0% found this document useful (0 votes)
23 views3 pages

Cyber Unit 5

Uploaded by

Agrup Singa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Cyber Unit 5

Uploaded by

Agrup Singa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Introduction to Cyber Laws


Cyber laws are a set of legal guidelines and regulations that govern the use of the
internet, technology, and electronic devices. These laws address issues such as privacy,
intellectual property, cybersecurity, data protection, and online criminal activities.

Scope of Cyber Laws:

1. Privacy Protection: Laws governing personal data and online privacy.


2. Intellectual Property: Legal protection of digital content, software, and inventions.
3. Cybercrimes: Laws related to hacking, fraud, identity theft, and unauthorized
access.
4. Regulations for Electronic Transactions: Laws ensuring the legality and security
of online transactions.
5. Cyber Security Laws: Regulations aimed at preventing and addressing
cyberattacks.

2. E-Commerce and E-Governance


E-Commerce: The buying and selling of goods or services over the internet. It involves
online transactions and digital payments.
E-Governance: The use of digital platforms and technology by government entities to
provide services, communicate with citizens, and improve governance efficiency.

E-Commerce Models:

1. B2C (Business to Consumer): Businesses sell directly to consumers.


2. B2B (Business to Business): Businesses sell to other businesses.
3. C2C (Consumer to Consumer): Consumers sell to other consumers (e.g., eBay).
4. C2B (Consumer to Business): Consumers offer services or products to
businesses.

E-Governance Models:

1. Government to Citizen (G2C): Services provided by the government to citizens


(e.g., online tax filing).
2. Government to Business (G2B): Services provided to businesses (e.g., online
registration).
3. Government to Government (G2G): Exchange of information between
government bodies.
Key Notes for Memorization:

● E-Commerce: Online buying and selling.


● Models: B2C, B2B, C2C, C2B.
● E-Governance: Government use of tech for service.
● Models: G2C, G2B, G2G.

3. Certifying Authority and Controller


A Certifying Authority (CA) is an organization responsible for issuing digital certificates,
which are used to authenticate the identity of individuals or organizations online.
The Controller refers to the entity responsible for the management and oversight of
data, ensuring that it is processed according to legal standards, such as data protection
laws.

Role of Certifying Authority (CA):

1. Digital Certificates: Provides certificates that verify the identity of users and
websites.
2. Public Key Infrastructure (PKI): Manages keys for encryption and decryption.
3. Trust Chain: Ensures that digital signatures are trusted.

Role of Controller:

1. Data Processing: Ensures data is processed according to legal regulations.


2. Compliance: Ensures adherence to data protection laws and standards.

Key Notes for Memorization:

● CA: Issues certificates for online authentication.


● Controller: Manages data processing and compliance.

4. Offences Under IT Act

The Information Technology Act, 2000 (IT Act) is the primary law in India that
addresses cybercrimes and electronic commerce. It defines various offences related to
electronic data, digital signatures, and online activities.

Key Offences Under IT Act:

1. Hacking (Section 66): Unauthorized access to computer systems.


2. Identity Theft (Section 66C): Using someone’s identity without permission.
3. Cyber Terrorism (Section 66F): Attacks on computer systems to threaten national
security.
4. Data Theft (Section 43): Unauthorized access to data and stealing or damaging it.
5. Publishing Obscene Material (Section 67): Distributing obscene content via
electronic means.

5. Computer Offences and Its Penalty Under IT Act 2000

Computer offences under the IT Act, 2000 refer to illegal activities involving computers,
digital devices, and the internet. These crimes include hacking, data theft, cyberstalking,
and more.

Penalties for Computer Offences:

1. Hacking: Imprisonment up to 3 years and/or fine up to ₹2 lakh.


2. Identity Theft: Imprisonment up to 3 years and/or fine up to ₹1 lakh.
3. Cyber Terrorism: Imprisonment up to life.
4. Obscene Content: Imprisonment up to 5 years and/or fine up to ₹10 lakh.
5. Data Theft: Imprisonment up to 3 years and/or fine up to ₹2 lakh.

6. Intellectual Property Rights in Cyberspace

Intellectual Property Rights (IPR) in cyberspace protect creations of the mind, such as
inventions, software, digital content, trademarks, and patents, in the digital environment.

Types of IPR in Cyberspace:

1. Copyrights: Protection of digital content, such as books, music, and software.


2. Trademarks: Protecting brand names, logos, and digital goods.
3. Patents: Protecting innovations and inventions in technology.
4. Trade Secrets: Protecting proprietary business information.

Challenges in Cyberspace:

1. Piracy: Unauthorized distribution of digital content.


2. Infringement: Unauthorized use of intellectual property.

You might also like