際際滷

際際滷Share a Scribd company logo
AN
INTRODUCTION TO
IT LAWS
PRESENTATION PLAN
INTRODUCTION TO SESSION ;
 The cyber crimes and laws.
 The IT Act, 2000 and IT Amendment Act, 2008.
 Protecting Copyright in the digital millennium.
 Introduction to Intellectual Property Rights.
 E - contract
CYBER CRIME
Cyber Crime is a combination of crime and
computer.
EVOLUTION OF CYBER SECURITY LAWS
Data Protection Act, 1988 : Applicable in all countries in Council of
Europe. India is not however integrated amoung them.
The Information Technology Act 2000 : India enacted similar Act for
regulating the Cyber crime and data protection.
CYBER THREAT
 Data theft : Illegal copying of data. [Theft : Dishonestly taking
property without consent. (Sec. 378 of IPC)].
Breach of Trust : Dishonestly misappropriates or converts entrusted
property. (Sec. 405 of IPC)
CRIME AGAINST
GOVERNMENT
CRIME AGAINST
PROPERTY
CRIME AGAINST
PERSON
 Cyber pornography
 Sale of illegal articles like
narcotics, weapons, wildlife
 Online gambling
 Cyber terrorism
 Money laundering in cyber
space
 Phishing
 Intellectual Property
crimes- software piracy,
copyright infringement,
trademarks violations, theft
of computer source code.
 Data spoofing
 Forgery
 Defamation
 Cyber stalking
 Skimming
INFORMATION TECHNOLOGY ACT 2000
 The Act essentially deals with the following issues;
 Legal Recognition of Electronic Documents.
 Legal Recognition of Digital Signatures.
 Offenses and Contraventions.
 Justice Dispensation Systems for cyber crimes.
 The Act amended on 5 Feb 2009 Some of the notable features are;
 Focusing on data privacy and Information Security.
 Defining cyber cafe.
 Authentication of digital signature technology.
 Defining reasonable security practices to be followed by corporate.
 Redefining the role of intermediaries.
 Recognizing the role of Indian Computer Emergency Response Team.
 Inclusion of cyber crimes like child pornography and cyber terrorism.
IT ACT AN OVERVIEW
 Chapter III discusses procedures and the legal recognition of electronic
records and signature and recognition to the validity of contracts formed
through electronic means.
 Section 43 deals with penalties and compensation for damage to computer,
computer system, data theft and breach of trust etc.
 By this sec. data theft became just like physical theft or larceny of goods
and commodities.
By Section 43A corporates are under an obligation to ensure adoption of
Reasonable Security Practices.
 Site certification.
 Security initiatives.
 Awareness Training.
 Conformance to Standards, certification.
 Policies and adherence to policies.
 Policies like password policy, Access Control, email Policy etc.
 Periodic monitoring and review.
CRIMINAL LIABILITY CIVIL LIABILITY
 Tampering with source documents(Sec.65)
 Computer related offences (Sec 66)
 Sending offensive messages through communication
service, causing annoyance etc (Sec 66A)
 Dishonestly receiving stolen computer resource or
communication device (Sec 66B )
 Electronic signature or other identity theft like
using others password or electronic signature
etc.(Sec 66C)
 Cheating by personation using computer resource
or a communication device .(Sec 66D)
 Privacy violation (Sec 66E)
 Cyber terrorism (Sec 66F)
 Publishing or transmitting obscene material in
electronic form. (Sec.67)
 Penalties and compensation for
damage to computer, computer system
etc. (Sec 43).
Acts amended by the IT Act ;
 The Indian Penal Code, 1860
 The Indian Evidence Act 1872
 Reserve Bank of India Act, 1934
 Companies Act, 2013
 Indian Copyright Act, 1957
INTELLECTUAL PROPERTY RIGHTS (IPR)
 Intellectual Property (IP) is defined as any "original creative work manifested
in a tangible form that can be legally protected".
 Sec. 2(ffc) of the Copyright Act, defines a computer program. And it included
in the definition of literary work.
 Computer software is computer program within the meaning of the
Copyright Act.
 Creator is the First owner of copyright.
 Copyright subsists in a computer program for 60 years.
 According to section 14 of the Copyright Act, "copyright" means the
exclusive right to do (or authorize the doing of) any of the following:
To fix information in any tangible form
To reproduce copyrighted work
To sell, rent, lease or otherwise distribute copies
Perform and display copyrighted work
To prepare derivatives of a copyrighted work.
According to section 30 of the Copyright Act, the following can grant interest
in a copyright by way of licenses:
 The owner of the copyright in any existing work.
. The prospective owner of the copyright in any future work.
10/26/2015
LICENCE
The permission granted by competent authority to exercise a certain
privilege.
Type of Software licenses :
 Time-based licenses where the license expires after a particular time
period.
 User-based licenses where the license fee depends upon the number of
computers on which the software will be installed
 Feature-based licenses where the license fee depends upon the
features that are required by the user.
INFRINGMENT AND REMEDIES
The copyright in a computer program is deemed to be infringed when any
person act in contravention of the conditions of a license or use it without
a license.
Offences:
Sec. 65 : Any person who knowingly makes, or possess any work which
protected by copy right for the purpose of making infringing copies is
punishable with imprisonment which may extends to 2 yrs. and with fine.
10/26/2015
CIVIL REMEDIES
 Suit for damages.
 Suit for injunction.
10/26/2015
E- CONTRACTING
 Essential of contract (Sec.10 of Indian contract Act, 1872)
Offer & Acceptance - competent parties  consideration- lawful object  consent
 Forming an e- contract through website;
 Click wrap - By clicking on 'I agree'
 Browse wrap - Implied agreement by surfing website
 Shrink wrap - Terms and conditions inside the box. If user does not
agree with its terms within in a particular time, product can return.
 Sec. 10 A of IT Act confers the validity of E- contract.
10/26/2015

More Related Content

Workshop on Cyber Laws

  • 2. PRESENTATION PLAN INTRODUCTION TO SESSION ; The cyber crimes and laws. The IT Act, 2000 and IT Amendment Act, 2008. Protecting Copyright in the digital millennium. Introduction to Intellectual Property Rights. E - contract
  • 3. CYBER CRIME Cyber Crime is a combination of crime and computer.
  • 4. EVOLUTION OF CYBER SECURITY LAWS Data Protection Act, 1988 : Applicable in all countries in Council of Europe. India is not however integrated amoung them. The Information Technology Act 2000 : India enacted similar Act for regulating the Cyber crime and data protection.
  • 5. CYBER THREAT Data theft : Illegal copying of data. [Theft : Dishonestly taking property without consent. (Sec. 378 of IPC)]. Breach of Trust : Dishonestly misappropriates or converts entrusted property. (Sec. 405 of IPC)
  • 6. CRIME AGAINST GOVERNMENT CRIME AGAINST PROPERTY CRIME AGAINST PERSON Cyber pornography Sale of illegal articles like narcotics, weapons, wildlife Online gambling Cyber terrorism Money laundering in cyber space Phishing Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code. Data spoofing Forgery Defamation Cyber stalking Skimming
  • 7. INFORMATION TECHNOLOGY ACT 2000 The Act essentially deals with the following issues; Legal Recognition of Electronic Documents. Legal Recognition of Digital Signatures. Offenses and Contraventions. Justice Dispensation Systems for cyber crimes. The Act amended on 5 Feb 2009 Some of the notable features are; Focusing on data privacy and Information Security. Defining cyber cafe. Authentication of digital signature technology. Defining reasonable security practices to be followed by corporate. Redefining the role of intermediaries. Recognizing the role of Indian Computer Emergency Response Team. Inclusion of cyber crimes like child pornography and cyber terrorism.
  • 8. IT ACT AN OVERVIEW Chapter III discusses procedures and the legal recognition of electronic records and signature and recognition to the validity of contracts formed through electronic means. Section 43 deals with penalties and compensation for damage to computer, computer system, data theft and breach of trust etc. By this sec. data theft became just like physical theft or larceny of goods and commodities.
  • 9. By Section 43A corporates are under an obligation to ensure adoption of Reasonable Security Practices. Site certification. Security initiatives. Awareness Training. Conformance to Standards, certification. Policies and adherence to policies. Policies like password policy, Access Control, email Policy etc. Periodic monitoring and review.
  • 10. CRIMINAL LIABILITY CIVIL LIABILITY Tampering with source documents(Sec.65) Computer related offences (Sec 66) Sending offensive messages through communication service, causing annoyance etc (Sec 66A) Dishonestly receiving stolen computer resource or communication device (Sec 66B ) Electronic signature or other identity theft like using others password or electronic signature etc.(Sec 66C) Cheating by personation using computer resource or a communication device .(Sec 66D) Privacy violation (Sec 66E) Cyber terrorism (Sec 66F) Publishing or transmitting obscene material in electronic form. (Sec.67) Penalties and compensation for damage to computer, computer system etc. (Sec 43).
  • 11. Acts amended by the IT Act ; The Indian Penal Code, 1860 The Indian Evidence Act 1872 Reserve Bank of India Act, 1934 Companies Act, 2013 Indian Copyright Act, 1957
  • 12. INTELLECTUAL PROPERTY RIGHTS (IPR) Intellectual Property (IP) is defined as any "original creative work manifested in a tangible form that can be legally protected". Sec. 2(ffc) of the Copyright Act, defines a computer program. And it included in the definition of literary work. Computer software is computer program within the meaning of the Copyright Act. Creator is the First owner of copyright. Copyright subsists in a computer program for 60 years.
  • 13. According to section 14 of the Copyright Act, "copyright" means the exclusive right to do (or authorize the doing of) any of the following: To fix information in any tangible form To reproduce copyrighted work To sell, rent, lease or otherwise distribute copies Perform and display copyrighted work To prepare derivatives of a copyrighted work. According to section 30 of the Copyright Act, the following can grant interest in a copyright by way of licenses: The owner of the copyright in any existing work. . The prospective owner of the copyright in any future work.
  • 14. 10/26/2015 LICENCE The permission granted by competent authority to exercise a certain privilege. Type of Software licenses : Time-based licenses where the license expires after a particular time period. User-based licenses where the license fee depends upon the number of computers on which the software will be installed Feature-based licenses where the license fee depends upon the features that are required by the user.
  • 15. INFRINGMENT AND REMEDIES The copyright in a computer program is deemed to be infringed when any person act in contravention of the conditions of a license or use it without a license. Offences: Sec. 65 : Any person who knowingly makes, or possess any work which protected by copy right for the purpose of making infringing copies is punishable with imprisonment which may extends to 2 yrs. and with fine.
  • 16. 10/26/2015 CIVIL REMEDIES Suit for damages. Suit for injunction.
  • 17. 10/26/2015 E- CONTRACTING Essential of contract (Sec.10 of Indian contract Act, 1872) Offer & Acceptance - competent parties consideration- lawful object consent Forming an e- contract through website; Click wrap - By clicking on 'I agree' Browse wrap - Implied agreement by surfing website Shrink wrap - Terms and conditions inside the box. If user does not agree with its terms within in a particular time, product can return. Sec. 10 A of IT Act confers the validity of E- contract.