ESSENTIALS OF INFORMATION TECHNOLOGY LAW
|
|
- Whitney York
- 8 years ago
- Views:
Transcription
1 ESSENTIALS OF INFORMATION TECHNOLOGY LAW
2
3 ESSENTIALS OF INFORMATION TECHNOLOGY LAW Sujata Pawar Yogesh Kolekar
4 Notion Press 5 Muthu Kalathy Street, Triplicane, Chennai First Published by Notion Press 2015 Copyright Sujata Pawar and Yogesh Kolekar 2015 All Rights Reserved. ISBN: No part of this publication can be reproduced or transmitted in any form or by any means, without prior written permission of the authors. This publication containing information, comments and views are merely for guidance and reference. It must not be taken as authority of or being binding on, the author, editors, publishers, and sellers, who do not owe any responsibility whatsoever for any loss, damage, or distress to any person, whether or not a purchaser of this publication, on account of any action taken or not taken on the basis of this publication. Despite all the care taken, error or omission may have crept inadvertently into this publication. For the authoritative text information, please contact the department concerned or refer to the Government publication or Gazette publication.
5 Contents Foreword Preface ix xi 1. Information Technology Law in India 1 Uncitral Model Law on Electronic Commerce 2 The Information Technology Act, The Information Technology (Amendment) Act, Scheme of The Information Technology Act, 2000 (With 2008 Amendment) Offences Related to s 15 Advantages of s 19 Crime Related to s 20 Phishing Scams 21 Sending Offensive Messages 23 Sending of Sexually Explicit Contents 26 Cyber Terrorism 32 Precautionary Measures for using Safely E-Governance in India 39 Advantages of E-Governance 41 Access to Vital Information at a Click 42 Transparency 42 Cost Saving 42 Centralization 43 Accountability 43 Educative Value 43 The National E-Governance Plan 44 Examples of National E-Governance Plan 45 Income Tax 45 Mca21 45
6 vi Contents Judis 46 Legal Framework for E-Governance 47 Legal Recognition of Electronic Records 47 Legal Recognition of Electronic Signature 48 Electronic Records and Electronic Signatures in Government Agencies 48 Audit of Documents Etc., Maintained in Electronic Form 50 Publication of Rule, Regulation, etc., in Electronic Gazette Electronic Signature - Function and Offences 52 Technical Aspect of Digital Signature 54 Digital Signature Certificates 56 Legal Aspect of Digital Signature 57 Functions of Electronic Signature 59 Offences Related to Electronic Signature E- Contracts 64 E-Contracts Under The Information Technology Law 66 Types of e-contract 72 Click wrap contract 72 Browse wrap contract 73 Shrink wrap contract 74 Transaction to which the Act is not applicable Data Protection 76 Data theft 78 Compensation for Failure to Protect Data 82 Power to Intercept, Monitor and Decrypt Information Electronic Evidence 90 Electronic Evidence 92 Admissibility of Electronic Evidence 96 Presumptions of Electronic Evidence 102 Presumption as to Gazettes in Electronic Forms 102 Presumption as to Electronic Agreements 102
7 Contents vii Presumption as to Electronic Records and Digital Signatures 102 Presumption as to Digital Signature Certificates 103 Presumption as to Electronic Messages 103 Presumption as to Electronic Records Five Year Old Regulatory Authority 105 Controller of Certifying Authorities 106 The Cyber Appellate Tribunal 108 Adjudicating Officer 111 Investigation Officer 112 Appendices 114 The Information Technology Act, 2000 as amended by The Information Technology (Amendment) Act, 2008 The Information Technology (Electronic Service Delivery) Rules, 2011 The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 The Information Technology (Intermediaries guidelines) Rules, 2011 The Information Technology (Guidelines for Cyber Cafe) Rules, 2011
8
9 Foreword The Information Technology has brought remarkable changes in the different area of society including teaching learning process. Today education is no more restricted to classrooms. The online teaching leaning process has widened it scope with far reaching effect, cutting across boundaries. The growth of e-commerce has opened new avenues for both business community and consumers. The technology is no more restricted to elite, and, falling prices of smart phones and internet tariff have given the power of cyber space into hands of masses. However it has also increased its hazards, as common men is neither aware of its laws nor of its implication. The growth of Information Technology has presented new challenges of both social and legal nature. The use of technology for crime especially cyber terrorism, cyber defamation or cyber frauds is a matter of concern, in terms of its effect and aftermath. Information Technology law has created special jurisdiction for dealing special jurisdiction for dealing with cyber-crimes, however, many times common man and police personnel are equally unaware and reluctant to pursue the formalities under cyber law. Young generation, professionals and student community is comparatively more techno savvy but lack of legal awareness may create difficulties of adherence to Cyber Law. This book goes a long way in generation of interest and creation of legal and technical expertise in this much awaited field of cyber jurisdiction. Writing a book on information technology and law can be a difficult task as alluring the interest of readers in complex phrases is tricky and hard. However this book has done away with such technical and legal jargon. Both the authors are learned in Law as well as Computer Technology and, the book very well keeps the interest of reader with its simple illustrations and screenshots and makes reading appealing and vivid. Chapters are designed keeping in view, interest of both, novel as well as advance reader and the detailed footnotes are added advantage for research students and keen academic readers. The
10 x Foreword book very well stands to its name as it is inclined towards the vital areas of information technology law. The Chapters covering offences related to s, e-governance, Data protection, electronic signature, Digital evidence are areas which every law student and persons in legal fraternity must know. The book is highly informative and covers almost everything that, legal professionals as well as laymen must know about Information Technology Law. I am confident that it will serve its intended goal to reach out to all in this cyber age and disseminate cyber knowledge to create digital society. Prof. Dr Dilip Ukey Ex Vice Chancellor of SRTM University, Nanded, Professor and Head, Dept. of Law, Savitribai Phule University, Pune
11 Preface In this era of information technology, significant developments in cyber space, 2G, 3G, 4G spectrums and technological advancements in electronic instruments of mass communication, are transforming human life at galloping speed with repercussions in socio-legal, economic as well as administrative, commercial and political fields. The growth of telecom sector and use of smart phones has given the power of internet technology into the hand of masses. The information technology can be said to be the fifth pillar of democracy, after free press. A technology driven Government is a need of large size country like India, where millions of people still live in remote areas, far from bureaucratic setup. E-Governance is a panacea for people and antidote for ill information, delay and denial. Information technology has simplified communication both at personal as well as business level, making this world truly a global village and has increased opportunities and avenues of trade and commerce globally where a buyer buys a product or books a ticket at mere click of a button. These technological advancements have been used as facilitating tools by educators, bankers, executives and administrators, in e governance. But at the same time, it has also created new series of crimes, with means and methods beyond contemplation of common man, where a culprit can easily cause havoc sitting far way from place of crime. The earnest desire behind writing this book is, to make people aware of different concepts associated with the Information Technology Act. In law fraternity, there is no dearth of books on Information Technology law but most of them are too foreign in concept or too technical, making concept difficult to understand. Burtrand Russell once stated that, Law seeks clarity at the cost of brevity, and, in the process looses both. We have made sincere efforts to avoid legal jargon while explaining the provisions and have added illustrations when found relevant and necessary. This is an attempt to simplify both, concepts of law and the technology, while intensively dealing with, only the essentials of IT Law. We hope the readers would find examples and illustrations given in this book practical and useful. This book covers the legislative history behind Information Technology Act, 2000 which is based on UNCITRAL Model draft and covers important concepts like cyber space, s, e-contract, e-signature, e-governance, followed by related offences and the penalties in the respective chapters. This book also narrates various presumptions created by law regarding electronic
12 xii Preface evidence and the rules about data protection and power of surveillance, interception and decryption available with the authorities. Information Technology Act has created a special jurisdiction for cyber crimes and everyone must know the powers and functions of adjudicating officer and investing officer which have been explained along with other necessary information about the regulating authorities. This book will prove useful not only for students of Law and Commerce, but also for candidates appearing for various UPSC, MPSC, Banking and Competitive exams. The book may also be used by Police and adjudicating or investigating officers while dealing with Cyber Crimes. It is equally useful and indispensible for a common man, who is constantly and invariably indulged in the use of information technology, through computers, internet, mobiles, tablets and other electronic devices. Innovative and effective use of the information technology has transformed the means and methods of social communication and commercial transactions, through e-banking, e-payment, social networking, twitters and blog writing, bringing the world closer, at our finger tips. Numerous opportunities are created in spread of education, art, literature, networking by media, governance and business, transgressing all narrow, regional frontiers, and at the same time, have increased the risk and threat of cyber crime and cyber terrorism at an alarming speed. This necessitates that; the knowledge of information technology law must be possessed by everyone, by elite and masses equally, for taking necessary precautions to avoid deceit. We have taken our best efforts to provide up to date, correct and useful information with academic precision backed by authentic research, as far as possible and have attempted to avoid errors. However, regardless of our efforts if any mistake has crept in, we shall be grateful to hear from readers, for necessary rectification in future edition. Dr. Sujata Pawar Yogesh Kolekar
13 1 INFORMATION TECHNOLOGY LAW IN INDIA Today we live in technology driven world. Industrial revolution gave birth to giant machines for industrial advancement 1 and information technology has delivered intelligent machines to revolutionize human development. Today we are surrounded by automated smart technology which has touched almost all spheres of human life, from military to medicine and from education to election. We live in a world with boundaries which is secured but still it can be intruded virtually. 2 This is real and this is cyber space. 3 The New Oxford Dictionary Image courtesy Image page at 1 The Industrial Revolution is the name given the movement in which machines changed people s way of life as well as their methods of manufacture. 2 UK, National Criminal Intelligence Services, Director of Intelligence, Roger Gaspar, says The internet is a global system; we can now be attacked by criminals who do not need to come to this territory. Lots of policing arrangements have their roots in the fact that victim and offender are geographically co-located. co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercrime.stm 3 William Gibson in his novel Neuromancer, 1984 had coined the word cyber space.
14 2 Essentials of Information Technology Law defines cyberspace as The notional environment in which communication over computer networks occurs 4 The new boon brought by information technology is also accompanied by its bane i.e. new technology crimes. The conventional provisions of penal laws are insufficient to address this issue, 5 likewise the new business environment required new regulations for its legal endorsement as more and more business communities are moving towards electronic commerce and trans-border contracts. To address this issue the United Nation through its core agency United Nations Commission on International Trade Law 6 (UNCITRAL) had formulated 7 model legislation on electronic commerce 8. UNCITRAL MODEL LAW ON ELECTRONIC COMMERCE The increase in use of electronic data interchange 9 and electronic commerce in international trade necessitated the need of securing legal sanctity to such transaction. 10 The United Nations commission on international trade law formulated model law on electronic commerce which sets out rules for providing equal treatment of electronic documents with paper documents. The purpose of UNICITRAL model law on electronic commerce is to provide frame work for commerce through electronic means providing guidelines to individual countries to prepare their own legislation. The model law contains seventeen articles and is divided into two parts. 11 The model law seeks to provide legal recognition to electronic documents and electronic commerce and validates Crimes like tampering with computer source documents, hacking with computer system, publishing of information which is obscene in electronic form are not adequately protected under traditional penal laws. 6 Resolutions adopted by the General Assembly during its twenty-first session, 2205 (XXI)17 December June 1996 (additional article 5 bis adopted in 1998) Article 2(b) of United Nations Model Law on Electronic Commerce, Electronic data interchange means the electronic transfer from computer to computer of information using an agreed standard to structure the information 10 Statement of object, UNCITRAL model law on Electronic commerce, Noting that an increasing number of transactions in international trade are carried out by means of electronic data interchange and other means of communication, commonly referred to as electronic commerce, which involve the use of alternatives to paperbased methods of communication and storage of information 11 Part one: Electronic commerce in general and Part two: Electronic commerce in specific areas
15 Information Technology Law in India 3 contracts concluded through electronic means. 12 The Information Technology Act 2000, 13 enacted by the Government of India 14 is also based on this model law. UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW (UNCITRAL) The United Nations commission on international trade law was established in 1966 to further the goal of harmonizing and modernizing international commercial law. It prepares and promote legislative and non legislative instrument in field of commercial law. Certain core areas include alternate dispute resolution, international contract, electronic commerce, international payment etc. THE INFORMATION TECHNOLOGY ACT 2000 The Information Technology Act, is a prime legislation in India dealing with cyber offences 16 and electronic commerce 17 in India, and is based on the United Nations Model Law on Electronic Commerce adopted by the United 12 Article 11, Formation and validity of contracts 13 The object of the Act provides that An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce, which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. 14 The Act received the assent of the President on the 9 th June, Without amendments 16 The term is nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. Cybercrime is a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cyber criminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication documents or data storage. Criminals who perform these illegal activities are often referred to as hackers. Cybercrime may also be referred to as computer crime The object of the Information Technology Act, 2000 defines ecommerce as. transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce, which involve the use of alternatives to paper-based methods of communication and storage of information..
16 4 Essentials of Information Technology Law Nations Commission on International Trade Law. The Act initially contained 94 sections divided into 13 chapters and 4 schedules. The Act is applicable to the whole of India 18 including offences or contravention committed outside the territory of India by any person irrespective of his nationality. 19 The Act is provides for legal recognition to electronic records 20 and facilitates electronic filing of documents with Government agencies. 21 The core object of the Information Technology Act, 2000 was, a) To provide legal recognition of e-records. b) To provide legal recognition of digital signature. 22 Traditional signatures are prone to forgery and tempering, hence insufficient for online transaction and contracts. Online transaction requires unique and strong protection which is fulfilled by the legal provisions related to digital signature. c) To provide legal recognition to electronic governance. 23 The term e-governance implies technology driven government, where government adopts technology to provide efficient delivery of services, information and education. 18 S. 1(2). It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention there under committed outside India by any person. 19 S. 75. Act to apply for offences or contravention committed outside India. (1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality. (2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India. 20 S. 4. Legal recognition of electronic records 21 S. 6. Use of electronic records and digital signatures in Government and its agencies 22 S. 5. Legal recognition of digital signatures 23 The US E-Government Act of 2002 (Section 3601) defines electronic Government to mean electronic Government means the use by the Government of web-based Internet applications and other information technologies, combined with processes that implement these technologies, to - (A) enhance the access to and delivery of Government information and services to the public, other agencies, and other Government entities; or (B) bring about improvements in Government operations that may include effectiveness, efficiency, service quality, or transformation.
17 ESSENTIALS OF INFORMATION TECHNOLOGY LAW
International Journal of Enterprise Computing and Business Systems
PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India
More informationE-COMMERCE LAWS IN THE INDIAN PERSPECTIVE
E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE Sumanjeet* Abstract Electronic commerce offers exceptional opportunities for the economic development of India, with its huge pool of technology skilled, English
More informationData protection and outsourcing industry - A study. By Kumar Mihir
Data protection and outsourcing industry - A study By Kumar Mihir Scientia Potenti Est- Knowledge is power. The said maxim is apt to describe the primary business model in the 21 st century when information
More informationModels for Cyber-legislation in ESCWA member countries
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National
More informationIndustry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training
More informationNATIONAL LAW INSTITUTE UNIVERSITY
NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance
More informationIndustry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services
More informationExecutive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
More informationGOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
More informationLaw in online business with special focus on India
Law in online business with special focus on India Name: Radha krishan Immatriculation Number: 230456 Course: BCM Subject: E-Business Technologies Professor: Dr. Eduard Heindl 1 Declaration I here by declare
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationLEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
More informationCyber Crimes in India A Closer look
Cyber Crimes in India A Closer look CMA. CS. DR.V.N. PARTHIBAN, PHD., FCMA, FCS, CPA, CA(I), LLM, ASM, AMT, MSW, FIII, FIIMM, M.L., MBA, MHRM, MBL, M.COM,M.PHIL, MS,* Email: vnparthiban@yahoo.co.in Introduction
More informationVijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India
Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationAustralia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia
More informationOnline International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
More informationCYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar
CYBER LÄW IN INDIA (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar New Era Law Publications Law Book Publishers, 1159, Outrem Linea, DELHI Contents Preface
More informationCyber Security, Cyber Crimes and Cyber Laws
Continuing Education Programme on Cyber Security, Cyber Crimes and Cyber Laws Name of the Proposer: Anil K. Roy and Manik Lal Das Other Instructors: arranged by CLS, Ahmedabad Course Objectives: Information
More informationDoes it matter that on the internet one can be anonymous. Is it a correct statement?is it relevant for the session on cyber crimes?
ON THE INTERNET, NOBODY KNOWS THAT YOU ARE A DOG: Fundamentals of Cyber crime (Text of talk delivered by Justice Yatindra Singh, Judge, Allahabd High Court, in cyber meet/ seminar of the IT secretaries
More informationLEGISLATIVE MEASURES TO DEAL WITH ECONOMIC CRIMES IN INDIA
LEGISLATIVE MEASURES TO DEAL WITH ECONOMIC CRIMES IN INDIA Animesh Bharti* I. INTRODUCTION Economic Offences form a separate category of criminal offences. Economic Offences not only victimize individuals
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More information2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective
Cyber Security & Internet Technology Laws in India What is Cyber Security? By (LBSIT on 24 th Feb 2011) There could be different Perspectives IT professional s Perspective Law Enforcement Perspective Netizen
More informationSORNA Substantial Implementation Review State of Tennessee
September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,
More information[Brought into force by appointed day notice on 16 th June 2003.]
[Brought into force by appointed day notice on 16 th June 2003.] AN ACT TO PROVIDE FOR THE LEGAL RECOGNITION OF ELECTRONIC WRITING, ELECTRONIC CONTRACTS, ELECTRONIC SIGNATURES AND ORIGINAL INFORMATION
More informationCyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationONLINE MARKETING - CHALLENGES IN FUTURE
IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN(E): 2321-8878; ISSN(P): 2347-4564 Vol. 2, Issue 4, Apr 2014, 183-188 Impact Journals ONLINE MARKETING
More informationE-Commerce and Business Society
Global Journal of Business Management and Information Technology. Volume 1, Number 1 (2011), pp. 43-47 Research India Publications http://www.ripublication.com E-Commerce and Business Society Goutam Chatterjee
More informationCYBER CRIME AWARENESS
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) CYBER CRIME AWARENESS RITU DHANOA* ABSTRACT: Cyber crime is emerging as
More informationEMR: Electronic Medical Records Security: International Law Review
EMR: Electronic Medical Records Security: International Law Review HCCA 11 th Annual Compliance Institute, April 2007 Jill Nelson, RN, MBA, JD, CPC, CHC Cleveland Clinic, Director of Corporate Compliance
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationNONPROFIT ORGANISATIONS ACT
REPUBLIC OF SOUTH AFRICA NONPROFIT ORGANISATIONS ACT REPUBLIEK VAN SUID-AFRIKA WET OP ORGANISASIES SONDER WINSOOGMERK No, 1997 ACT To provide for an environment in which nonprofit organisations can flourish;
More informationRIGHTS & REMEDIES AVAILABLE TO CONSUMERS
4 RIGHTS & REMEDIES AVAILABLE TO CONSUMERS 4.0 INTRODUCTION Man is a social & rational animal. He has throughout his evolution tried to improve upon everything, he has laid his hands upon, anything which
More informationSome laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability.
Country Report: India India is an important regional economy, with a strong interest in ICT services development. The law in India has not entirely kept pace with developments in cloud computing, and some
More informationCHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
More informationNATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994
NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 [ASSENTED TO 23 NOVEMBER 1994] [DATE OF COMMENCEMENT: 1 JANUARY 1995] (English text signed by the President) as amended by National Strategic Intelligence
More informationConsolidated Insurance Mediation Act 1
Consolidated Insurance Mediation Act 1 Act no. 930 of 18 September 2008 This is an Act to consolidate the Insurance Meditation Act, cf. Consolidated Act no. 401 of 25 April 2007, as amended by section
More informationTYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
More informationOptional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
More informationPhishing Victims Likely Will Suffer Identity Theft Fraud
Markets, A. Litan Research Note 14 May 2004 Phishing Victims Likely Will Suffer Identity Theft Fraud Fifty-seven million U.S. adults think they have received a phishing e-mail. More than 1.4 million users
More informationCyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationProtection from Harassment Bill
Protection from Harassment Bill Bill No. 12/2014. Read the first time on 3rd March 2014. PROTECTION FROM HARASSMENT ACT 2014 (No. of 2014) Section ARRANGEMENT OF SECTIONS PART I PRELIMINARY 1. Short title
More informationITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
More informationCyber Crimes: Information Security, Digital Evidence and Cyber Laws. V Rajendran venkrajen@yahoo.com http://venkrajen.in 044-22473849; 9444073849
Cyber Crimes: Information Security, Digital Evidence and Cyber Laws V Rajendran venkrajen@yahoo.com http://venkrajen.in 044-22473849; 9444073849 Security: Definition, Need and types Security: Being free
More informationICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010
ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 NRCCL (University of Oslo, Faculty of Law) Topics Overview of
More informationACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationSORNA Substantial Implementation Review State of Florida
SORNA Substantial Implementation Review State of Florida The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking
More informationIndustry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws
Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationCitizen and E-Governance- Cyber Law and Related. Issues
Citizen and E-Governance- Cyber Law and Related Issues By Na.Vijayahankar Cyber Law Solutions Ltd Chennai (Presented at the AMIC Seminar in Chennai on December 12, 2000) E-Governance has two dimensions.
More informationIs the Content of Spam Illegal?
Is the Content of Spam Illegal? 1 Introduction The E-Privacy Directive prohibits the sending of unsolicited marketing emails to individuals within the European Union. The only exception is where there
More informationCybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
More informationCyber Crime ACC Crime
AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999
BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999 [Date of Assent 5 August 1999] [Operative Date 4 October 1999] ARRANGEMENT OF SECTIONS 1 Citation PART I PRELIMINARY 2 Definitions 3 Crown to be bound
More informationELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT
ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT By John S. Stolz and John D. Cromie 2001 American Bar Association. Reprinted with permission On October 1, 2000, the United States took a substantial
More informationLAW ON ELECTRONIC TRANSACTIONS
Lao People s Democratic Republic Peace Independence Democracy Unity Prosperity National Assembly No 20/NA Vientiane Capital, Date: 7 December 2012 (Unofficial Translation) LAW ON ELECTRONIC TRANSACTIONS
More informationFUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS
IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]
More informationCOMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
More informationBERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26
QUO FA T A F U E R N T BERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26 TABLE OF CONTENTS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Citation Definitions Crown to be bound Objects Regulatory policy
More informationDepartment of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police
Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission
More informationSafeguarding your organisation against terrorism financing. A guidance for non-profit organisations
Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN:
More informationParsonage Vandenack Williams LLC Attorneys at Law
MEDICAL RECORDS ACCESS GUIDE NEBRASKA Parsonage Vandenack Williams LLC Attorneys at Law Parsonage Vandenack Williams LLC 2008 For more information, contact info@pvwlaw.com TABLE OF CONTENTS RESPONDING
More informationTen Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
More informationCybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police
Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the
More informationNational Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
More informationCouncil of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
More informationCOMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
More informationADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013
ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 1 CONTENT INTRODUCTION COMESA CYBER SECUIRTY PROGRAMME CYBER SECURITY ECONOMICS WHY PPPs? PPPs ACTORs CHALLENGES
More informationThe Transfer of Funds (Sark) Ordinance, 2007 a
The Transfer of Funds (Sark) Ordinance, 2007 a [CONSOLIDATED TEXT] NOTE This consolidated version of the enactment incorporates all amendments listed in the footnote below. However, while it is believed
More informationCYBER SECURITY STRATEGY AN OVERVIEW
CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationMaking our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
More informationTHE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL)
139TH INTERNATIONAL TRAINING COURSE RESOURCE VISITING MATERIAL EXPERTS SERIES PAPERS No.79 THE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL) Rajan Prasad Bhattarai * I. HISTORICAL BACKGROUND
More informationMutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)
More informationCO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
More informationHow To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
More informationPaperless Trade Legal & Regulatory Framework of KOREA. Hyun-Ku Kang Vice President / e-document Division
Paperless Trade Legal & Regulatory Framework of KOREA Hyun-Ku Kang Vice President / e-document Division Paperless TradeLegal & Regulatory Framework of KOREA CONTENTS 1. Concept of Paperless Trade 2. Evolution
More informationREPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL DRAFT FOR PUBLIC COMMENT
REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL DRAFT FOR PUBLIC COMMENT (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette
More informationMODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers
More informationManaging cyber crimes in India issues and challenges
Managing cyber crimes in India issues and challenges *Mrs.Vineetha.P.K *Principal, Sarada Vilas Law College, Mysore Abstract The use of internet has become the part and parcel of every educated person
More information2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy
Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April
More informationRegulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationAGREEMENT AND TERMS OF USE
AGREEMENT AND TERMS OF USE The website located at www.100womeninhedgefunds.org and the services of 100 Women in Hedge Funds ( 100WHF ) available thereon (collectively, the Site ), together with the networking
More informationPublic Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009
Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Presenter Adam Mambi,(Advocate of High Court) -Deputy Executive Secretary, Law Reform Commission Tanzania
More informationSupplementary Policy on Data Breach Notification Legislation
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 4 May 2013 Supplementary Policy on Data Breach Notification Legislation Introduction It has been reported
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationQueensland WHISTLEBLOWERS PROTECTION ACT 1994
Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Act No. 68 of 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Section PART 1 PRELIMINARY TABLE OF PROVISIONS Division 1 Title and commencement Page 1 Short
More informationFRANCE. Chapter XX OVERVIEW
Chapter XX FRANCE Merav Griguer 1 I OVERVIEW France has an omnibus privacy, data protection and cybersecurity framework law. As a member of the European Union, France has implemented the EU Data Protection
More informationLAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007, amend. SG.
More informationTitle of Course: Cyberlaw New Course: 10/25/02
Department: Accounting and Management Information Systems Course No. IU300 Title of Course: Cyberlaw New Course: 10/25/02 I. Catalog Description and Credit Hours of Course: Provides a foundation in law
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationSTATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012.
THE EAST AFRICAN COMMUNITY STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. to the East African Community Gazette No. 7 of 11th May, 2012. Printed by the Uganda Printing and Publishing Corporation,
More informationThe Transfer of Funds (Alderney) Ordinance, 2007
The Transfer of Funds (Alderney) Ordinance, 2007 ARRANGEMENT OF SECTIONS PART I INFORMATION TO ACCOMPANY TRANSFERS OF FUNDS 1. Application. 2. Information accompanying transfers of funds and record keeping.
More informationIdentity Cards Act 2006
Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More information