SlideShare a Scribd company logo
PRESENTATION ON
CYBER LAWS
INTRODUCTION
Cyber law is a term which refers
to all the legal and regulatory
aspects of Internet and the
World Wide Web. Anything
concerned with or related to,
or emanating from, any legal
aspects or issues concerning
any activity of netizens and
others, in Cyberspace comes
within the ambit of Cyber law.
NEED FOR CYBER LAWS
 Security of Information
 Security of Government Data
 Intellectual Property Rights
 Privacy and Confidentially of
Information
 Legal Status of
Online Transaction
IT ACT PASSED IN 2000
• Enacted on 17th May 2000
by the central government.
• India is 12th nation in the
world to adopt cyber laws.
• Information Technology
Act2000 consisted of 94
sections segregated into13
chapters.
• 4 schedules form part of the
Act.
SALIENT FEATURES OF THE
ACT
The information technology act 2000 is a
technology intensive act in the sense that it talks
about the use of digital signature to authenticate
electronic records. It is based on UNCITRAL’s
model law on e-commerce which adopts
functional equivalent approach, that accepts
digital signature as an authentication standard.
DIGITAL SIGNATURES
ELECTRONIC GOVERNANCE
It is a kind of window of opportunity facilitating a
much faster, convenient, transparent interaction
between the government and its people. It involves
information technology enabled initiatives that are
used for improving
• e-services
• e-administration
• e-society
ATTRIBUTION, ACKNOWLEDGEMENT
AND DISPATCH OF ELECTRONIC
RECORDS
The information Technology Act,2000 has not
amended the Indian contract act,1872 in any
manner whatsoever. In order to form a valid
electronic contract one still needs a promisor or a
promisee. The act grants legal recognition to
communication process involving computer,
computer system and computer network by
identifying, attribution, acknowledgement and
dispatch of electronic records as key statutory
provisions.
DIGITAL SIGNATURE
CERTIFICATES
It is an important instrument of trust identifying
the subscriber over the networks . It creats a
‘binding linkage’ between the subscriber and the
issuer. ‘binding policies’ are needed for the same.
The policies must define the level of trust of
relying party shall put forth in the issuer’s overall
certificate issuance and management process.
DUTIES OF SUBSCRIBERS
The word ‘subscriber’ denotes a person who has
paid subscription amount to avail some kind of
service. A subscriber is in a way a customer or a
buyer. He is a customer with a difference as he
usually pays for a service in advance.
SECURE ELECTRONIC
RECORDS AND SECURE
DIGITAL SIGNATURES
• Information is a valuable commodity. It needs
to be confidential, secure and retains its
integrity. Only a secured system leads to secure
transactions. From the user’s perspective, the act
concerns with the application of security
procedures at the user’s level. The aim is to
protect the communication and not the medium.
IT ACT PROVISIONS
• email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
• Companies shall now be able to carry out
electronic commerce using the legal infrastructure
provided by the Act.
• Digital signatures have been given legal validity
and sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
notification on the web thus heralding e-
governance
• Statutory remedy in case if anyone breaks
into companies computer systems or
network and causes damages or copies data
AMENDMENTS
The major amendment provided that though
cheque is a negotiable instrument yet the
provisions of act would apply to it.
The main focus of new amendments is on
cyber security.
The words digital signature has been replaced
by the words electronic signature.
CYBER CRIMES
It is an illegal act that involves a computer,
computer system or computer network, i.e any
illegal act for which knowledge of computer
technology is essential for its perpetration,
investigation or prosecution.
Cyber crime is divided into 2 groups
Crime where Accused is
computer victim is a
computer.
Crime where computer
becomes a part of
evidence for the crime
that has taken place.
OFFENCES AND LAWS IN
CYBER SPACE
• TAMPERING WITH
COMPUTER
DOCUMENTS
• HACKING WITH
COMPUTER SYSTEM
• PUBLISHING OBSCENE
MATERIAL ON
INTERNET
• BREACHING OF
CONFIDENTIALITY
AND PRIVACY
CONCLUSION
• CYBER LAWS_ ESSENTIAL FEATURE
IN TODAYS WORLD OF INTERNET
• ACHIEVING GLOBAL PEACE AND
HARMONY
THANK YOU

More Related Content

PPTX
PPTX
Introduction to Cyber Crimes
PPTX
introduction to cyber law and cyber crime
PPTX
PPTX
PPTX
cyber crime & cyber law
PPTX
Cyber crimes in the digital age
PPTX
Cyber laws in India
Introduction to Cyber Crimes
introduction to cyber law and cyber crime
cyber crime & cyber law
Cyber crimes in the digital age
Cyber laws in India

What's hot (20)

PPSX
Cyber Laws
PPTX
Cyber fraud
PPTX
E contract
PPT
It act law ppt
PPT
Cyberlaw An Overview
PPTX
Cyber law
PPTX
Cyber crime
PPTX
Information technology act
PPTX
Information technology act 2000
PPTX
Cyber law In India: its need & importance
PPTX
Information technology act 2000
PPT
Cyber Crime and Prevention Tips
PPTX
Digital signatures
PPTX
Section 65 – Tampering with computer Source Documents.pptx
PPTX
IT act 2008
PPTX
Cyber crime
PPTX
Right to privacy on internet and Data Protection
PPTX
It act 2000
PPTX
Cyber Law in India.pptx
PPTX
Cyber crime ppt
Cyber Laws
Cyber fraud
E contract
It act law ppt
Cyberlaw An Overview
Cyber law
Cyber crime
Information technology act
Information technology act 2000
Cyber law In India: its need & importance
Information technology act 2000
Cyber Crime and Prevention Tips
Digital signatures
Section 65 – Tampering with computer Source Documents.pptx
IT act 2008
Cyber crime
Right to privacy on internet and Data Protection
It act 2000
Cyber Law in India.pptx
Cyber crime ppt
Ad

Viewers also liked (7)

PPT
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
PPT
Ip addressing
PPT
Need And Importance Of Cyber Law
PPTX
An Introduction to Cyber Law - I.T. Act 2000 (India)
PPS
Ip address
PPTX
Internet protocol (ip) ppt
PPT
Slideshare Powerpoint presentation
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
Ip addressing
Need And Importance Of Cyber Law
An Introduction to Cyber Law - I.T. Act 2000 (India)
Ip address
Internet protocol (ip) ppt
Slideshare Powerpoint presentation
Ad

Similar to Cyber law final (20)

PPTX
Cyber law – it act 2000,it act 2008
PPTX
Cyber Law and IT act.pptx
PDF
Assignment edu 03
PPT
Introduction to cyber law.
PPTX
The Indian IT act.pptx
PPT
The Cyber Law regime in India.ppt
PPT
The Cyber Law regime in India cyber .ppt
PPT
Cyber law final
PPTX
Introduction to cyber law.
PPTX
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
PPTX
Information technology act (SANDEEP HARISH B).pptx
PPTX
It act,2000
PPTX
Cyber Law & Crime (Information Technology Act, 2000)
PDF
Cyber Security
PPTX
The Cyber Law Regime in India
PDF
Cyber law-it-act-2000
PPTX
law.pptx
PPTX
IT Act 2000
PPTX
Cyber law for suresh
Cyber law – it act 2000,it act 2008
Cyber Law and IT act.pptx
Assignment edu 03
Introduction to cyber law.
The Indian IT act.pptx
The Cyber Law regime in India.ppt
The Cyber Law regime in India cyber .ppt
Cyber law final
Introduction to cyber law.
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
Information technology act (SANDEEP HARISH B).pptx
It act,2000
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Security
The Cyber Law Regime in India
Cyber law-it-act-2000
law.pptx
IT Act 2000
Cyber law for suresh

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding

Cyber law final

  • 2. INTRODUCTION Cyber law is a term which refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned with or related to, or emanating from, any legal aspects or issues concerning any activity of netizens and others, in Cyberspace comes within the ambit of Cyber law.
  • 3. NEED FOR CYBER LAWS  Security of Information  Security of Government Data  Intellectual Property Rights  Privacy and Confidentially of Information  Legal Status of Online Transaction
  • 4. IT ACT PASSED IN 2000 • Enacted on 17th May 2000 by the central government. • India is 12th nation in the world to adopt cyber laws. • Information Technology Act2000 consisted of 94 sections segregated into13 chapters. • 4 schedules form part of the Act.
  • 5. SALIENT FEATURES OF THE ACT The information technology act 2000 is a technology intensive act in the sense that it talks about the use of digital signature to authenticate electronic records. It is based on UNCITRAL’s model law on e-commerce which adopts functional equivalent approach, that accepts digital signature as an authentication standard. DIGITAL SIGNATURES
  • 6. ELECTRONIC GOVERNANCE It is a kind of window of opportunity facilitating a much faster, convenient, transparent interaction between the government and its people. It involves information technology enabled initiatives that are used for improving • e-services • e-administration • e-society
  • 7. ATTRIBUTION, ACKNOWLEDGEMENT AND DISPATCH OF ELECTRONIC RECORDS The information Technology Act,2000 has not amended the Indian contract act,1872 in any manner whatsoever. In order to form a valid electronic contract one still needs a promisor or a promisee. The act grants legal recognition to communication process involving computer, computer system and computer network by identifying, attribution, acknowledgement and dispatch of electronic records as key statutory provisions.
  • 8. DIGITAL SIGNATURE CERTIFICATES It is an important instrument of trust identifying the subscriber over the networks . It creats a ‘binding linkage’ between the subscriber and the issuer. ‘binding policies’ are needed for the same. The policies must define the level of trust of relying party shall put forth in the issuer’s overall certificate issuance and management process.
  • 9. DUTIES OF SUBSCRIBERS The word ‘subscriber’ denotes a person who has paid subscription amount to avail some kind of service. A subscriber is in a way a customer or a buyer. He is a customer with a difference as he usually pays for a service in advance.
  • 10. SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES • Information is a valuable commodity. It needs to be confidential, secure and retains its integrity. Only a secured system leads to secure transactions. From the user’s perspective, the act concerns with the application of security procedures at the user’s level. The aim is to protect the communication and not the medium.
  • 11. IT ACT PROVISIONS • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 12. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus heralding e- governance • Statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 13. AMENDMENTS The major amendment provided that though cheque is a negotiable instrument yet the provisions of act would apply to it. The main focus of new amendments is on cyber security. The words digital signature has been replaced by the words electronic signature.
  • 14. CYBER CRIMES It is an illegal act that involves a computer, computer system or computer network, i.e any illegal act for which knowledge of computer technology is essential for its perpetration, investigation or prosecution. Cyber crime is divided into 2 groups Crime where Accused is computer victim is a computer. Crime where computer becomes a part of evidence for the crime that has taken place.
  • 15. OFFENCES AND LAWS IN CYBER SPACE • TAMPERING WITH COMPUTER DOCUMENTS • HACKING WITH COMPUTER SYSTEM • PUBLISHING OBSCENE MATERIAL ON INTERNET • BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 16. CONCLUSION • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • ACHIEVING GLOBAL PEACE AND HARMONY