SlideShare a Scribd company logo
INTRODUCTION TO  CYBER LAW Adv. Dipak G. Parmar B. Com.,  LL. M. , C. S. (Inter),  Adv. Dip. in Cyber Law   Founder, Cyber-IPR 27/01/2011 Copyright Dipak G. Parmar  Meant for educational purpose only
INTRODUCTION
Pre 1990: People are not connected 1990: Connecting People to Information  2000: Connecting People to People 2010: Everything is connected
 
 
 
We are now living in e-world… dominated by numbers of “e”. e-friend…e-music…e-network…e-ticket…e-commerce… and very soon e-service of notice in commercial matters of our supreme court. Recently, our Supreme Court had decided to serve email notice in commercial matters in addition to the regular notice by R. P. A. D.  in order to cut down the delay in the servicing notice. In my opinion, right to life includes right to e-life.
 
Technology is growing at lightening speed. While the technology brings lot of good things, it also brings equal amount of risks and challenges.  Every day, we read in the newspapers about the various cyber crimes, like Credit card cloning, spoofing, phishing, stalking, etc.  Some of the youngsters indulge in misusing the technology and get caught by the Police Authorities.
A recent study revealed that 80 percent of the cyber crimes in the Corporate Houses are committed by the ‘insiders’.  More than 95 percent of the cases do not get reported to the Police Authorities. Only 3% of cyber crime complaints filed in Mumbai are being converted in FIR.
CYBERSPACE
Cyberspace  is the electronic medium of computer networks, in which online communication takes place. It is readily identified with the interconnected information technology required to achieve the wide range of system capabilities associated with the transport of communication and control products and services. The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson.
Now, the term has become a conventional means to describe anything associated with computers, information technology, the internet and the diverse internet culture.  Cyberspace includes  The Internet, websites  computers, networks software, data storage devices, emails  electronic devices (cell phones, ATM machines etc) Cyber Law governs cyberspace
Cyber space is an intangible and provides an extreme mobility events taking place on the internet are not happening in the locations where participants or servers are physically located, but "in cyberspace".  Cyber space offers great economic efficiency. Billions of dollars worth of software can be traded over the  Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.
Cyber space has Complete disrespect for national boundaries. A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone.
Cyber space is absolutely open to participation by all. A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
 
Cyber space offers enormous potential for anonymity to its members. "On the Internet, nobody knows you're a dog" is an adage which began as the caption of a cartoon by Peter Steiner published by The New Yorker on July 5, 1993. The cartoon features two dogs: one sitting on a chair in front of a computer, speaking the caption to a second dog sitting on the floor.  http://www.unc.edu/depts/jomc/academics/dri/idog.html
On the Internet, it is very easier to create several copies and transmitting the same in different locations of world in few minutes. For these reasons, the Internet has been described as “the world’s biggest copy machine”.  “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
The IT Act gives legal recognition to electronic records and digital and electronic signature. Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of electronic/digital signature affixed in such manner as may be prescribed by the Central Government. Use of Electronic Records and Electronic Signature in Government and its agencies
Penalty, Compensation  and Offences
If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a)  to (j) Then he shall be l iable to pay unlimited damages to affected the  person.
If any person,  dishonestly  or   fraudulently , does any act referred to in section 43,  Punishment: Jailed upto three years and/or fine upto five lakh rupees. Dishonestly-  the intention of causing wrongful gain to one person  or   wrongful loss to another person Fraudulently  – the intention to defraud but not otherwise
If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a)  accesses  or  secures access  to such computer, computer system or computer network or computer resource
Access means  Gaining entry into,  Instructing with the logical, arithmetical, or memory function resources  of Communicating with the logical,  arithmetical, or memory function resources  of  a computer, computer system or computer network (widely defined to cover every with a computer chip)
Access means  Gaining entry into a computer, computer system or computer network (widely defined to cover  Applies to physical access too Examples Unauthorized access to a room storing a server/super computers Unscrews the cabinet of computer
Access means  Instructing or communicating with the logical, arithmetical, or memory function resources  of a computer, computer system or computer network (widely defined to cover  Instructing means giving order or directing (one way process) Communicating means exchange of information (one way process)
Examples (instructing or communicating ) Remotely shutting down computer by sending SMS Port scanning?? A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.
Section 43 (a) covers  access  or  secures access Secure means to make certain To make certain that access can be achieved as and when desired by the person seeking to access.  Example X, network administrator of ABC Limited, stores passwords of main servers in his personal laptop. Y, a friend of X, with X permission, access X’s laptop and note down passwords of main server. Y secured access to  main servers of ABC Limited.
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (g) provides any  assistance  to any person to  facilitate  access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder,
Assistances – is act of helping or aiding Facilitate – to make easier or to  make less difficult or to assist in the progress of… Examples Handing over password by the existing officer Deliberately ignoring warnings of  IDS Putting firewall on disable mode
Secured access  or  attempts to secure access  to a protected system Punishment : jailed upto 10 years and/or fine Protected system declared by the Government Examples: Computers of India Army, Mumbai Police, Forest Dept of Government etc.  Examples (attempts) Unsuccessful attempt to break password Unsuccessful DOS attack Unsuccessful attempt to send a Trojan
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (b)  downloads ,  copies  or  extracts  any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;
To download is to transfer information from one computer to another To copy is to imitate or reproduce an exact replica of the original To extract is to take out, distil, deduce, derive or quote from any source
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network – (d)  damages  or  causes to be damaged  any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;
Damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means Examples Changing an image from .gif format to .jpg format Deleting/changing  of code/URL/ excel file
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (e) disrupts or causes disruption of any computer, computer system or computer network; Disruption- could be total or partial  To prevent the normal continuance of To throw into confusion or disorder To interupt or impede the progress  of
Examples of Disruption Spreading worms in a global network…slowing down of the network Switching off the wi-fi modem Using the slow internet connection for heavy download…it is not available to other legitimate users.
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; Examples: DOS and DDOS attacks
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (h) charges the services availed of by a person to the account of another person by  tampering with  or  manipulating  any computer, computer system, or computer network, Examples: internet time theft, misuse of credit card etc
If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (j)  Steals, conceals, destroys or alters  or  causes any person to steal, conceal, destroy or alter  any  computer source code  used for a computer resource with an intention to cause damage ,
Any person  knowingly or intentionally  conceals ,  destroys or alters  or  intentionally or knowingly  causes another to conceal, destroy or alter  any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force,  Punishment: jailed up to three years and/or fine up to two lakh rupees. Case-Law: Syed  Asifuddin & others v/s State of A. P and another
Where a body corporate, possessing, dealing or handling any  sensitive  personal data  or information in a computer resource which it owns, controls or operates, is  negligent  in implementing and maintaining  reasonable security practices and procedures  and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.  Example: BPO outsourcing contract
Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract,  has secured access to any  material containing personal information  about another person,  with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain  discloses,  without the consent  of the person concerned, or  in breach of a lawful contract , such  material to any other person ,  Punishment: Jailed upto  three  years, or/and fine upto five lakh rupees
Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly offensive or has menacing character; or Punishment: Jailed upto  three  years, or/and fine
Any person who sends, by means of a computer resource or a communication device,- b) any information which he knows to be  false , but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, Punishment: Jailed upto  three  years, or/and fine
Any person who sends, by means of a computer resource or a communication device,- c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages Punishment: Jailed upto  three  years, or/and fine Examples: SPAM, spoofing
67. Punishment for publishing or transmitting obscene material in electronic form 67 A Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form 67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
If any person, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person,  Punishment: Jailed upto  three  years, or/and fine upto two lakhs “ private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast
66 B. Punishment for dishonestly receiving stolen computer resource or communication device 66C. Punishment for identity theft 66D. Punishment for cheating by personation by using computer resource 66F. Punishment for cyber terrorism
Sec 75 Act to apply for offence or contraventions committed outside India by any person irrespective of his nationality. if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.
PReSENSE, Issue No 32 – Oct 2008 (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on 27-09-2009)  Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws  (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) A False Bargain: The  Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011) presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-5162852  Accessed on 13-09-2010)
Thank You Adv. DIPAK G. PARMAR [email_address] 09820196971

More Related Content

PPTX
PPTX
Introduction to Cyber Crimes
PPS
Introduction to Cyber law (IT Act 2000)
PPTX
Indian Cyber laws
PPTX
Cyber Crime
PPTX
introduction to cyber law and cyber crime
PPT
Cyber defamation
PPTX
Cyber crime, cyber law and cyber ethics
Introduction to Cyber Crimes
Introduction to Cyber law (IT Act 2000)
Indian Cyber laws
Cyber Crime
introduction to cyber law and cyber crime
Cyber defamation
Cyber crime, cyber law and cyber ethics

What's hot (20)

PPTX
Cyber law In India: its need & importance
PPTX
Information Technology Act 2000
PPTX
Cyber law
PPSX
Cyber Laws
PDF
Cyber law-it-act-2000
PPTX
IT act 2008
PPTX
Cyberspace jurisdiction meaning and concept
PPTX
Cyber security and cyber laws
PPTX
Cyber crime lecture one definition and nature
PPT
Cyber crime
PPTX
Cyber Crime & Information technology Act 2000
PPTX
Cyberspace
PPTX
Cyber Crime
PPT
IT ACT, 2000 (Information Technology Act, 2000)
PPT
Information Technology Act 2000 - Santosh K Pathak
PPTX
Jurisdiction issues in cyberspace
PPTX
Cyber crime and issues
PPTX
Introduction to Cyber Crime
PPTX
Jurisdiction in cyberspace
PPTX
Cyber Law in India.pptx
Cyber law In India: its need & importance
Information Technology Act 2000
Cyber law
Cyber Laws
Cyber law-it-act-2000
IT act 2008
Cyberspace jurisdiction meaning and concept
Cyber security and cyber laws
Cyber crime lecture one definition and nature
Cyber crime
Cyber Crime & Information technology Act 2000
Cyberspace
Cyber Crime
IT ACT, 2000 (Information Technology Act, 2000)
Information Technology Act 2000 - Santosh K Pathak
Jurisdiction issues in cyberspace
Cyber crime and issues
Introduction to Cyber Crime
Jurisdiction in cyberspace
Cyber Law in India.pptx
Ad

Similar to Introduction to Cyber Law (20)

PDF
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
PPT
Computer misuse
DOCX
Cyber law assignment
PDF
Cyber Laws
DOC
Computer crime
PPTX
cyber crime in india and law related to cyber crime
PPTX
Module 3- Information Tech. Act 2000.ppt
PPTX
Cyber crime
PPT
Cyber crime and forensic
DOCX
Cyber Law
PPTX
Chapter 4_Information, Control, and Privacy.pptx
PPTX
Cyber laws
PDF
Cyber Law and more information about lawpdf
DOCX
Cyber laws and sections according to IT Act 2000
PPSX
Cyber security awareness presentation
PDF
cybersecurityawareness-presentation-170627121043.pdf
PDF
Misuse of computer
PPTX
Cyber crimes its classifications and preventions
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
Computer misuse
Cyber law assignment
Cyber Laws
Computer crime
cyber crime in india and law related to cyber crime
Module 3- Information Tech. Act 2000.ppt
Cyber crime
Cyber crime and forensic
Cyber Law
Chapter 4_Information, Control, and Privacy.pptx
Cyber laws
Cyber Law and more information about lawpdf
Cyber laws and sections according to IT Act 2000
Cyber security awareness presentation
cybersecurityawareness-presentation-170627121043.pdf
Misuse of computer
Cyber crimes its classifications and preventions
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
August Patch Tuesday
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hybrid model detection and classification of lung cancer
PDF
STKI Israel Market Study 2025 version august
PPTX
Modernising the Digital Integration Hub
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
The various Industrial Revolutions .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 5: Probability Theory and Statistics
Hindi spoken digit analysis for native and non-native speakers
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A contest of sentiment analysis: k-nearest neighbor versus neural network
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
NewMind AI Weekly Chronicles - August'25-Week II
August Patch Tuesday
Getting started with AI Agents and Multi-Agent Systems
Hybrid model detection and classification of lung cancer
STKI Israel Market Study 2025 version august
Modernising the Digital Integration Hub
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
The various Industrial Revolutions .pptx
Enhancing emotion recognition model for a student engagement use case through...
Group 1 Presentation -Planning and Decision Making .pptx
Getting Started with Data Integration: FME Form 101
Univ-Connecticut-ChatGPT-Presentaion.pdf
cloud_computing_Infrastucture_as_cloud_p
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Introduction to Cyber Law

  • 1. INTRODUCTION TO CYBER LAW Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), Adv. Dip. in Cyber Law Founder, Cyber-IPR 27/01/2011 Copyright Dipak G. Parmar Meant for educational purpose only
  • 3. Pre 1990: People are not connected 1990: Connecting People to Information 2000: Connecting People to People 2010: Everything is connected
  • 4.  
  • 5.  
  • 6.  
  • 7. We are now living in e-world… dominated by numbers of “e”. e-friend…e-music…e-network…e-ticket…e-commerce… and very soon e-service of notice in commercial matters of our supreme court. Recently, our Supreme Court had decided to serve email notice in commercial matters in addition to the regular notice by R. P. A. D. in order to cut down the delay in the servicing notice. In my opinion, right to life includes right to e-life.
  • 8.  
  • 9. Technology is growing at lightening speed. While the technology brings lot of good things, it also brings equal amount of risks and challenges. Every day, we read in the newspapers about the various cyber crimes, like Credit card cloning, spoofing, phishing, stalking, etc. Some of the youngsters indulge in misusing the technology and get caught by the Police Authorities.
  • 10. A recent study revealed that 80 percent of the cyber crimes in the Corporate Houses are committed by the ‘insiders’. More than 95 percent of the cases do not get reported to the Police Authorities. Only 3% of cyber crime complaints filed in Mumbai are being converted in FIR.
  • 12. Cyberspace  is the electronic medium of computer networks, in which online communication takes place. It is readily identified with the interconnected information technology required to achieve the wide range of system capabilities associated with the transport of communication and control products and services. The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson.
  • 13. Now, the term has become a conventional means to describe anything associated with computers, information technology, the internet and the diverse internet culture. Cyberspace includes The Internet, websites computers, networks software, data storage devices, emails electronic devices (cell phones, ATM machines etc) Cyber Law governs cyberspace
  • 14. Cyber space is an intangible and provides an extreme mobility events taking place on the internet are not happening in the locations where participants or servers are physically located, but "in cyberspace". Cyber space offers great economic efficiency. Billions of dollars worth of software can be traded over the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty.
  • 15. Cyber space has Complete disrespect for national boundaries. A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone.
  • 16. Cyber space is absolutely open to participation by all. A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  • 17.  
  • 18. Cyber space offers enormous potential for anonymity to its members. "On the Internet, nobody knows you're a dog" is an adage which began as the caption of a cartoon by Peter Steiner published by The New Yorker on July 5, 1993. The cartoon features two dogs: one sitting on a chair in front of a computer, speaking the caption to a second dog sitting on the floor. http://www.unc.edu/depts/jomc/academics/dri/idog.html
  • 19. On the Internet, it is very easier to create several copies and transmitting the same in different locations of world in few minutes. For these reasons, the Internet has been described as “the world’s biggest copy machine”. “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
  • 20. The IT Act gives legal recognition to electronic records and digital and electronic signature. Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of electronic/digital signature affixed in such manner as may be prescribed by the Central Government. Use of Electronic Records and Electronic Signature in Government and its agencies
  • 21. Penalty, Compensation and Offences
  • 22. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a) to (j) Then he shall be l iable to pay unlimited damages to affected the person.
  • 23. If any person, dishonestly or fraudulently , does any act referred to in section 43, Punishment: Jailed upto three years and/or fine upto five lakh rupees. Dishonestly- the intention of causing wrongful gain to one person or wrongful loss to another person Fraudulently – the intention to defraud but not otherwise
  • 24. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network - (a) accesses or secures access to such computer, computer system or computer network or computer resource
  • 25. Access means Gaining entry into, Instructing with the logical, arithmetical, or memory function resources of Communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover every with a computer chip)
  • 26. Access means Gaining entry into a computer, computer system or computer network (widely defined to cover Applies to physical access too Examples Unauthorized access to a room storing a server/super computers Unscrews the cabinet of computer
  • 27. Access means Instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network (widely defined to cover Instructing means giving order or directing (one way process) Communicating means exchange of information (one way process)
  • 28. Examples (instructing or communicating ) Remotely shutting down computer by sending SMS Port scanning?? A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.
  • 29. Section 43 (a) covers access or secures access Secure means to make certain To make certain that access can be achieved as and when desired by the person seeking to access. Example X, network administrator of ABC Limited, stores passwords of main servers in his personal laptop. Y, a friend of X, with X permission, access X’s laptop and note down passwords of main server. Y secured access to main servers of ABC Limited.
  • 30. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder,
  • 31. Assistances – is act of helping or aiding Facilitate – to make easier or to make less difficult or to assist in the progress of… Examples Handing over password by the existing officer Deliberately ignoring warnings of IDS Putting firewall on disable mode
  • 32. Secured access or attempts to secure access to a protected system Punishment : jailed upto 10 years and/or fine Protected system declared by the Government Examples: Computers of India Army, Mumbai Police, Forest Dept of Government etc. Examples (attempts) Unsuccessful attempt to break password Unsuccessful DOS attack Unsuccessful attempt to send a Trojan
  • 33. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (b) downloads , copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;
  • 34. To download is to transfer information from one computer to another To copy is to imitate or reproduce an exact replica of the original To extract is to take out, distil, deduce, derive or quote from any source
  • 35. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
  • 36. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network – (d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;
  • 37. Damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means Examples Changing an image from .gif format to .jpg format Deleting/changing of code/URL/ excel file
  • 38. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (e) disrupts or causes disruption of any computer, computer system or computer network; Disruption- could be total or partial To prevent the normal continuance of To throw into confusion or disorder To interupt or impede the progress of
  • 39. Examples of Disruption Spreading worms in a global network…slowing down of the network Switching off the wi-fi modem Using the slow internet connection for heavy download…it is not available to other legitimate users.
  • 40. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; Examples: DOS and DDOS attacks
  • 41. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, Examples: internet time theft, misuse of credit card etc
  • 42. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network - (j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage ,
  • 43. Any person knowingly or intentionally conceals , destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, Punishment: jailed up to three years and/or fine up to two lakh rupees. Case-Law: Syed Asifuddin & others v/s State of A. P and another
  • 44. Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected. Example: BPO outsourcing contract
  • 45. Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract , such  material to any other person , Punishment: Jailed upto three years, or/and fine upto five lakh rupees
  • 46. Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly offensive or has menacing character; or Punishment: Jailed upto three years, or/and fine
  • 47. Any person who sends, by means of a computer resource or a communication device,- b) any information which he knows to be false , but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, Punishment: Jailed upto three years, or/and fine
  • 48. Any person who sends, by means of a computer resource or a communication device,- c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages Punishment: Jailed upto three years, or/and fine Examples: SPAM, spoofing
  • 49. 67. Punishment for publishing or transmitting obscene material in electronic form 67 A Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form 67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
  • 50. If any person, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, Punishment: Jailed upto three years, or/and fine upto two lakhs “ private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast
  • 51. 66 B. Punishment for dishonestly receiving stolen computer resource or communication device 66C. Punishment for identity theft 66D. Punishment for cheating by personation by using computer resource 66F. Punishment for cyber terrorism
  • 52. Sec 75 Act to apply for offence or contraventions committed outside India by any person irrespective of his nationality. if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.
  • 53. PReSENSE, Issue No 32 – Oct 2008 (http://www.primepointfoundation.org/presense/presense1008.pdf accessed on 27-09-2009) Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) “ It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010) http://en.wikipedia.org/wiki/Port_scanner (Accessed on 27-01-2011) presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-5162852 Accessed on 13-09-2010)
  • 54. Thank You Adv. DIPAK G. PARMAR [email_address] 09820196971