Audit Course Sem 8
Audit Course Sem 8
On
Guided By
Mrs. Abhilasha Kore
1
CERTIFICATE
This is to certify that the audit course entitled “Cyber Laws and Use of Social
Media” is a bonified work done under my guidance by E semester II students of this institute
and is submitted to Savitribai Phule Pune University, Pune for the partial fulfillment of
the requirements for the award of degree of Bachelor of Engineering in Information
Technology.
2
ACKNOWLEDGEMENT
With immense pleasure, we are presenting this Audit Course Report as part of the
curriculum of B.E. Information Technology. I wish to thank all the people who gave me
unending support right from the stage the idea was conceived. We take this opportunity to
convey our sincere thanks to our beloved Principal Dr. P. Malathi for her continual support
and encouragement that made the Audit Course Presentation a great success. We express our
profound thanks to our respected Head of the Department, Dr. Preeti Patil whose advice and
valuable guidance helped us in making this presentation interesting and successful one.
We also thank all those who have directly or indirectly guided and helped us
in preparation of this Audit Course presentation. Last but not the least we thank our beloved
parents, friends and well-wishers who helped us to do this presentation by their kind help and
assistance.
3
Introduction
In our rapidly evolving digital landscape, the intersection of cyber laws and social media has
become increasingly prominent, shaping the way individuals and organizations interact,
communicate, and conduct business online. This introduction serves as a primer to
understand the key principles and implications of cyber laws alongside the pervasive
influence of social media platforms.
Cyber laws encompass a broad spectrum of regulations designed to govern and protect digital
interactions, assets, and privacy rights. These laws are essential in maintaining order, security,
and ethical conduct in cyberspace. They cover diverse areas such as data protection,
intellectual property rights, online defamation, cybercrimes, and digital governance.
Understanding cyber laws is crucial for safeguarding personal and organizational interests in
the digital realm.
However, the proliferation of social media also raises significant legal and ethical
considerations. Issues such as data privacy breaches, cyberbullying, misinformation
dissemination, and copyright infringement have sparked debates and prompted regulatory
interventions. Consequently, users, businesses, and policymakers must navigate these
complexities while harnessing the benefits of social media responsibly.
As society grapples with the ever-evolving digital landscape, the synergy between cyber laws
and social media becomes paramount. By understanding and adhering to relevant regulations,
individuals and organizations can mitigate risks, protect rights, and foster a safer online
environment. Simultaneously, leveraging social media effectively empowers users to connect,
collaborate, and innovate in the digital age.
4
Objectives
The objective of the above topic is to provide a concise and informative introduction to the
intertwined realms of cyber laws and social media. It aims to:
3. Identify key legal and ethical considerations arising from the use of social media,
including data privacy, cyberbullying, misinformation, and copyright issues.
4. Emphasize the need for individuals, businesses, and policymakers to navigate these
complexities responsibly while harnessing the benefits of social media effectively.
5. Advocate for the promotion of digital citizenship, ethical standards, and regulatory
compliance to foster a safer and more equitable online environment.
5
Introduction to IT Act
The evolution of India's Information Technology Act (IT Act) reflects the imperative to
address the challenges posed by the burgeoning digital landscape. Enacted in 2000, the IT Act
marked a seminal moment in India's legal framework, providing a comprehensive regulatory
framework for electronic governance, digital signatures, cybercrimes, and data protection. Its
genesis lies in the recognition of the need to facilitate e-commerce, protect digital
transactions, and combat cyber threats in an increasingly interconnected world.
Under the IT Act, various authorities are empowered to enforce its provisions and ensure
compliance. The Ministry of Electronics and Information Technology (MeitY) serves as the
central authority responsible for formulating policies, administering the Act, and coordinating
with other agencies. The Computer Emergency Response Team (CERT-In) operates as the
national nodal agency for cybersecurity, responding to cyber incidents, providing alerts, and
promoting cybersecurity awareness. Additionally, law enforcement agencies such as the
police have jurisdiction to investigate cybercrimes and enforce penalties prescribed under the
Act.
Penalties and offences outlined in the IT Act encompass a wide range of activities, including
unauthorized access, data theft, hacking, cyber terrorism, and online fraud. Amendments to
the Act have been introduced periodically to address emerging threats, enhance data
protection mechanisms, and align with international standards. Notable amendments include
the insertion of Section 66A (dealing with offensive online communication) and Section 69A
(empowering the government to block online content) in 2008.
In the realm of jurisdiction, traditional principles are augmented by novel challenges posed
by cyberspace. While territorial jurisdiction remains fundamental, the borderless nature of the
internet necessitates considerations of extra-territorial jurisdiction. This entails determining
the extent to which a country can assert legal authority over activities occurring beyond its
borders, such as cross-border cybercrimes or disputes involving multinational corporations.
Case laws on cyberspace jurisdiction provide valuable insights into the evolving
jurisprudence in this domain. Landmark cases like the 'Yahoo! v. LICRA' and 'Google Spain
v. AEPD' have shaped the contours of jurisdiction in the digital era, establishing precedents
for determining applicable laws, enforcement mechanisms, and the rights of individuals in
online spaces.
6
Cyber Law : International Perspective
Certainly! Here's a brief summary covering the mentioned topics related to "Cyber Law:
International Perspective":
- EDI refers to the electronic exchange of business documents between trading partners.
- Legal issues surrounding EDI often revolve around issues such as data privacy, security,
authenticity, and enforceability of electronic transactions.
- It addresses issues such as the formation and validity of contracts, electronic signatures, and
the liability of service providers.
- Many countries have enacted laws recognizing electronic signatures as legally binding.
- These laws establish criteria for the validity and enforceability of electronic signatures in
various transactions.
Cryptography Laws
- Cryptography laws regulate the use and export of cryptographic technologies to ensure
national security and prevent unauthorized access to sensitive information.
- These laws vary widely across different countries, with some imposing restrictions on
cryptographic products and others promoting their development and use.
- Cyber laws encompass a broad range of legal frameworks governing various aspects of
cyberspace, including cybercrime, data protection, intellectual property rights, and internet
governance.
7
Incentives for Creators
Cybercrime refers to criminal activities carried out using computers or the internet. It
encompasses a wide range of illegal activities, including fraud, theft, hacking, and cyber
terrorism. These crimes are distinguished from traditional crimes by their reliance on digital
technology and the internet for execution.
Traditional crimes typically involve physical acts, whereas cybercrimes are committed
through electronic means, often with anonymity and across international borders. Cybercrimes
can be categorized into various types, including cyber frauds (such as phishing scams and
identity theft), cyber thefts (like data breaches and online financial theft), and cyber stalking
(harassment or stalking through digital channels).
Cyber terrorism involves the use of digital technology to conduct terrorist activities, such as
disrupting critical infrastructure or spreading fear and chaos through cyber attacks. This
includes hacking into government systems, launching malware attacks, or spreading
propaganda online.
Common tools and methods used in cybercrimes include hacking (unauthorized access to
computer systems), viruses, Trojans, worms (malicious software designed to infiltrate and
damage computers or networks), and denial-of-service (DoS) attacks (flooding a network or
server with traffic to disrupt service).
Cyber forensics plays a crucial role in investigating and solving computer-related crimes. It
involves collecting, analyzing, and presenting digital evidence in legal proceedings. Cyber
forensic experts use specialized tools and techniques to trace the origins of cyber attacks,
identify perpetrators, and reconstruct digital activities. This field is constantly evolving to keep
pace with advancements in technology and the increasing sophistication of cybercriminals.
8
Cybercrimes exploit vulnerabilities in computer systems and networks, allowing
perpetrators to remain anonymous and operate across international borders.
2. Types of Cybercrimes:
Cyber Frauds: This category includes various scams and schemes designed to deceive
individuals or organizations for financial gain. Examples include phishing attacks, where
attackers impersonate legitimate entities to steal sensitive information, and online auction
fraud, where buyers or sellers are deceived in online transactions.
Cyber Thefts: Cyber theft involves the unauthorized acquisition of data, money, or resources
from individuals, businesses, or governments. This can include data breaches, ransomware
attacks, and online banking fraud.
Cyber Stalking: Cyber stalking involves using digital communication channels, such as
social media, email, or messaging apps, to harass, intimidate, or monitor individuals. This can
include threats, unwanted messages, or the unauthorized tracking of someone's online
activities.
3. Cyber Terrorism:
Cyber terrorism refers to the use of digital technology to carry out terrorist activities. This
can include attacks on critical infrastructure, such as power grids or financial systems, as well
as propaganda dissemination, recruitment, and radicalization through online channels.
Cyber terrorists aim to create fear, chaos, and disruption by exploiting vulnerabilities in
computer systems and networks. These attacks can have severe economic, social, and political
consequences.
9
Denial-of-Service (DoS) Attacks: Flooding a network or server with traffic to overwhelm its
capacity and disrupt services for legitimate users.
5. Cyber Forensics:
- Cyber forensics involves the collection, analysis, and presentation of digital evidence in
legal proceedings. This can include recovering deleted files, tracing network activity, and
identifying the source of cyber attacks.
- Cyber forensic experts use specialized tools and techniques to preserve, analyze, and
document digital evidence in a manner that is admissible in court.
Overall, cybercrime presents unique challenges due to its global nature, anonymity, and
reliance on digital technology. Effective prevention, detection, and prosecution of cybercrimes
require collaboration between law enforcement agencies, cybersecurity professionals, and
policymakers to develop robust legal frameworks, cybersecurity measures, and investigative
techniques.
10
Use of Social Media
Profiles: Users create personal profiles containing information such as their name, bio, photos,
and interests.
Connections: Users establish connections with other users, forming their social network
through friend requests, follows, or connections.
Feeds: Central to social networks, feeds display content shared by users within a user's network
or based on their interests.
Messaging: Many social networks offer messaging features for private communication
between users.
Groups and Communities: Users can join or create groups based on shared interests or
affiliations, fostering community engagement.
Privacy Settings: Users have control over the visibility of their profile and content, with
options to customize privacy settings.
Facebook: Known for its broad user base and diverse features, Facebook allows users to
connect with friends, share updates, join groups, and interact with businesses through pages.
11
Twitter: Characterized by its microblogging format, Twitter enables users to share short text-
based updates (tweets), follow other users, engage in public conversations, and use hashtags
for content discovery.
Instagram: Focused on visual content, Instagram allows users to share photos and videos,
engage with posts through likes and comments, and explore content through hashtags and the
Explore page.
Consistency and Authenticity: Maintaining a consistent brand voice and posting schedule
across platforms fosters brand recognition and trust. Authenticity in content creation and
interactions resonates with audiences and fosters meaningful connections.
Analytics and Optimization: Monitoring analytics data provided by each platform helps in
evaluating performance, identifying trends, and optimizing content strategies. Adjustments
can be made based on audience feedback, engagement metrics, and market insights.
Videos: Broadcasting, Many-to-Many, Focused Networks
12
Broadcasting to Peers: Platforms like Facebook Live, Instagram Live, and Twitter's Periscope
enable users to broadcast live video content to their followers in real-time. This feature
enhances engagement by allowing direct interaction through comments and reactions.
Friends and Followers: Social networks like Snapchat and Instagram offer features such as
Stories, which allow users to share ephemeral video content with their friends or followers.
These platforms emphasize authenticity and spontaneity, fostering more personal connections.
Apps, Pages, and Pseudonyms: Some platforms cater to specific interests or niches, allowing
users to create dedicated apps, pages, or profiles under pseudonyms. For instance, Twitch
focuses on live streaming for gamers, while TikTok encourages short-form video creation
under creative usernames.
LinkedIn: Geared towards professionals, LinkedIn serves as a hub for networking, job
searching, industry discussions, and professional development through content sharing and
connections.
YouTube: As a versatile video-sharing platform, YouTube hosts content across various genres,
including tutorials, entertainment, music, and education, catering to diverse interests and
audiences.
Understanding the unique characteristics and user dynamics of each platform empowers
individuals and businesses to effectively utilize social media outlets and video-sharing
platforms to engage with their target audience, build communities, and achieve their
objectives.
13
Conclusion
Cyber laws play a crucial role in regulating the use of social media, ensuring the protection
of individuals' privacy, security, and rights in the digital realm. These laws govern issues such
as online harassment, cyberbullying, data protection, intellectual property rights, and freedom
of expression. Effective cyber laws help maintain a balance between promoting innovation
and safeguarding users from various online threats. However, the ever-evolving nature of
technology and social media platforms presents ongoing challenges for lawmakers and
policymakers to adapt and enforce relevant regulations to address emerging issues effectively.
The dynamic interplay between cyber laws and social media underscores the intricate
relationship between digital governance, individual rights, and societal norms in the modern
era. As we navigate the complexities of cyberspace, it is imperative to recognize the dual role
of cyber laws in safeguarding privacy, promoting security, and fostering innovation, while also
upholding fundamental freedoms and ethical principles.
14
References
1. Jenifer Stella, S., and S. Ambika Kumari. "Cyber Space-A Critical Analysis On
The Feminine Facet." (2022).
2. Mambi, Adam J. ICT law book: A source book for information and
communication technologies & cyber law in Tanzania & East African community.
African Books Collective, 2010.
3. Sahoo, Ms Deepali Rani, and Pooja Kapoor. "An Analytical Study Relating to the
Legal Dimensions against Cyberviolence in India." Computers in Human Behavior
25.5: 1089-1101.
4. Sarmah, Animesh, Roshmi Sarmah, and Amlan Jyoti Baruah. "A brief study on
cyber crime and cyber laws of India." International Research Journal of
Engineering and Technology (IRJET) 4.6 (2017): 1633-1640
6. Karnika Seth, Computer, internet and new technology laws, (2016), Lexis Nexis,
New Delhi.
8. Shilpa Dongre (2015), Cyber law and its applications, Current Publication, Mumbai.
15