Information Technology and IT act
-
Upload
divesh-mewara -
Category
Technology
-
view
184 -
download
1
Transcript of Information Technology and IT act
![Page 1: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/1.jpg)
Seminar on Information Technology Act
Presented By Presented ToDivesh Mewara Mr. Pankaj Dadheech11ESKCS045 Reader
![Page 2: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/2.jpg)
Contents Cyber Crime
Cyber Crime in India
Cyber Crime in USA
Cyber Crime in UK
IT Act
Positive Initiatives & Recommendations
Intellectual Property
Patents and Trademarks
Copyrights
![Page 3: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/3.jpg)
Cyber Crime
• Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a
tool to commit an offence (child pornography, hate crimes).
• Cybercriminals may use computer technology to access personal
information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use
computers for communication and document or data storage.
• It mainly consists of unauthorized access to computer systems,
data alteration, data destruction, data theft etc.
• The first recorded cyber crime took place in the year 1820.
![Page 4: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/4.jpg)
Types of Cybercrime
1.HACKING :
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as
CRACKING. Government websites are the hot targets of the
hackers due to the press coverage, it receives. Hackers enjoy
the media coverage.
2.CHILD PORNOGRAPHY:
The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. . As more homes have
access to internet, more children would be using the internet
and more are the chances of falling victim to the aggression of
pedophiles.
![Page 5: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/5.jpg)
Types of Cybercrime
3.COMPUTER VANDALISM:
Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting virus: These are
programs that attach themselves to a file and then circulate .
They usually affect the data on a computer, either by altering or
deleting it against properties.
![Page 6: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/6.jpg)
Types of Cybercrim
4.SOFTWARE PIRACY:
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
![Page 7: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/7.jpg)
Cyber Crime in India
• The major Cyber Crimes reported, in India, are phishing, Spam, hacking, Computer Virus and Worms, Denial of Services, Defacement of websites.
• Nearly $4 billion in direct financial losses country every year.
• 29.9 million people fell victim to cybercrime.
• 3 in 5 online adults (60%) have been a victim of Cybercrime.
![Page 8: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/8.jpg)
Cyber cell office in India
Cyber cell offices are situated in india's major cities like1.chennai2.Banglore3Delhi4Mumbai5.Hyderabad6.pune
![Page 9: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/9.jpg)
Charges of solving of cyber crimes
•Charges of solving of different cyber crime in india varies according to their complexities.
•Because there are different kind of cyber crimes are exist in india.For ex:- credit card fraud
Atm card fraudIdentity theftPassword stealing.
![Page 10: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/10.jpg)
Cyber Crime in USA• USA is the most targeted country for cyber
attacks.
• Social networks as well as ecommerce sites are major targets.
• 14,348 website defacements in 2011.
• 4,150 .com domains were defaced during 2012.
• 15,000 sites hacked in 2012.
• USA is the number 1 country in the world for generating spam.
![Page 11: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/11.jpg)
Cyber Crime in European Union• UK is the one of the most targeted country
for cyber attacks after USA.
• 71 Million Internet Users .
• 35 Million Active Internet Users, up by 28% from 26 million in 2010.
• 20 Million users shop online on Online Shopping Sites.
![Page 12: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/12.jpg)
Cyber security
Cyber security involves protection of sensitive personal and
business information through prevention, detection, and
response to different online attacks.
Cyber security actually protects your personal information by
responding, detecting and preventing the attacks. Cyber
security
Privacy policy :
Before submitting your name, email address, or other personal
information on a web site, look for the site's privacy policy.
Many sites use SSL or secure sockets layer, to encrypt
information. Protecting your privacy.
![Page 13: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/13.jpg)
Keep software up to date:
If the seller releases patches for the software
operating your device, install them as soon as possible.
Installing them will prevent attackers from being able to take
advantage. Use good passwords: Select passwords that will
be difficult for thieves to guess. Do not choose options that
allow your computer to remember your passwords. How
can we protect?
Disable remote connectivity:
Some PDA’s and phones are equipped with wireless
technologies, such as Bluetooth, that can be used to connect
to other devices or computers. You should disable these
features when they are not in use.
![Page 14: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/14.jpg)
Advantages of cyber security
It will defend us from critical attacks.
It helps us to browse the safe website.
Internet security process all the incoming and outgoing data on our
computer.
![Page 15: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/15.jpg)
Challenges of cyber security
Challenges of cyber security Explosion of computer and
broadband internet availability .
Low priority of security for software developers.
Challenge of timely patching vulnerabilities on all systems.
![Page 16: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/16.jpg)
Safety tips to cyber Crime
Use antivirus software’s
insert firewalls
uninstall unnecessary software
check security settings
![Page 17: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/17.jpg)
IT Act,2000 Enacted on 17th May 2000- India is 12th
nation in the world to adopt cyber laws. It was amended in 2008.
It involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code and other Acts.
![Page 18: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/18.jpg)
![Page 19: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/19.jpg)
Cyber Law of European Union
Cyber crimes can involve criminal activities that are traditional
in nature, such as theft, fraud, forgery, defamation and
mischief.
In Simple way we can say that cyber crime is unlawful acts
wherein the computer is either a tool or a target or both .
The abuse of computers has also given birth to a gamut of
new age crimes that are addressed by the Information
Technology Act, 2000.
![Page 20: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/20.jpg)
European Union criminal lawArticle 2 – Illegal access
Article 3 – Illegal interception
Article 4 – Data interference
DesigArticle 5 – System interference
Article 6 – Misuse of devices
Article 7 – Computer-related forgery
Article 8 – Computer-related fraud
![Page 21: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/21.jpg)
Case Study-1
Case of Child Pornography:-
Culprit: David.v.mazinta
Year: In 2001
Article: under Article 8
• Offences related to child pornography
![Page 22: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/22.jpg)
The case is related to cyber crime as the internet is being
highly used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access to
internet, more children would be using the internet and
more are the chances of falling victim to the aggression of
pedophiles.
Caught by Inter Pole
Punishment: Sent to jail for 5 years.
![Page 23: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/23.jpg)
Case Study-2
Case: SWEDEN Citibank Call Center Fraud
€ 3,50,000 from accounts of four customers were dishonestly transferred
to bogus accounts
![Page 24: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/24.jpg)
Contd... In such cases, preliminary investigations do not
reveal that the criminals had any crime history.
Customer education is very important so
customers do not get taken for a ride.
So , under the EUROPEAN ACT 227-24,
Those employees were punished and were
imprisoned for 7 years.
![Page 25: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/25.jpg)
Positive Initiatives & Recommendations
Mumbai Cyber lab is a joint initiative ofMumbai police and NASSCOM has been setup.
Stricter provisions for online offencesrequired as compared to offline mode.
More Public awareness campaigns
Training of police officers to effectivelycombat cyber crimes.
![Page 26: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/26.jpg)
Intellectual property
![Page 27: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/27.jpg)
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Meaning
![Page 28: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/28.jpg)
Categories of Intellectual Property
Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of sourceCopyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, dance, artistic works such as drawings, paintings, photographs , sculptures, and architectural designs
![Page 29: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/29.jpg)
Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs.
Cont…
![Page 30: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/30.jpg)
Intellectual Property rights provide an exclusive right to stop others.
Intellectual Property right holder may provide licenses to others.
![Page 31: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/31.jpg)
Intellectual Property Right
Intellectual Property Rights, by providing exclusive rights to the inventor or creator, encourages more and more people to invest time, efforts and money in such innovations and creations.
![Page 32: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/32.jpg)
Patents and Trademarks
Patents are the primary means of protecting an original invention/design.
The right to exclusively produce, use and /or market a product, process or any improvement.
Invention is patentable if its new, useful and not obvious.
Any symbol, logo, word, sound, color, design, or other device that is used to identify a business or a product is TRADEMARK.
It has a longer life than a patent.
![Page 33: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/33.jpg)
What is “copyright”?
Copyright is a legal term describing rights given to creators for their literary and artistic works.
![Page 34: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/34.jpg)
Cont…“The statutory privilege extended to creators of works that are fixed in a tangible medium of expression.”
(Bruwelheide, 1995)
![Page 35: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/35.jpg)
Copyrights
• Copyright is a form of protection given to authors/creators of original works.
• This property right can be sold or transferred to others.
• Copyright is a legal protection for the authors of “original works of authorship”.
• Copyright protects a creator’s work from being copied, distributed, or adapted without the permission of the copyright holder
![Page 36: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/36.jpg)
What is covered by copyright?
literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture;and advertisements, maps and technical drawings.
![Page 37: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/37.jpg)
What is covered by copyright?
literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture;and advertisements, maps and technical drawings.
![Page 38: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/38.jpg)
What is not covered by copyright?
•ideas•facts•recipes•blank forms•stock literary devices•works lacking originality (e.g. the phone book)•names, titles or short phrases•works from the federal government
![Page 39: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/39.jpg)
Limitations on Copyright
Library and classroom exemptions
Fair use
![Page 40: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/40.jpg)
Duration of CopyrightCopyright in a literary work, lasts for the-
Author’s lifetime plus 50 years from the end ofThe calendar year in which the author dies 50 years for films and sound recordings 25 years for typographical arrangements of a published edition
![Page 41: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/41.jpg)
Cont…
Moral rights last for as long as Copyright and can not be assignedAn author may waive his/her moral rights by signing an agreement to that effect
![Page 42: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/42.jpg)
Importance of copyright
Respect intellectual rights of creators of informationReward creativity of authors, artists, musicians, etc.Legal mandateModel proper behavior for students, teachers, and other members of educational community
![Page 43: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/43.jpg)
Conclusion Cybercrime is indeed getting the recognition it deserves. However,it is not going to restricted that easily. In fact, it is highly likely thatcybercrime and its hackers will continue developing and upgradingto stay ahead of the law. So, to make us a safer we must needcyber security.
Intellectual Property Rights, by providing exclusive rights to theinventor or creator, encourages more and more people to investtime, efforts and money in such innovations and creations.
Copyright is a form of protection given to authors/creators of original works.Copyright protects a creator’s work from being copied, distributed, oradapted without the permission of the copyright holder.
![Page 44: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/44.jpg)
References http://www.ipindia.nic.in
http://www.itrlwaw.com
http://www.fbi.nic.in
-CyberCrime@IPA (Council of
Europe) 2012: Article 15 –
conditions and safeguards
http://www.coe.int/
![Page 45: Information Technology and IT act](https://reader030.fdocuments.in/reader030/viewer/2022032616/55a68be71a28abad7d8b456c/html5/thumbnails/45.jpg)