Cyber Law

In: Computers and Technology

Submitted By ankita17589
Words 3963
Pages 16
Report On

Cyber law
LEGAL ASPECTS OF MANAGEMENT

Submitted to:
Mr. Maneesh Yadav

Submitted by:
Ankita Bhatnagar (JL12PGDM030)

Introduction:
Computers and their use is a day to day activity of all the students, professionals, teachers, Universities, banks, Supermarkets, in the entertainment field, in medical profession and also in higher education. The use of this Weapon is spreading very widely in all parts of our society. As every weapon has two ways of operation. One is good and essential and the other are bad and not essential. Many times, whenever a new weapon is invented, many people use it unknowingly for the wrong purpose. So to aware them and to make the proper use of the Power of the newly invented weapon, laws is to be formulated and should be implemented. This chapter introduces the cyber law and many terms involved in it. There are two basic definitions of cyber crime. (a) One definition says that ‘cyber crime’ consists of only those offences provided in the Information technology Act, 2000. As per this definition, cyber crimes would mainly be restricted to tampering with the computer source code, hacking and cyber pornography. Cyber fraud, defamation, harassment, e – mail abuse and IPR thefts, would not classify as cyber crimes. (b) In second definition, ‘cyber crime’ is said to be an act of commission or omission with the internet, committed on the internet or through the internet or with the help of the internet or connected with the internet, whether directly or indirectly, which is prohibited by the law and for which punishment, momentary and / or corporal is provided. According to these definitions, the IT Act, 2000 provides punishments for only certain cyber offences and is not applicable to all the cyber crimes. For example, suppose a person threatens any other person with causing death or serious hurt. Then he will be liable for…...

Similar Documents

Cyber Law of Bd

...Efficiencies of Cyber law in Bangladesh জুন 26, 2011 0 inShare Technology is getting more frequently used and seems like a blessing going cover Bangladesh. But sometimes we can see some bad- naughty peoples use the same technology to make crime in the cyber area. As well as day by day Cyber crimes are increasing in the world as well as our country. Therefore in Bangladesh a bundle of laws has been enacted to protect the people. Cyber law in Bangladesh In the Information Communication Technology Act of Bangladesh does not define what the Cyber law by any section is. But Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The said Act enable (a) Legal recognition of electronic transaction, (b) Legal recognition of digital signature, (c) Acceptance to con- tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of the crime relation with information Communication Technology. Objectives of the ICT Act, 2006 The objectives of the ICT Act, 2006 has been provided following purposes such as To smooth the progress of electronic filing of documents...

Words: 695 - Pages: 3

What Is Cyber Law?

...the country's implementation of its Cybercrime Prevention Act of 2012--making it the sixth filed against the controversial legislation. According to GMA News Online on Monday, the petition centered on the definition of online libel stated in the law, specifically sections 4, 5 and 6, which the petitioners say are "unconstitutional due to vagueness". The law also curtails "constitutional rights to due process, speech, expression, free press and academic freedom", it stated. The Cybercrime Prevention Act of 2012 , signed by President Benigno Aquino III on Sep. 12, aims to fight online pornography, hacking, identity theft and spamming following local law enforcement agencies' complaints over the lack of legal tools to combat cybercrime. However, the law came with tougher legal penalties for Internet defamation, compared to traditional media. It also allows authorities to collect data from personal user accounts on social media and listen in on voice and video applications such as Skype, without a warrant. Users who post defamatory comments on Facebook or Twitter, for example, could be sentenced to up 12 years in jail. Hacktivists take aim The other five petitions filed with the Philippine Supreme Court, too, noted the law infringes on freedom of expression, due process, equal protection and privacy of communication, a separate report by GMA News Online on Saturday stated. Senator Teofisto Guingona, the sole opponent when the bill was voted on by the Senate and......

Words: 429 - Pages: 2

Cyber Crime Law

...content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation. SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby defined as follows: (a) Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network. (b) Alteration refers to the modification or change, in form or substance, of an existing computer data or program. (c)......

Words: 4460 - Pages: 18

Cyber Law

...set up its international headquarters in Dublin, Ireland.[54] In September 2009, Facebook said that it had turned cash-flow positive for the first time.[55] In November 2010, based on SecondMarket Inc., an exchange for shares of privately held companies, Facebook's value was $41 billion (slightly surpassing eBay's) and it became the third largest U.S. Web company after Google and Amazon.[56] Traffic to Facebook increased steadily after 2009. More people visited Facebook than Google for the week ending March 13, 2010.[57] In March 2011, it was reported that Facebook removes approximately 20,000 profiles from the site every day for various infractions, including spam, inappropriate content and underage use, as part of its efforts to boost cyber security.[58] In early 2011, Facebook announced plans to move to its new headquarters, the former Sun Microsystems campus in Menlo Park, California.[59][60] Release of statistics by DoubleClick showed that Facebook reached one trillion page views in the month of June 2011, making it the most visited website of those tracked by DoubleClick.[61] According to the Nielsen Media Research study, released in December 2011, Facebook is the second most accessed website in the US (behind Google).[62] In March 2012, Facebook announced App Center, an online mobile store which sells applications that connect to Facebook. The store will be available to iPhone, Android and mobile web users.[63] Facebook, Inc. held an initial public offering on......

Words: 15859 - Pages: 64

Busniss Law and Cyber Law

...The issue in a given situation is whether Mr Robert’s revocation of offer by post is effective as against Mr James. Section 2(h) of the contract 1950 defines contract as an agreement enforceable by law. In order for an agreement to be enforceable by law, it must consist of six essential elements which are offer, acceptance, consideration, intention to create legal relation, capacity and certainty. Section 5(1) contract act: a proposal may be revoked at any time before the communication of its acceptance is complete as against the proposer, but no afterwards. Section 6 contracts act- a proposal is revoked (a) by the communication of notice of revocation by the proposer to the other party. (b) By the lapse of the time prescribed in the proposal for its acceptance. (c) By the failure of the acceptor to fulfill a condition precedent to acceptance. (d) By the death or mental disorder of the proposer. Section 4(2) contract act- proposer is bound when the offeree posts the letter of acceptance, even though the proposer has no knowledge of the acceptance. When the letter is posted is posted, the acceptor has no longer any control over it. The transaction becomes binding irrespective of any delay or disappearance in the course of transit. Acceptance is complete upon posting. In the case of Adams v Lindsell, the Defendants mailed their offer to sell on the 2nd of September, 1817. The Defendants’ letter was misdirected and did not reach the plaintiffs until 7:00 p.m., Friday the 5th...

Words: 495 - Pages: 2

Criminal Law and Cyber Crime

...Criminal Law and Cyber Crimes Sara Bakerink Kaplan University LS311-03RP1 In law there can be different classifications of the same crime, theft for example. The classifications vary state to state as the section code is based on the state. For example in Iowa we do not have a state section code for Larceny. Robbery can be found under 711.1 and burglary can be found under 713.1. However, in other states larceny is listed in the state section code. For this assignment in Unit 3 there are three situations that involve Makoto's laptop computer being stolen. How the theft occurs is the factor that determines the type of crime that is committed. The classifications of theft crimes are larceny, robbery, or burglary. In situation one Sarah sees a laptop unattended on a porch and steals it. Sarah proceeds to show everyone the laptop calling it her own. This type of theft is known as larceny which is a property crime. Larceny is "the unlawful taking and carrying away of someone else's personal property with the intent to permanently deprive the owner of possession." (Miller & Jentz, 2008, p.128) "Note that a person who commits larceny generally can also be sued under tort law because the act of taking possession of another's property involves a trespass to personal property." (Miller & Jentz, 2008, p.128) In situation two Sarah sees Makoto outside with a laptop computer. Sarah holds Makoto at gunpoint and steals Makoto's......

Words: 498 - Pages: 2

Cyber Law

...whеn dеaling with thе соmpany’ѕ ѕоftwarе. Privaсy еnсоmpaѕѕеѕ соnсеptѕ aѕ thе right tо makе dесiѕiоnѕ fоr yоurѕеlf, thе right tо travеl, yоur right tо bе lеft alоnе, and thе right tо соntrоl thе diѕtributiоn оf infоrmatiоn abоut yоu. EMPLOYEEЅ IЅЅUE Тhе majоr kеy iѕѕuе invоlving an еmplоyее’ѕ privaсy iѕ ѕurvеillanсе. Ѕurvеillanсе iѕ bеing dоnе оn еmplоyеrѕ оf all kindѕ inсluding vidео ѕurvеillanсе and alѕо оn еmplоyее’ѕ tеlеphоnе сallѕ, vоiсе mailѕ and е-mailѕ. Ovеr rесеnt yеarѕ, ѕurvеillanсе haѕ rеaсhеd tо thе еxtеnt that еxсеllеnt High Definition сamеraѕ сan bе соmplеtеly hiddеn frоm viеw in a numbеr оf diffеrеnt wayѕ. Ѕpy Camеraѕ arе a grеat tооl fоr many еmplоyеrѕ but at ѕоmе pоintѕ thеy arе uѕеd inapprоpriatеly. Тhе fеdеral law prоhibitѕ anyоnе frоm rесоrding imagеѕ оf an individual'ѕ "privatе arеaѕ" withоut соnѕеnt оf that individual. Paсkеt-ѕniffing ѕоftwarе сan intеrсеpt, analyzе, and arсhivе all соmmuniсatiоnѕ оn a nеtwоrk, inсluding еmplоyее е-mail, сhat ѕеѕѕiоnѕ, filе ѕharing, and Intеrnеt brоwѕing. Wоrkplaсе mоnitоring iѕ alѕо aссоmpliѕhеd thrоugh vidео еquipmеnt, pеn rеgiѕtеrѕ, tеlеphоnе rесоrding dеviсеѕ, and magnеtiс aсtivе badgеѕ, Digital сamеraѕ, arе ѕо ѕmall that thеy fit оn a оnе-inсh by twо-inсh сhip. Dеѕktоp ѕurvеillanсе iѕ anоthеr fоrm ѕurvеillanсе, but it invоlvеѕ thе phyѕiсal mоnitоring оf a ѕpесifiс соmputеr and еvеry aсtiоn takеn by itѕ uѕеr. Dеѕktоp mоnitоring allоwѕ an еmplоyеr’ѕ соmputеr tо intеrсеpt ѕignalѕ еmittеd by an......

Words: 1558 - Pages: 7

Cyber Law

...dеaling with thе соmpany’ѕ ѕоftwarе. Privaсy еnсоmpaѕѕеѕ соnсеptѕ aѕ thе right tо makе dесiѕiоnѕ fоr yоurѕеlf, thе right tо travеl, yоur right tо bе lеft alоnе, and thе right tо соntrоl thе diѕtributiоn оf infоrmatiоn abоut yоu. EMPLOYEEЅ IЅЅUE Тhе majоr kеy iѕѕuе invоlving an еmplоyее’ѕ privaсy iѕ ѕurvеillanсе. Ѕurvеillanсе iѕ bеing dоnе оn еmplоyеrѕ оf all kindѕ inсluding vidео ѕurvеillanсе and alѕо оn еmplоyее’ѕ tеlеphоnе сallѕ, vоiсе mailѕ and е-mailѕ. Ovеr rесеnt yеarѕ, ѕurvеillanсе haѕ rеaсhеd tо thе еxtеnt that еxсеllеnt сamеraѕ сan bе соmplеtеly hiddеn frоm viеw in a numbеr оf diffеrеnt wayѕ. Ѕpy Camеraѕ arе a grеat tооl fоr many еmplоyеrѕ but at ѕоmе pоintѕ thеy arе uѕеd inapprоpriatеly. Тhе fеdеral law prоhibitѕ anyоnе frоm rесоrding imagеѕ оf an individual'ѕ "privatе arеaѕ" withоut соnѕеnt оf that individual. Paсkеt-ѕniffing ѕоftwarе сan intеrсеpt, analyzе, and arсhivе all соmmuniсatiоnѕ оn a nеtwоrk, inсluding еmplоyее е-mail, сhat ѕеѕѕiоnѕ, filе ѕharing, and Intеrnеt brоwѕing. Wоrkplaсе mоnitоring iѕ alѕо aссоmpliѕhеd thrоugh vidео еquipmеnt, pеn rеgiѕtеrѕ, tеlеphоnе rесоrding dеviсеѕ, and magnеtiс aсtivе badgеѕ, Digital сamеraѕ, arе ѕо ѕmall that thеy fit оn a оnе-inсh by twо-inсh сhip. Dеѕktоp ѕurvеillanсе iѕ anоthеr fоrm ѕurvеillanсе, but it invоlvеѕ thе phyѕiсal mоnitоring оf a ѕpесifiс соmputеr and еvеry aсtiоn takеn by itѕ uѕеr. Dеѕktоp mоnitоring allоwѕ an еmplоyеr’ѕ соmputеr tо intеrсеpt ѕignalѕ еmittеd by an......

Words: 2745 - Pages: 11

Cyber Law

...alоnе, and thе right tо соntrоl thе diѕtributiоn оf infоrmatiоn abоut yоu. EMPLOYEEЅ IЅЅUE Тhе majоr kеy iѕѕuе invоlving an еmplоyее’ѕ privaсy iѕ ѕurvеillanсе. Ѕurvеillanсе iѕ bеing dоnе оn еmplоyеrѕ оf all kindѕ inсluding vidео ѕurvеillanсе and alѕо оn еmplоyее’ѕ tеlеphоnе сallѕ, vоiсе mailѕ and е-mailѕ. Ovеr rесеnt yеarѕ, ѕurvеillanсе haѕ rеaсhеd tо thе еxtеnt that еxсеllеnt сamеraѕ сan bе соmplеtеly hiddеn frоm viеw in a numbеr оf diffеrеnt wayѕ. Ѕpy Camеraѕ arе a grеat tооl fоr many еmplоyеrѕ but at ѕоmе pоintѕ thеy arе uѕеd inapprоpriatеly. Тhе fеdеral law prоhibitѕ anyоnе frоm rесоrding imagеѕ оf an individual'ѕ "privatе arеaѕ" withоut соnѕеnt оf that individual. Paсkеt-ѕniffing ѕоftwarе сan intеrсеpt, analyzе, and arсhivе all соmmuniсatiоnѕ оn a nеtwоrk, inсluding еmplоyее е-mail, сhat ѕеѕѕiоnѕ, filе ѕharing, and Intеrnеt brоwѕing. Wоrkplaсе mоnitоring iѕ alѕо aссоmpliѕhеd thrоugh vidео еquipmеnt, pеn rеgiѕtеrѕ, tеlеphоnе rесоrding dеviсеѕ, and magnеtiс aсtivе badgеѕ, Digital сamеraѕ, arе ѕо ѕmall that thеy fit оn a оnе-inсh by twо-inсh сhip. Dеѕktоp ѕurvеillanсе iѕ anоthеr fоrm ѕurvеillanсе, but it invоlvеѕ thе phyѕiсal mоnitоring оf a......

Words: 2745 - Pages: 11

Cyber Law

...Assignment 2 Chapter 3

 1. Name and Describe two (2) U.S. based compliance laws that exist. 
 Federal Information Security Management Act- This act was passed in 2002 as part of the title 3 of the E-Government Act. Its purpose is to ensure that federal agencies protect their data. It gives specific responsibilities for federal agencies. They are responsible for protecting the system and data, complying with all elements of FISMA and integrating security in all processes. Gramm-Leach Bliley Act also known as the Financial Services Modernization Act of 1999. This act protects your private financial information from being sold to other business. GLBA also offer protection against the practice of obtaining personal information through false pretenses. There are two parts that pertain to IT security which is Financial Privacy Rule which requires companies to notify there customers about there privacy practice and Safeguard rule which means a company must have a security plan in place to protect the consumer information. Sarbanes-Oxley Act- This act came into law in 2002 to regulate financial practice and corporate governance. This law is intended to hold board members and executives accountable for any financial data that is not accurate. These acts can be punishable by jail time or fines. 2. Discuss the levels of the CMMI process improvement approach. There are six levels in the CMMI process improvement approach beginning with level 0. Level 0...

Words: 641 - Pages: 3

Cyber Bullying: Reviewing Washington State Law Rcw 28a.300.285

...Cyber Bullying: Reviewing Washington State Law RCW 28A.300.285 Christopher Hinton American Military University Learning institutions require an environment that is conducive to learning and nurtures the absorption of knowledge. Moreover, children require a safe and secure space in order to learn and interact with their peers in a healthy, fit and supportive way. The foregoing cannot be achieved when activities involving bullying and harassment are tolerated and allowed to foster in an institution. The enactment of laws to control and manage the issue of harassment and school bullying is therefore an essential tool to stop these actions from occurring at schools. Law is a critical element when it comes to remedying the problems being faced by society. The importance of this law is also evident in the fact that children need to be protected since their future livelihood depends largely on the environment they are subjected to on a daily basis. Secure and civil surroundings in school are indispensable needs for pupils to pursue education and attain a high level of academic success.  Moreover harassment, threats, or maltreatment, like other disrupting or aggressive manners, is a demeanor that interferes with both a student's ability to learn and a school's ability to instruct and teach its students in a protected environment. In addition, students learn and understand by example. It is therefore important to ensure that what children learn in school is not......

Words: 1534 - Pages: 7

Criminal Law and Cyber Crime

...* Chapter 10: Criminal Law and Cyber Crime * Section 1: Civil Law and Criminal Law * Crime- A wrong against society set forth in a statute and punishable by a fine and/or imprisonment—or in some cases, death * Key Differences Between Civil Law and Criminal Law * Burden of Proof * Civil Case * Plaintiff must prove his or her case by a preponderance of the evidence and must convince the court that based on the evidence presented by both parties; it is more likely than not that the plaintiff’s allegation is true. * Criminal Case * The state must prove its case beyond a reasonable doubt. The prosecutor must prove beyond a reasonable doubt that the defendant has committed every essential element of the offense with which she or he is charged * Criminal Sanctions * Much harsher than civil * Involve fines, imprisonment, probation, and sometimes the death penalty * Civil Liability for Criminal Acts * Some torts, such as assault and battery, provide a basis for a criminal prosecution as well as a civil action in tort, * Classification of Crimes * Felonies * Serious crimes punishable by death or by imprisonment for more than one year * Misdemeanors * Less serious crimes punishable by a fine or by confinement for up to a year *......

Words: 2272 - Pages: 10

Cyber Law

...FULL PAPER. AUTHOR’S NAME: NUPUR AGARWAL AFFILIATION: INSTITUTE OF LAW , NIRMA UNIVERSITY MAILING ADDRESS: 1 , RADHANPUR SOCIETY , BEHIND SWAMINARAYAN MANDIR , RAMBAUG , MANINAGAR , AHMEDABAD – 380008 PHONE NO: 09898839289 EMAIL-ID: nupuragarwal201995@yahoo.com CO-AUTHOR’S NAME: NUPUR JOSHI AFFILIATION: UNITED WORLD , SCHOOL OF LAW MAILING ADDRESS: 67, SWAGAT CITY , GANDHINAGAR – MEHSANA ROAD ADALAJ GANDHINAGAR PHONE NO: 9408968686 EMAIL-ID: nupurjoshi184@gmail.com TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation......

Words: 6245 - Pages: 25

Cyber Laws

...focal areas should be E-POLICING, E-GOVERNANCE, New Approaches of Information War (HACKING), Information Technology based Crime (Cyber Crime) etc. Police Reform Program is now running in its second phase to enhance policing in Bangladesh. I want to be a key player to reform Bangladesh Police with the help of Information Management Technology and Techniques. This post graduate course is a rich one in the area of IT related post graduate courses. This university has a great reputation in the world context as being the top ranked technology based educational institute. However in the previous column I mentioned my career objectives in the light of current technology based policing. The present government of Bangladesh has a keen interest on digitalization of government works. We the Bangladesh Police is also trying to foster its functioning with the use of newly emerged technology like information technology. Good governance is a burning issue of Bangladesh. To ensure good governance rule of law will have to be ensured by reforming and using ICT in criminal justice organizations. As being the stakeholder of criminal justice administration we are urgently in need of enhancing policing with the help of Information management technologies. This proposed course will obviously meet my career objectives and foster my future plan in working with e-policing, cyber-crime and national data protection. This I want to pursue this post graduate course with having Scholarship or financial......

Words: 391 - Pages: 2

Cyber Law

...assets can be calculated by analysis of the following issues:  Threats to your assets. These are unwanted events that could cause the intentional or accidental loss, damage or misuse of the assets  Vulnerabilities. How vulnerable (prone or weak) your assets are to attack  Impact. The magnitude of the potential loss or the seriousness of the event. Security services Information Security Governance, Information Security Governance or ISG, is a subset discipline of Corporate Governance focused on information Security systems and their performance and risk management.  Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations  Develop the information security strategy in support of business strategy and direction.  Obtain senior management commitment and support  Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.  Establish reporting and communication channels that support information security governance activities.  Identify current and potential legal and regulatory issues affecting information security and evaluate their impact on the enterprise.  Establish and maintain information security policies that support business goals and objectives.  Ensure the development of procedures and guidelines that support information security policies. ......

Words: 1808 - Pages: 8

Hisone to Masotan – Todos os Episódios | Disobedience (2017) | Im Ji Yeon