0% found this document useful (0 votes)
37 views15 pages

Audit Course Sem 8

The Audit Course Report on 'Cyber Laws and Use of Social Media' submitted to Savitribai Phule Pune University outlines the significance of understanding cyber laws in the digital landscape, highlighting their role in regulating online interactions and protecting privacy rights. It discusses the evolution of India's IT Act, the implications of social media, and the challenges posed by cybercrimes, emphasizing the need for ethical engagement and compliance with regulations. The report aims to provide a foundational understanding of the interconnected dynamics between cyber laws and social media for individuals and organizations.

Uploaded by

dhruv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views15 pages

Audit Course Sem 8

The Audit Course Report on 'Cyber Laws and Use of Social Media' submitted to Savitribai Phule Pune University outlines the significance of understanding cyber laws in the digital landscape, highlighting their role in regulating online interactions and protecting privacy rights. It discusses the evolution of India's IT Act, the implications of social media, and the challenges posed by cybercrimes, emphasizing the need for ethical engagement and compliance with regulations. The report aims to provide a foundational understanding of the interconnected dynamics between cyber laws and social media for individuals and organizations.

Uploaded by

dhruv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Audit Course Report

On

“Cyber Laws and Use of Social Media”


Submitted to
Savitribai Phule Pune University, Pune
in
partial fulfillment of the requirements for the award of the degree of
Bachelor of Engineering in
Department of Information Technology
BE [B] Semester II
Submitted By
Mr. Dhruv Gangal
Mr. Shashi Ranjan
Mr. Utkarsh Singh
Mr. Dhanandri Mane
Mr. Parth Jhanwar

Guided By
Mrs. Abhilasha Kore

Department of Information Technology


D. Y. Patil College of Engineering Akurdi, Pune-44
AY 2023-24

1
CERTIFICATE

This is to certify that the audit course entitled “Cyber Laws and Use of Social
Media” is a bonified work done under my guidance by E semester II students of this institute
and is submitted to Savitribai Phule Pune University, Pune for the partial fulfillment of
the requirements for the award of degree of Bachelor of Engineering in Information
Technology.

Mr. Utkarsh Singh Mr. Dhruv Gangal


Mr. Shashi Ranjan Mr. Parth Jhanwar
Mr. Dhanandri Mane

ASST. PROF. Abhilasha Kore DR. PREETI PATIL


Audit Course Coordinator Head of Department

2
ACKNOWLEDGEMENT

With immense pleasure, we are presenting this Audit Course Report as part of the
curriculum of B.E. Information Technology. I wish to thank all the people who gave me
unending support right from the stage the idea was conceived. We take this opportunity to
convey our sincere thanks to our beloved Principal Dr. P. Malathi for her continual support
and encouragement that made the Audit Course Presentation a great success. We express our
profound thanks to our respected Head of the Department, Dr. Preeti Patil whose advice and
valuable guidance helped us in making this presentation interesting and successful one.
We also thank all those who have directly or indirectly guided and helped us
in preparation of this Audit Course presentation. Last but not the least we thank our beloved
parents, friends and well-wishers who helped us to do this presentation by their kind help and
assistance.

3
Introduction

In our rapidly evolving digital landscape, the intersection of cyber laws and social media has
become increasingly prominent, shaping the way individuals and organizations interact,
communicate, and conduct business online. This introduction serves as a primer to
understand the key principles and implications of cyber laws alongside the pervasive
influence of social media platforms.

Cyber laws encompass a broad spectrum of regulations designed to govern and protect digital
interactions, assets, and privacy rights. These laws are essential in maintaining order, security,
and ethical conduct in cyberspace. They cover diverse areas such as data protection,
intellectual property rights, online defamation, cybercrimes, and digital governance.
Understanding cyber laws is crucial for safeguarding personal and organizational interests in
the digital realm.

Concurrently, social media has revolutionized communication by connecting billions of


people worldwide and enabling instant sharing of information, opinions, and experiences.
Platforms like Facebook, Twitter, Instagram, LinkedIn, and TikTok have transformed how
individuals express themselves, engage with content, and build communities. Moreover,
social media has become integral to marketing strategies, brand promotion, and even political
discourse.

However, the proliferation of social media also raises significant legal and ethical
considerations. Issues such as data privacy breaches, cyberbullying, misinformation
dissemination, and copyright infringement have sparked debates and prompted regulatory
interventions. Consequently, users, businesses, and policymakers must navigate these
complexities while harnessing the benefits of social media responsibly.

As society grapples with the ever-evolving digital landscape, the synergy between cyber laws
and social media becomes paramount. By understanding and adhering to relevant regulations,
individuals and organizations can mitigate risks, protect rights, and foster a safer online
environment. Simultaneously, leveraging social media effectively empowers users to connect,
collaborate, and innovate in the digital age.

4
Objectives

The objective of the above topic is to provide a concise and informative introduction to the
intertwined realms of cyber laws and social media. It aims to:

1. Highlight the importance of understanding cyber laws in regulating digital


interactions, protecting privacy rights, and maintaining ethical conduct online.

2. Explore the pervasive influence of social media platforms in shaping communication,


community building, and business strategies.

3. Identify key legal and ethical considerations arising from the use of social media,
including data privacy, cyberbullying, misinformation, and copyright issues.

4. Emphasize the need for individuals, businesses, and policymakers to navigate these
complexities responsibly while harnessing the benefits of social media effectively.

5. Advocate for the promotion of digital citizenship, ethical standards, and regulatory
compliance to foster a safer and more equitable online environment.

6. Overall, the objective is to provide readers with a foundational understanding of the


interconnected dynamics between cyber laws and social media and to underscore the
importance of ethical engagement and regulatory compliance in the digital age.

5
Introduction to IT Act

The evolution of India's Information Technology Act (IT Act) reflects the imperative to
address the challenges posed by the burgeoning digital landscape. Enacted in 2000, the IT Act
marked a seminal moment in India's legal framework, providing a comprehensive regulatory
framework for electronic governance, digital signatures, cybercrimes, and data protection. Its
genesis lies in the recognition of the need to facilitate e-commerce, protect digital
transactions, and combat cyber threats in an increasingly interconnected world.

Under the IT Act, various authorities are empowered to enforce its provisions and ensure
compliance. The Ministry of Electronics and Information Technology (MeitY) serves as the
central authority responsible for formulating policies, administering the Act, and coordinating
with other agencies. The Computer Emergency Response Team (CERT-In) operates as the
national nodal agency for cybersecurity, responding to cyber incidents, providing alerts, and
promoting cybersecurity awareness. Additionally, law enforcement agencies such as the
police have jurisdiction to investigate cybercrimes and enforce penalties prescribed under the
Act.

Penalties and offences outlined in the IT Act encompass a wide range of activities, including
unauthorized access, data theft, hacking, cyber terrorism, and online fraud. Amendments to
the Act have been introduced periodically to address emerging threats, enhance data
protection mechanisms, and align with international standards. Notable amendments include
the insertion of Section 66A (dealing with offensive online communication) and Section 69A
(empowering the government to block online content) in 2008.

In the realm of jurisdiction, traditional principles are augmented by novel challenges posed
by cyberspace. While territorial jurisdiction remains fundamental, the borderless nature of the
internet necessitates considerations of extra-territorial jurisdiction. This entails determining
the extent to which a country can assert legal authority over activities occurring beyond its
borders, such as cross-border cybercrimes or disputes involving multinational corporations.

Case laws on cyberspace jurisdiction provide valuable insights into the evolving
jurisprudence in this domain. Landmark cases like the 'Yahoo! v. LICRA' and 'Google Spain
v. AEPD' have shaped the contours of jurisdiction in the digital era, establishing precedents
for determining applicable laws, enforcement mechanisms, and the rights of individuals in
online spaces.

6
Cyber Law : International Perspective

Certainly! Here's a brief summary covering the mentioned topics related to "Cyber Law:
International Perspective":

Electronic Data Interchange (EDI): Concept and Legal Issues

- EDI refers to the electronic exchange of business documents between trading partners.

- Legal issues surrounding EDI often revolve around issues such as data privacy, security,
authenticity, and enforceability of electronic transactions.

UNCITRAL Model Law

- The United Nations Commission on International Trade Law (UNCITRAL) developed a


Model Law on Electronic Commerce to provide a legal framework for electronic transactions.

- It addresses issues such as the formation and validity of contracts, electronic signatures, and
the liability of service providers.

Electronic Signature Laws of Major Countries

- Many countries have enacted laws recognizing electronic signatures as legally binding.

- These laws establish criteria for the validity and enforceability of electronic signatures in
various transactions.

Cryptography Laws

- Cryptography laws regulate the use and export of cryptographic technologies to ensure
national security and prevent unauthorized access to sensitive information.

- These laws vary widely across different countries, with some imposing restrictions on
cryptographic products and others promoting their development and use.

Cyber Laws of Major Countries

- Cyber laws encompass a broad range of legal frameworks governing various aspects of
cyberspace, including cybercrime, data protection, intellectual property rights, and internet
governance.

7
Incentives for Creators

Cybercrime refers to criminal activities carried out using computers or the internet. It
encompasses a wide range of illegal activities, including fraud, theft, hacking, and cyber
terrorism. These crimes are distinguished from traditional crimes by their reliance on digital
technology and the internet for execution.

Traditional crimes typically involve physical acts, whereas cybercrimes are committed
through electronic means, often with anonymity and across international borders. Cybercrimes
can be categorized into various types, including cyber frauds (such as phishing scams and
identity theft), cyber thefts (like data breaches and online financial theft), and cyber stalking
(harassment or stalking through digital channels).

Cyber terrorism involves the use of digital technology to conduct terrorist activities, such as
disrupting critical infrastructure or spreading fear and chaos through cyber attacks. This
includes hacking into government systems, launching malware attacks, or spreading
propaganda online.

Common tools and methods used in cybercrimes include hacking (unauthorized access to
computer systems), viruses, Trojans, worms (malicious software designed to infiltrate and
damage computers or networks), and denial-of-service (DoS) attacks (flooding a network or
server with traffic to disrupt service).

Cyber forensics plays a crucial role in investigating and solving computer-related crimes. It
involves collecting, analyzing, and presenting digital evidence in legal proceedings. Cyber
forensic experts use specialized tools and techniques to trace the origins of cyber attacks,
identify perpetrators, and reconstruct digital activities. This field is constantly evolving to keep
pace with advancements in technology and the increasing sophistication of cybercriminals.

1. Cybercrime Definition and Differentiation from Traditional Crime:


Cybercrime involves illegal activities conducted using computers, networks, and the
internet. These crimes can include hacking, identity theft, fraud, malware distribution, and
cyber terrorism.
Unlike traditional crimes, which often involve physical actions or tangible assets,
cybercrimes are committed through digital means, making them global in nature and often
difficult to trace.

8
Cybercrimes exploit vulnerabilities in computer systems and networks, allowing
perpetrators to remain anonymous and operate across international borders.

2. Types of Cybercrimes:
Cyber Frauds: This category includes various scams and schemes designed to deceive
individuals or organizations for financial gain. Examples include phishing attacks, where
attackers impersonate legitimate entities to steal sensitive information, and online auction
fraud, where buyers or sellers are deceived in online transactions.

Cyber Thefts: Cyber theft involves the unauthorized acquisition of data, money, or resources
from individuals, businesses, or governments. This can include data breaches, ransomware
attacks, and online banking fraud.

Cyber Stalking: Cyber stalking involves using digital communication channels, such as
social media, email, or messaging apps, to harass, intimidate, or monitor individuals. This can
include threats, unwanted messages, or the unauthorized tracking of someone's online
activities.

3. Cyber Terrorism:
Cyber terrorism refers to the use of digital technology to carry out terrorist activities. This
can include attacks on critical infrastructure, such as power grids or financial systems, as well
as propaganda dissemination, recruitment, and radicalization through online channels.

Cyber terrorists aim to create fear, chaos, and disruption by exploiting vulnerabilities in
computer systems and networks. These attacks can have severe economic, social, and political
consequences.

4. Tools and Methods:


Hacking: Unauthorized access to computer systems or networks to steal data, disrupt
operations, or cause damage.

Viruses, Trojans, Worms: Malicious software designed to infiltrate computers or networks,


often with the intent to steal information, control systems, or spread further malware.

9
Denial-of-Service (DoS) Attacks: Flooding a network or server with traffic to overwhelm its
capacity and disrupt services for legitimate users.

5. Cyber Forensics:
- Cyber forensics involves the collection, analysis, and presentation of digital evidence in
legal proceedings. This can include recovering deleted files, tracing network activity, and
identifying the source of cyber attacks.

- Cyber forensic experts use specialized tools and techniques to preserve, analyze, and
document digital evidence in a manner that is admissible in court.

- Cyber forensic investigations play a crucial role in identifying perpetrators, attributing


cyber attacks, and supporting law enforcement efforts to combat cybercrime.

Overall, cybercrime presents unique challenges due to its global nature, anonymity, and
reliance on digital technology. Effective prevention, detection, and prosecution of cybercrimes
require collaboration between law enforcement agencies, cybersecurity professionals, and
policymakers to develop robust legal frameworks, cybersecurity measures, and investigative
techniques.

10
Use of Social Media

Elements of Social Networks and Social Media Outlets


Social Networks:
Social networks are digital platforms that facilitate social interactions and connections among
users. Key elements of social networks include:

Profiles: Users create personal profiles containing information such as their name, bio, photos,
and interests.

Connections: Users establish connections with other users, forming their social network
through friend requests, follows, or connections.

Feeds: Central to social networks, feeds display content shared by users within a user's network
or based on their interests.

Messaging: Many social networks offer messaging features for private communication
between users.

Groups and Communities: Users can join or create groups based on shared interests or
affiliations, fostering community engagement.

Privacy Settings: Users have control over the visibility of their profile and content, with
options to customize privacy settings.

Social Media Outlets (e.g., Facebook, Twitter, etc.):


Different social media platforms offer unique features and cater to specific types of content
and interactions, impacting how users engage with them:

Facebook: Known for its broad user base and diverse features, Facebook allows users to
connect with friends, share updates, join groups, and interact with businesses through pages.

11
Twitter: Characterized by its microblogging format, Twitter enables users to share short text-
based updates (tweets), follow other users, engage in public conversations, and use hashtags
for content discovery.

Instagram: Focused on visual content, Instagram allows users to share photos and videos,
engage with posts through likes and comments, and explore content through hashtags and the
Explore page.

LinkedIn: Positioned as a professional networking platform, LinkedIn facilitates connections


between professionals, job searching, industry networking, and content sharing related to
careers and business.

YouTube: Primarily a video-sharing platform, YouTube hosts a wide range of content


including vlogs, tutorials, entertainment, and educational videos, enabling users to subscribe
to channels, like videos, and leave comments.

Impact of Differences and How to Use Them


Audience and Content: Understanding the audience demographics and content preferences on
each platform is crucial for tailoring content and engagement strategies. For example, visual
content performs well on Instagram, while news and updates thrive on Twitter.

Engagement Strategies: Leveraging platform-specific features such as hashtags, retweets, and


stories can enhance visibility and engagement. Interacting with followers, participating in
discussions, and sharing relevant content contribute to building a strong online presence.

Consistency and Authenticity: Maintaining a consistent brand voice and posting schedule
across platforms fosters brand recognition and trust. Authenticity in content creation and
interactions resonates with audiences and fosters meaningful connections.

Analytics and Optimization: Monitoring analytics data provided by each platform helps in
evaluating performance, identifying trends, and optimizing content strategies. Adjustments
can be made based on audience feedback, engagement metrics, and market insights.
Videos: Broadcasting, Many-to-Many, Focused Networks

12
Broadcasting to Peers: Platforms like Facebook Live, Instagram Live, and Twitter's Periscope
enable users to broadcast live video content to their followers in real-time. This feature
enhances engagement by allowing direct interaction through comments and reactions.

Many-to-Many: Video-sharing platforms such as YouTube facilitate many-to-many


communication, where users can upload videos for public viewing and interaction. YouTube's
algorithm recommends content based on user preferences, making it a powerful tool for
content discovery and community building.

Friends and Followers: Social networks like Snapchat and Instagram offer features such as
Stories, which allow users to share ephemeral video content with their friends or followers.
These platforms emphasize authenticity and spontaneity, fostering more personal connections.

Apps, Pages, and Pseudonyms: Some platforms cater to specific interests or niches, allowing
users to create dedicated apps, pages, or profiles under pseudonyms. For instance, Twitch
focuses on live streaming for gamers, while TikTok encourages short-form video creation
under creative usernames.

Focused Networks (e.g., Flickr, LinkedIn, YouTube):


Focused networks revolve around specific topics or activities, attracting users with shared
interests:
Flickr: Tailored for photographers, Flickr provides a platform for sharing high-quality images,
engaging with photography communities, and discovering visual inspiration.

LinkedIn: Geared towards professionals, LinkedIn serves as a hub for networking, job
searching, industry discussions, and professional development through content sharing and
connections.

YouTube: As a versatile video-sharing platform, YouTube hosts content across various genres,
including tutorials, entertainment, music, and education, catering to diverse interests and
audiences.

Understanding the unique characteristics and user dynamics of each platform empowers
individuals and businesses to effectively utilize social media outlets and video-sharing
platforms to engage with their target audience, build communities, and achieve their
objectives.

13
Conclusion

Cyber laws play a crucial role in regulating the use of social media, ensuring the protection
of individuals' privacy, security, and rights in the digital realm. These laws govern issues such
as online harassment, cyberbullying, data protection, intellectual property rights, and freedom
of expression. Effective cyber laws help maintain a balance between promoting innovation
and safeguarding users from various online threats. However, the ever-evolving nature of
technology and social media platforms presents ongoing challenges for lawmakers and
policymakers to adapt and enforce relevant regulations to address emerging issues effectively.

The dynamic interplay between cyber laws and social media underscores the intricate
relationship between digital governance, individual rights, and societal norms in the modern
era. As we navigate the complexities of cyberspace, it is imperative to recognize the dual role
of cyber laws in safeguarding privacy, promoting security, and fostering innovation, while also
upholding fundamental freedoms and ethical principles.

14
References

1. Jenifer Stella, S., and S. Ambika Kumari. "Cyber Space-A Critical Analysis On
The Feminine Facet." (2022).

2. Mambi, Adam J. ICT law book: A source book for information and
communication technologies & cyber law in Tanzania & East African community.
African Books Collective, 2010.

3. Sahoo, Ms Deepali Rani, and Pooja Kapoor. "An Analytical Study Relating to the
Legal Dimensions against Cyberviolence in India." Computers in Human Behavior
25.5: 1089-1101.

4. Sarmah, Animesh, Roshmi Sarmah, and Amlan Jyoti Baruah. "A brief study on
cyber crime and cyber laws of India." International Research Journal of
Engineering and Technology (IRJET) 4.6 (2017): 1633-1640

5. Brenner, Susan W. "US cybercrime law: Defining offenses." Information Systems


Frontiers 6.2 (2004): 115.

6. Karnika Seth, Computer, internet and new technology laws, (2016), Lexis Nexis,
New Delhi.

7. Castañeda, J. Alberto, Francisco J. Montoso, and Teodoro Luque. & quot;The


dimensionality of customer privacy concern on the internet.& quot; Online
Information Review (2007).

8. Shilpa Dongre (2015), Cyber law and its applications, Current Publication, Mumbai.

15

You might also like