information technology and it act

45
Seminar on Information Technology Act Presented By Presented To Divesh Mewara Mr. Pankaj Dadheech 11ESKCS045 Reader

Upload: divesh-mewara

Post on 15-Jul-2015

185 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Information Technology and IT act

Seminar on Information Technology Act

Presented By Presented ToDivesh Mewara Mr. Pankaj Dadheech11ESKCS045 Reader

Page 2: Information Technology and IT act

Contents Cyber Crime

Cyber Crime in India

Cyber Crime in USA

Cyber Crime in UK

IT Act

Positive Initiatives & Recommendations

Intellectual Property

Patents and Trademarks

Copyrights

Page 3: Information Technology and IT act

Cyber Crime

• Cybercrime is defined as a crime in which a computer is the

object of the crime (hacking, phishing, spamming) or is used as a

tool to commit an offence (child pornography, hate crimes).

• Cybercriminals may use computer technology to access personal

information, business trade secrets, or use the Internet for

exploitive or malicious purposes. Criminals can also use

computers for communication and document or data storage.

• It mainly consists of unauthorized access to computer systems,

data alteration, data destruction, data theft etc.

• The first recorded cyber crime took place in the year 1820.

Page 4: Information Technology and IT act

Types of Cybercrime

1.HACKING :

Hacking in simple terms means an illegal intrusion into a

computer system and/or network. It is also known as

CRACKING. Government websites are the hot targets of the

hackers due to the press coverage, it receives. Hackers enjoy

the media coverage.

2.CHILD PORNOGRAPHY:

The Internet is being highly used by its abusers to reach and

abuse children sexually, worldwide. . As more homes have

access to internet, more children would be using the internet

and more are the chances of falling victim to the aggression of

pedophiles.

Page 5: Information Technology and IT act

Types of Cybercrime

3.COMPUTER VANDALISM:

Damaging or destroying data rather than stealing or misusing

them is called cyber vandalism. Transmitting virus: These are

programs that attach themselves to a file and then circulate .

They usually affect the data on a computer, either by altering or

deleting it against properties.

Page 6: Information Technology and IT act

Types of Cybercrim

4.SOFTWARE PIRACY:

Theft of software through the illegal copying of genuine

programs or the counterfeiting and distribution of products

intended to pass for the original.

Page 7: Information Technology and IT act

Cyber Crime in India

• The major Cyber Crimes reported, in India, are phishing, Spam, hacking, Computer Virus and Worms, Denial of Services, Defacement of websites.

• Nearly $4 billion in direct financial losses country every year.

• 29.9 million people fell victim to cybercrime.

• 3 in 5 online adults (60%) have been a victim of Cybercrime.

Page 8: Information Technology and IT act

Cyber cell office in India

Cyber cell offices are situated in india's major cities like1.chennai2.Banglore3Delhi4Mumbai5.Hyderabad6.pune

Page 9: Information Technology and IT act

Charges of solving of cyber crimes

•Charges of solving of different cyber crime in india varies according to their complexities.

•Because there are different kind of cyber crimes are exist in india.For ex:- credit card fraud

Atm card fraudIdentity theftPassword stealing.

Page 10: Information Technology and IT act

Cyber Crime in USA• USA is the most targeted country for cyber

attacks.

• Social networks as well as ecommerce sites are major targets.

• 14,348 website defacements in 2011.

• 4,150 .com domains were defaced during 2012.

• 15,000 sites hacked in 2012.

• USA is the number 1 country in the world for generating spam.

Page 11: Information Technology and IT act

Cyber Crime in European Union• UK is the one of the most targeted country

for cyber attacks after USA.

• 71 Million Internet Users .

• 35 Million Active Internet Users, up by 28% from 26 million in 2010.

• 20 Million users shop online on Online Shopping Sites.

Page 12: Information Technology and IT act

Cyber security

Cyber security involves protection of sensitive personal and

business information through prevention, detection, and

response to different online attacks.

Cyber security actually protects your personal information by

responding, detecting and preventing the attacks. Cyber

security

Privacy policy :

Before submitting your name, email address, or other personal

information on a web site, look for the site's privacy policy.

Many sites use SSL or secure sockets layer, to encrypt

information. Protecting your privacy.

Page 13: Information Technology and IT act

Keep software up to date:

If the seller releases patches for the software

operating your device, install them as soon as possible.

Installing them will prevent attackers from being able to take

advantage. Use good passwords: Select passwords that will

be difficult for thieves to guess. Do not choose options that

allow your computer to remember your passwords. How

can we protect?

Disable remote connectivity:

Some PDA’s and phones are equipped with wireless

technologies, such as Bluetooth, that can be used to connect

to other devices or computers. You should disable these

features when they are not in use.

Page 14: Information Technology and IT act

Advantages of cyber security

It will defend us from critical attacks.

It helps us to browse the safe website.

Internet security process all the incoming and outgoing data on our

computer.

Page 15: Information Technology and IT act

Challenges of cyber security

Challenges of cyber security Explosion of computer and

broadband internet availability .

Low priority of security for software developers.

Challenge of timely patching vulnerabilities on all systems.

Page 16: Information Technology and IT act

Safety tips to cyber Crime

Use antivirus software’s

insert firewalls

uninstall unnecessary software

check security settings

Page 17: Information Technology and IT act

IT Act,2000 Enacted on 17th May 2000- India is 12th

nation in the world to adopt cyber laws. It was amended in 2008.

It involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code and other Acts.

Page 18: Information Technology and IT act
Page 19: Information Technology and IT act

Cyber Law of European Union

Cyber crimes can involve criminal activities that are traditional

in nature, such as theft, fraud, forgery, defamation and

mischief.

In Simple way we can say that cyber crime is unlawful acts

wherein the computer is either a tool or a target or both .

The abuse of computers has also given birth to a gamut of

new age crimes that are addressed by the Information

Technology Act, 2000.

Page 20: Information Technology and IT act

European Union criminal lawArticle 2 – Illegal access

Article 3 – Illegal interception

Article 4 – Data interference

DesigArticle 5 – System interference

Article 6 – Misuse of devices

Article 7 – Computer-related forgery

Article 8 – Computer-related fraud

Page 21: Information Technology and IT act

Case Study-1

Case of Child Pornography:-

Culprit: David.v.mazinta

Year: In 2001

Article: under Article 8

• Offences related to child pornography

Page 22: Information Technology and IT act

The case is related to cyber crime as the internet is being

highly used by its abusers to reach and abuse children

sexually, worldwide. As more homes have access to

internet, more children would be using the internet and

more are the chances of falling victim to the aggression of

pedophiles.

Caught by Inter Pole

Punishment: Sent to jail for 5 years.

Page 23: Information Technology and IT act

Case Study-2

Case: SWEDEN Citibank Call Center Fraud

€ 3,50,000 from accounts of four customers were dishonestly transferred

to bogus accounts

Page 24: Information Technology and IT act

Contd... In such cases, preliminary investigations do not

reveal that the criminals had any crime history.

Customer education is very important so

customers do not get taken for a ride.

So , under the EUROPEAN ACT 227-24,

Those employees were punished and were

imprisoned for 7 years.

Page 25: Information Technology and IT act

Positive Initiatives & Recommendations

Mumbai Cyber lab is a joint initiative ofMumbai police and NASSCOM has been setup.

Stricter provisions for online offencesrequired as compared to offline mode.

More Public awareness campaigns

Training of police officers to effectivelycombat cyber crimes.

Page 26: Information Technology and IT act

Intellectual property

Page 27: Information Technology and IT act

Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.

Meaning

Page 28: Information Technology and IT act

Categories of Intellectual Property

Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of sourceCopyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, dance, artistic works such as drawings, paintings, photographs , sculptures, and architectural designs

Page 29: Information Technology and IT act

Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs.

Cont…

Page 30: Information Technology and IT act

Intellectual Property rights provide an exclusive right to stop others.

Intellectual Property right holder may provide licenses to others.

Page 31: Information Technology and IT act

Intellectual Property Right

Intellectual Property Rights, by providing exclusive rights to the inventor or creator, encourages more and more people to invest time, efforts and money in such innovations and creations.

Page 32: Information Technology and IT act

Patents and Trademarks

Patents are the primary means of protecting an original invention/design.

The right to exclusively produce, use and /or market a product, process or any improvement.

Invention is patentable if its new, useful and not obvious.

Any symbol, logo, word, sound, color, design, or other device that is used to identify a business or a product is TRADEMARK.

It has a longer life than a patent.

Page 33: Information Technology and IT act

What is “copyright”?

Copyright is a legal term describing rights given to creators for their literary and artistic works.

Page 34: Information Technology and IT act

Cont…“The statutory privilege extended to creators of works that are fixed in a tangible medium of expression.”

(Bruwelheide, 1995)

Page 35: Information Technology and IT act

Copyrights

• Copyright is a form of protection given to authors/creators of original works.

• This property right can be sold or transferred to others.

• Copyright is a legal protection for the authors of “original works of authorship”.

• Copyright protects a creator’s work from being copied, distributed, or adapted without the permission of the copyright holder

Page 36: Information Technology and IT act

What is covered by copyright?

literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture;and advertisements, maps and technical drawings.

Page 37: Information Technology and IT act

What is covered by copyright?

literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture;and advertisements, maps and technical drawings.

Page 38: Information Technology and IT act

What is not covered by copyright?

•ideas•facts•recipes•blank forms•stock literary devices•works lacking originality (e.g. the phone book)•names, titles or short phrases•works from the federal government

Page 39: Information Technology and IT act

Limitations on Copyright

Library and classroom exemptions

Fair use

Page 40: Information Technology and IT act

Duration of CopyrightCopyright in a literary work, lasts for the-

Author’s lifetime plus 50 years from the end ofThe calendar year in which the author dies 50 years for films and sound recordings 25 years for typographical arrangements of a published edition

Page 41: Information Technology and IT act

Cont…

Moral rights last for as long as Copyright and can not be assignedAn author may waive his/her moral rights by signing an agreement to that effect

Page 42: Information Technology and IT act

Importance of copyright

Respect intellectual rights of creators of informationReward creativity of authors, artists, musicians, etc.Legal mandateModel proper behavior for students, teachers, and other members of educational community

Page 43: Information Technology and IT act

Conclusion Cybercrime is indeed getting the recognition it deserves. However,it is not going to restricted that easily. In fact, it is highly likely thatcybercrime and its hackers will continue developing and upgradingto stay ahead of the law. So, to make us a safer we must needcyber security.

Intellectual Property Rights, by providing exclusive rights to theinventor or creator, encourages more and more people to investtime, efforts and money in such innovations and creations.

Copyright is a form of protection given to authors/creators of original works.Copyright protects a creator’s work from being copied, distributed, oradapted without the permission of the copyright holder.

Page 44: Information Technology and IT act

References http://www.ipindia.nic.in

http://www.itrlwaw.com

http://www.fbi.nic.in

-CyberCrime@IPA (Council of

Europe) 2012: Article 15 –

conditions and safeguards

http://www.coe.int/

Page 45: Information Technology and IT act