of any computer, computer system or computer network;

Disruption- could be total or partial To prevent the normal continuance of To throw into confusion or disorder To interupt or impede the progress of

Page 39: Introduction to Cyber Law

Examples of Disruption Spreading worms in a global network…

slowing down of the network

Switching off the wi-fi modem

Using the slow internet connection for heavy download…it is not available to other legitimate users.

Page 40: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -

◦(f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means;

◦Examples: DOS and DDOS attacks

Page 41: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -

◦(h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network,

◦Examples: internet time theft, misuse of credit card etc

Page 42: Introduction to Cyber Law

If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -◦(j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage,

Page 43: Introduction to Cyber Law

Any person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter ◦ any computer source code used for a computer,

computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force,

Punishment: jailed up to three years and/or fine up to two lakh rupees. Case-Law: Syed Asifuddin & others v/s State of A. P and

another

Page 44: Introduction to Cyber Law

Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.

Example: BPO outsourcing contract

Page 45: Introduction to Cyber Law

Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who,◦ while providing services under the terms of lawful

contract, ◦ has secured access to any material containing

personal information about another person, ◦ with the intent to cause or knowing that he is likely to

cause wrongful loss or wrongful gain ◦ discloses, without the consent of the person

concerned, or in breach of a lawful contract, such  material to any other person,

Punishment: Jailed upto three years, or/and fine upto five lakh rupees

Page 46: Introduction to Cyber Law

Any person who sends, by means of a computer resource or a communication device,-

◦a) any information that is grossly offensive or has menacing character; or

Punishment: Jailed upto three years, or/and fine

Page 47: Introduction to Cyber Law

Any person who sends, by means of a computer resource or a communication device,-◦ ◦ b) any information which he knows to be false,

but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device,

Punishment: Jailed upto three years, or/and fine

Page 48: Introduction to Cyber Law

Any person who sends, by means of a computer resource or a communication device,-

◦c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages

Punishment: Jailed upto three years, or/and fine

Examples: SPAM, spoofing

Page 49: Introduction to Cyber Law

67. Punishment for publishing or transmitting obscene material in electronic form

67 A Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form

67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form

Page 50: Introduction to Cyber Law

If any person, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, ◦ Punishment: Jailed upto three years, or/and fine

upto two lakhs “private area” means the naked or

undergarment clad genitals, pubic area, buttocks or female breast

Page 51: Introduction to Cyber Law

66 B. Punishment for dishonestly receiving stolen computer resource or communication device

66C. Punishment for identity theft 66D. Punishment for cheating by personation by

using computer resource 66F. Punishment for cyber terrorism

Page 52: Introduction to Cyber Law

Sec 75 Act to apply for offence or contraventions committed outside India by any person irrespective of his nationality.

if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.

Page 53: Introduction to Cyber Law

1.1. PReSENSE, Issue No 32 – Oct 2008 PReSENSE, Issue No 32 – Oct 2008 (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on 27-09-2009) 27-09-2009)

2.2. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009)accessed on 27-09-2009)

3.3. A False Bargain: The Los Angeles County Economic consequences of A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007)Montoya (February 2007)

4.4. ““It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).5.5. Wikipedia Wikipedia

http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-2010)(Accessed on 15-09-2010)

http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011)

1.1. presentation on Digital DNA & Digital Augmentation (how technology and new presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-(http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-5162852 Accessed on 13-09-2010)5162852 Accessed on 13-09-2010)

Page 54: Introduction to Cyber Law

Thank YouThank You

Adv. DIPAK G. PARMARAdv. DIPAK G. [email protected]@Cyber-IPR.com

0982019697109820196971