Академический Документы
Профессиональный Документы
Культура Документы
CYBER LAW
JITENDER VIG
27/01/2011
1
INTRODUCTION
Pre 1990: People are not connected
22
If any person, dishonestly or fraudulently, does any
act referred to in section 43,
Examples
Handing over password by the existing officer
Deliberately ignoring warnings of IDS
Putting firewall on disable mode
Secured access or attempts to secure access to a
protected system
Punishment : jailed upto 10 years and/or fine
Protected system declared by the Government
Examples: Computers of India Army, Mumbai Police,
Forest Dept of Government etc.
Examples (attempts)
Unsuccessful attempt to break password
Unsuccessful DOS attack
Unsuccessful attempt to send a Trojan
If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
(b) downloads, copies or extracts any
data, computer data base or information
from such computer, computer system
or computer network including
information or data held or stored in any
removable storage medium;
To download is to transfer information from one
computer to another
To copy is to imitate or reproduce an exact
replica of the original
To extract is to take out, distil, deduce, derive or
quote from any source
If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
(c) introduces or causes to be introduced
any computer contaminant or computer
virus into any computer, computer
system or computer network;
If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network
(d) damages or causes to be damaged
any computer, computer system or
computer network, data, computer data
base or any other programmes residing
in such computer, computer system or
computer network;
Damage means to destroy, alter, delete, add,
modify or rearrange any computer resource by
any means
Examples
Changing an image from .gif format to .jpg format
Deleting/changing of code/URL/ excel file
If any person without permission of the owner or any
other person who is incharge of a computer, computer
system or computer network -
(e) disrupts or causes disruption of any
computer, computer system or
computer network;
Disruption- could be total or partial
To prevent the normal continuance of
To throw into confusion or disorder
To interupt or impede the progress of
Examples of Disruption
Spreading worms in a global
networkslowing down of the network