This website uses cookies to ensure you have the best experience. Learn more

Cyber Law Essay

3963 words - 16 pages

Report On

Cyber law
LEGAL ASPECTS OF MANAGEMENT

Submitted to:
Mr. Maneesh Yadav

Submitted by:
Ankita Bhatnagar (JL12PGDM030)

Introduction:
Computers and their use is a day to day activity of all the students, professionals, teachers, Universities, banks, Supermarkets, in the entertainment field, in medical profession and also in higher education. The use of this Weapon is spreading very widely in all parts of our society. As every weapon has two ways of operation. One is good and essential and the other are bad and not essential. Many times, whenever a new weapon is invented, many people use it unknowingly for the wrong purpose. So to aware them and to make the proper use of ...view middle of the document...

But he will not be liable for the offence under the IT Act, 2000. But this act would be classified as the cyber crime. Another example which can be seen is that, suppose a person cheats another person using the Internet. Then he shall be liable for cheating under section 420 of IPC but not under the IT Act, 2000. But his act would be commonly called as a cyber fraud but it can not be classified as the cyber crime. Cyber crimes can be classified as follows.

(a) Old crimes, committed on or through the new medium of the Internet. For example, cheating, fraud, misappropriation, defamation, pornography, threats, etc. committed on the Internet or through the Internet or with the help of internet, would fall under this category. These crimes are old but their place of operation is new, i.e. the Internet. The Internet with its speed and global access has made these crimes much easier, efficient, risk free, cheap and profitable to commit. These can be called as crimes “on” the Internet. (b) New crimes created with the Internet itself, such as hacking, planting viruses and IPR thefts. These can be called as the crimes “of” the Internet. (c) New crimes used for commission of old crimes. For instance, where hacking is committed to carry out cyber frauds. Computer crimes have also been classified by the nature of the usage of the computer. (a) Proper computer crimes such as hacking where a computer and network are essential for the commission of the offence. (b) Computer assisted crimes such as cyber pornography where the medium of the internet is used. (c) Crimes where the computer is only incidental for commission such as cyber fraud.

Though the IT Act, 2000 specifically defines and punishes only a few cyber crimes, it recognizes that there are other cyber crimes of cyberspace which are provided in the Indian Penal Code, 1860. It was perceived by out legislators that many of the offences in IPC ceased to apply cyberspace because the definition of “document” did not include within its domain “electronic records”. Hence it was found necessary by our law makers to modify the various provisions of IPC by specifically making “electronic records”.

Cyber Law
Cyber law refers to all the legal and regulatory aspects of internet and the World Wide Web. Cyber space is governed by a system of law and regulations called cyber law. Cyber law is needed because of the following reasons

(a) Today millions of people are using the internet all over the world. Because of global communications, internet is misused for criminal activities which require regulation. Today many disturbing and unethical things are happening in the cyber space which are known as cyber crimes. People with intelligence and having bad intensions are misusing the aspect of internet.

Software Piracy
Software piracy is unauthorized duplication, distribution and use of computer software. Copying of the software without purchasing it is known as pirating the software and such a copy of...

Other assignments on Cyber Law

Cyber Crime Essay

699 words - 3 pages Cybercrime Name Institutional Affiliation Date Cyber Crime a 21st Century Problem Abstract Subsequent research has focused in establishing Cybercrime as an activity only for computer programmers. However, Cybercrime has recently expanded to appear as a full capital offense since it integrates multiple forms of criminal activities. Per se, Cybercrime has proved to be a social, economic, and political form of disturbance, or in other words

Disadvantages Of Technology Essay

673 words - 3 pages nuclear war, cyber crime and high growth of eye disease, increase of body weight and new transportation technology which has brought pollution and congestion in major cities. As we all know that we have entered into an era of new/ modern technology world which is equipped with super technology software through which we can work without employing manpower. On the other side, the world is facing terrorists threat and new technology invented by the

Cyber Pred

1403 words - 6 pages Cyber Predators Sexual predators have more access to children today than in the past. Through the internet Sexual offenders can connect with children more discreetly. Today, children are just as likely to socialize online as they are to meet in the mall or by going to other public places like the movies. Predators use the anonymity of the internet to their advantage since it allows them to become whoever they want. They target both girls and

Social Media

1551 words - 7 pages surround the social networking on a whole, you can be certain that there is going to be a negative side as well. From people giving information out that they should not, to people having there ID stolen and even cyber bulling. These are all negatives issues that can be faced when being on a social network. What is good though is that there are steps that can be taken by the user to help reduce the chances of this occurring. The first step is to

The Advantages Of The European Union

545 words - 3 pages presumed that countries that were trading partners were less likely to attack each other. This was known as the European Economic Community or ECC and was created in 1958. ("Europa.eu", 2013) The ECC became the EU in 1993, when what had previously been a purely economic partnership, melded into a political partnership spawning policy, development, and environmental concerns. The EU is based on the rule of law: everything is founded on

Week 2- Individual Paper-Information Use

620 words - 3 pages concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks. The flow of information plays a

Ethics

3009 words - 13 pages Alps. Yet even he realized early the commercial dominance of the U.S. and eventually migrated to the U.S. Impact of Net Value drivers on issues of the value  Reach –   Opt-in and opt-out - For example in the sale of private information such as bank account there details. This has been made a law in Europe but not in USA.   Privacy issues Government Control – The French Government shutdown yahoo’s Nazi Memorabilia

Communication In The Workplace

1179 words - 5 pages . The ability to present good and bad news, work with a variety of personalities, and coach employees is important in HRM. Specific job skills, such as computer skills, knowledge of employment law, writing and developing strategic plans, and general critical-thinking skills are important in any type of management, but especially in human resource management. A sense of fairness and strong ethics will make for the best HR manager. Because H R

Information Technology Acts

1432 words - 6 pages was found constitutional by the Supreme Court June 23, 2003 (Wikipedia, 2014). CIPA law aims to eliminate the availability of crude, obscene, or harmful material that children are exposed to in schools and libraries due to the advancements in technological information relating to the World Wide Web (fcc.gov, n.d.)(Wallace, 2013). CIPA requires that internet safety protocols (filters/guidelines) are established and implemented in order for

Homeland Security Committee

764 words - 4 pages Cyber security, Infrastructure Protection, and Security Technologies- Chaired by Daniel Lungren Emergency Preparedness, Response, and Communications- Chaired by Gus Bilirakis Oversight, Investigations, and Management- Chaired by Michael McCaul Transportation Security- Chaired by Mike Rogers There Jurisdiction The Committee on Homeland Security was established in 2002 to provide Congressional oversight for the U.S. Department of

E-Commerce

2118 words - 9 pages as exchange control, protection of telecommunication monopolies, restrictive trades practice and prohibitions * Absence of cyber law * Peoples mindset and very slow expensive internet service * Enterprise managers lack of initiative and leadership in taking advantage of e-Commerce Recommendations The assessment of E-Commerce environmental forces of Bangladesh leave us some room to recommend some steps and measures, that should

Similar Documents

Cyber Crimes Essay

1600 words - 7 pages The internet has changed how organizations conduct business. Within moments information exchange occurs and a profit is made. It has changed how crimes are investigated and solved by law enforcement agencies. Unfortunately, it has also changed how criminals conduct their crimes- through cyberspace. President Obama, Sony executives, Target organization and many of its’ customers have all been victims of some form of cyber crimes. This

Juvenile Justice Case Law Essay

1290 words - 6 pages Prairie passed a law on November 22, 2007, in response to the incident. The law prohibits any harassment that utilizes an electronic medium, including the Internet, text messaging services, pagers, and similar devices. Violations of the ordinance are treated as misdemeanors, with fines of up to $500 and up to 90 days imprisonment. There are laws that include statutes that mandate that school boards must adopt policies to address cyber-bullying

Private And Public Sector Cyber Security Needs

2198 words - 9 pages agencies, private sectors, and especially individual citizens. Since people are usually the ones attacked they should be included in cybersecurity response actions by reporting attacks and hardening their systems. Since people don’t often report cyber-attacks and threats to anyone, cybersecurity is losing valuable information about attacks. If law enforcement and the military were to find a way to create a rapid flow of data and communication across

Ethical Issues Arising From The Intersection Of Law, Compliance & Investigations

417 words - 2 pages day. Cybercrimes such as credit card fraud cases, accessing someone’s account, stealing user credentials from social networking sites and sharing copyright information illegally. There are several Information Technology laws such as intellectual property laws, privacy laws and computer crime laws. The law that is enforced for employee workplace communication environment is under fact sheet 7, 2012, Privacy Rights Clearinghouse. Computer Security