Академический Документы
Профессиональный Документы
Культура Документы
II *ISSUE-21
CYBER LAW
* Dr. D.B. Tiwari ** Maneesh Taneja
October, 2010
* Principal Sai College Sector- 6, Bhilai Distt- Durg ** Asst Prof. in Computer Science Sai College Sector- 6, Bhilai Distt- Durg
A B S T R A C T
Nowadays the use of computer electornic device and other things are increased for protection of these things becomes necessary for that we must know about Cyber law Cyber Crime. Now a day we can access the data and information from all over the world using of internet. After the development of internet computer is a one of the major tool for the cyber. Now days most of finacial and non& financial activities are done with computer and computer related services such as Internet. The use of e- Governance the confidential document of goverment departments and organization is process and stored which can be hacked using computer.
Introduction Human success in any field leasds to crime that needs mechanisms to control it. Now a day crime comes in different ways and styles to our life in these ways one way of crime is use of internet for stop that type of crime we make some lawas related to internet which are called as Cyber laws. Freedom of speech is the freedom to speak without censorship and/ or limitation . Jurisdiction is the practica authority granted to a formally constituted legal body or to a political leader to deal with and make pronouncements on legal matters and. by implacation to administer justice within a defined area of responsibility. In our research we are defining Cyber Law and Birth of Cyber erime using of out first reference. different types of crime comes in our life using of second and third references. Technical aspects of Cyber Crime and Advantages of Cyber Law for these Points we use different references. What is Cyber Law? Cyber Law is the law governing computers and the lnternet In todays highly digitalized world. almost everyone is affected by cyber law. Let us take a few examples :Almost all transaction in Shares are in demat form.Almost all Companies extensively depend upon their computer networks and keep their valuable data in electornic form. Government forms including income tax returns, law forms etc are now filled in eledtronic form.Consumers are increasingly using credit cards for shopping .Most people are using email cell phones and SMS messages for communication. Even in non - cyber crime cases important evidence is found in computers/ cell phones e.g. in cases of divorce. murder. kidnapping tax evasion. organized crime. terrorist operations. counterfeit currency etc.
Cyber crime cases such as online banking frauds, online shrare trading fraud. source code theft. credit card fraud. tax evasion. virus attacks, cyber sabotage, phishing attacks, email hijacking. denial of service, hacking, pornography etc are becoming common.Digital signatures and e- contracts are fast replacing conventional methods of transacting business. HERE THE ONE OFTHE CASE STUDY 3 An underworld don is hospitalized for a minor surgery. His rival goons hire a computer expert to hack into the hospitals computers systems and alter the medicines prescribed for the don. The nurse innocently gives the don a high dose of the medicine. to which the patient is severely allergic. resulting in his death. Sounds unbelievable ? Well. its true. This was the first ever cyber murder reported in the US five years ago! A cyber crime is a crime wherein the computer is either the tool of the target or both.In India, the Information TechnologyAct 2000 Which came into effect in October 2000. provides stringent penalties for cyber criminals. from fines of Rs 1 crore to imprisonment upto 10 years. Contrary to common belief cyber crimes are very common in India, the most common complaints relating to emails containing threatening or defamatory messages.In a recent case a grooms family received numerous emails containing defamatory information about the prospective bride. Fortunately, they did not beleve the emails and chose to take the matter to the police. The sender of the emails turned out to be the girls step- father. who did not want the girl to get married as he would have lost control over her property. of which he was the legal guardian.Tracing emails is not very difficult. Every email leaves behind a trace leading back to its point of origin in the form of an email header. The SHODH SAM IKS HA AUR M ULYANKAN 63
64
' ks l k /k
e {k vk h k S e ; k j Y w a du
R E F E R E N C E
1. Cyber law : The Law of Internet by J. Rosenoer 2. Cyber Law : The Indian Perspective By pawan Duggal 3. Cyber Law & Its implication By J. Sruis 4. Cyber Law : Legal Principles of Emerging Technologies By Jeffrey A Helewitz 5. www. asianlawas .org 6. www. cyberlaws india. net7. www. madaan. com/ cyberlaw. html 8. www. cybersmart .in
65