information technology and it act
TRANSCRIPT
Seminar on Information Technology Act
Presented By Presented ToDivesh Mewara Mr. Pankaj Dadheech11ESKCS045 Reader
Contents Cyber Crime
Cyber Crime in India
Cyber Crime in USA
Cyber Crime in UK
IT Act
Positive Initiatives & Recommendations
Intellectual Property
Patents and Trademarks
Copyrights
Cyber Crime
• Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a
tool to commit an offence (child pornography, hate crimes).
• Cybercriminals may use computer technology to access personal
information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use
computers for communication and document or data storage.
• It mainly consists of unauthorized access to computer systems,
data alteration, data destruction, data theft etc.
• The first recorded cyber crime took place in the year 1820.
Types of Cybercrime
1.HACKING :
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as
CRACKING. Government websites are the hot targets of the
hackers due to the press coverage, it receives. Hackers enjoy
the media coverage.
2.CHILD PORNOGRAPHY:
The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. . As more homes have
access to internet, more children would be using the internet
and more are the chances of falling victim to the aggression of
pedophiles.
Types of Cybercrime
3.COMPUTER VANDALISM:
Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting virus: These are
programs that attach themselves to a file and then circulate .
They usually affect the data on a computer, either by altering or
deleting it against properties.
Types of Cybercrim
4.SOFTWARE PIRACY:
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
Cyber Crime in India
• The major Cyber Crimes reported, in India, are phishing, Spam, hacking, Computer Virus and Worms, Denial of Services, Defacement of websites.
• Nearly $4 billion in direct financial losses country every year.
• 29.9 million people fell victim to cybercrime.
• 3 in 5 online adults (60%) have been a victim of Cybercrime.
Cyber cell office in India
Cyber cell offices are situated in india's major cities like1.chennai2.Banglore3Delhi4Mumbai5.Hyderabad6.pune
Charges of solving of cyber crimes
•Charges of solving of different cyber crime in india varies according to their complexities.
•Because there are different kind of cyber crimes are exist in india.For ex:- credit card fraud
Atm card fraudIdentity theftPassword stealing.
Cyber Crime in USA• USA is the most targeted country for cyber
attacks.
• Social networks as well as ecommerce sites are major targets.
• 14,348 website defacements in 2011.
• 4,150 .com domains were defaced during 2012.
• 15,000 sites hacked in 2012.
• USA is the number 1 country in the world for generating spam.
Cyber Crime in European Union• UK is the one of the most targeted country
for cyber attacks after USA.
• 71 Million Internet Users .
• 35 Million Active Internet Users, up by 28% from 26 million in 2010.
• 20 Million users shop online on Online Shopping Sites.
Cyber security
Cyber security involves protection of sensitive personal and
business information through prevention, detection, and
response to different online attacks.
Cyber security actually protects your personal information by
responding, detecting and preventing the attacks. Cyber
security
Privacy policy :
Before submitting your name, email address, or other personal
information on a web site, look for the site's privacy policy.
Many sites use SSL or secure sockets layer, to encrypt
information. Protecting your privacy.
Keep software up to date:
If the seller releases patches for the software
operating your device, install them as soon as possible.
Installing them will prevent attackers from being able to take
advantage. Use good passwords: Select passwords that will
be difficult for thieves to guess. Do not choose options that
allow your computer to remember your passwords. How
can we protect?
Disable remote connectivity:
Some PDA’s and phones are equipped with wireless
technologies, such as Bluetooth, that can be used to connect
to other devices or computers. You should disable these
features when they are not in use.
Advantages of cyber security
It will defend us from critical attacks.
It helps us to browse the safe website.
Internet security process all the incoming and outgoing data on our
computer.
Challenges of cyber security
Challenges of cyber security Explosion of computer and
broadband internet availability .
Low priority of security for software developers.
Challenge of timely patching vulnerabilities on all systems.
Safety tips to cyber Crime
Use antivirus software’s
insert firewalls
uninstall unnecessary software
check security settings
IT Act,2000 Enacted on 17th May 2000- India is 12th
nation in the world to adopt cyber laws. It was amended in 2008.
It involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code and other Acts.
Cyber Law of European Union
Cyber crimes can involve criminal activities that are traditional
in nature, such as theft, fraud, forgery, defamation and
mischief.
In Simple way we can say that cyber crime is unlawful acts
wherein the computer is either a tool or a target or both .
The abuse of computers has also given birth to a gamut of
new age crimes that are addressed by the Information
Technology Act, 2000.
European Union criminal lawArticle 2 – Illegal access
Article 3 – Illegal interception
Article 4 – Data interference
DesigArticle 5 – System interference
Article 6 – Misuse of devices
Article 7 – Computer-related forgery
Article 8 – Computer-related fraud
Case Study-1
Case of Child Pornography:-
Culprit: David.v.mazinta
Year: In 2001
Article: under Article 8
• Offences related to child pornography
The case is related to cyber crime as the internet is being
highly used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access to
internet, more children would be using the internet and
more are the chances of falling victim to the aggression of
pedophiles.
Caught by Inter Pole
Punishment: Sent to jail for 5 years.
Case Study-2
Case: SWEDEN Citibank Call Center Fraud
€ 3,50,000 from accounts of four customers were dishonestly transferred
to bogus accounts
Contd... In such cases, preliminary investigations do not
reveal that the criminals had any crime history.
Customer education is very important so
customers do not get taken for a ride.
So , under the EUROPEAN ACT 227-24,
Those employees were punished and were
imprisoned for 7 years.
Positive Initiatives & Recommendations
Mumbai Cyber lab is a joint initiative ofMumbai police and NASSCOM has been setup.
Stricter provisions for online offencesrequired as compared to offline mode.
More Public awareness campaigns
Training of police officers to effectivelycombat cyber crimes.
Intellectual property
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Meaning
Categories of Intellectual Property
Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of sourceCopyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, dance, artistic works such as drawings, paintings, photographs , sculptures, and architectural designs
Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs.
Cont…
Intellectual Property rights provide an exclusive right to stop others.
Intellectual Property right holder may provide licenses to others.
Intellectual Property Right
Intellectual Property Rights, by providing exclusive rights to the inventor or creator, encourages more and more people to invest time, efforts and money in such innovations and creations.
Patents and Trademarks
Patents are the primary means of protecting an original invention/design.
The right to exclusively produce, use and /or market a product, process or any improvement.
Invention is patentable if its new, useful and not obvious.
Any symbol, logo, word, sound, color, design, or other device that is used to identify a business or a product is TRADEMARK.
It has a longer life than a patent.
What is “copyright”?
Copyright is a legal term describing rights given to creators for their literary and artistic works.
Cont…“The statutory privilege extended to creators of works that are fixed in a tangible medium of expression.”
(Bruwelheide, 1995)
Copyrights
• Copyright is a form of protection given to authors/creators of original works.
• This property right can be sold or transferred to others.
• Copyright is a legal protection for the authors of “original works of authorship”.
• Copyright protects a creator’s work from being copied, distributed, or adapted without the permission of the copyright holder
What is covered by copyright?
literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture;and advertisements, maps and technical drawings.
What is covered by copyright?
literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture;and advertisements, maps and technical drawings.
What is not covered by copyright?
•ideas•facts•recipes•blank forms•stock literary devices•works lacking originality (e.g. the phone book)•names, titles or short phrases•works from the federal government
Limitations on Copyright
Library and classroom exemptions
Fair use
Duration of CopyrightCopyright in a literary work, lasts for the-
Author’s lifetime plus 50 years from the end ofThe calendar year in which the author dies 50 years for films and sound recordings 25 years for typographical arrangements of a published edition
Cont…
Moral rights last for as long as Copyright and can not be assignedAn author may waive his/her moral rights by signing an agreement to that effect
Importance of copyright
Respect intellectual rights of creators of informationReward creativity of authors, artists, musicians, etc.Legal mandateModel proper behavior for students, teachers, and other members of educational community
Conclusion Cybercrime is indeed getting the recognition it deserves. However,it is not going to restricted that easily. In fact, it is highly likely thatcybercrime and its hackers will continue developing and upgradingto stay ahead of the law. So, to make us a safer we must needcyber security.
Intellectual Property Rights, by providing exclusive rights to theinventor or creator, encourages more and more people to investtime, efforts and money in such innovations and creations.
Copyright is a form of protection given to authors/creators of original works.Copyright protects a creator’s work from being copied, distributed, oradapted without the permission of the copyright holder.
References http://www.ipindia.nic.in
http://www.itrlwaw.com
http://www.fbi.nic.in
-CyberCrime@IPA (Council of
Europe) 2012: Article 15 –
conditions and safeguards
http://www.coe.int/