You are on page 1of 21

CYBER LAWS &

ETHICS

Definitions
Ethics:
The science of morals; the department of study concerned
with the principles of human duty. The moral principles by
which a person is guided. Oxford English Dictionary

Moral:
Of or pertaining to character or disposition, considered as
good or bad, virtuous or vicious; of or pertaining to the
distinction between right and wrong, or good and evil, in
relation to the actions, volitions, or character of responsible
beings; ethical. Oxford English Dictionary

Terms will be used interchangeably basically,


knowing the difference between right and wrong.

What is a hacker?
Hacker:
A person who uses his skill with computers to try to gain
unauthorized access to computer files or networks. Oxford
English Dictionary
The term is misleading and has been used to mean many
different things by computer professionals, cyber criminals and
the media.
Self-described hackers enjoy experimenting with technology
and writing code.
Media-labeled hackers (crackers) break into systems, cause
damage, and write malware.
Ethical hackers former hackers or crackers who have joined
the security industry to test network security and create
security products and services.

Goodies or Baddies?
Black Hats break into systems, develop
and share vulnerabilities, exploits,
malicious code, and attack tools.
Grey Hats are in hacker no-mans
land, may work as security
professionals by day and hack by night.
White Hats are part of the security
community, help find security flaws, but
share them with vendors so that
products can be made safer.
There is a fine line between the hats
and the distinction often becomes
blurred. Often a matter of perspective.

Hacker Ethics
Early hackers developed a
code of ethics, which has
been adopted in large part by
computer professionals today.
Code of ethics has evolved
based on technological and
societal changes.
Some hackers reject this code
for a variety of reasons.

Information Systems
Ethics

Computer Ethics

Standards of conduct as they


pertain to the use of information
systems

Privacy

Protecting ones personal information

Identity Theft

Stealing anothers social insurance


number, credit card number, or other
personal information

Information Systems
Ethics
Information Property
Deals with who owns information about
individuals and how information can be sold
and exchanged

Information Accessibility
Deals with what information a person has
the right to obtain about others and how the
information can be used

Issues in Information Accessibility


Carnivore
Monitoring e-mail / Privacy

Information Systems
Ethics
The Need for a Code of Ethical Conduct
Business ethics
Plagiarism

HMR: Outsourcing HR

A McGill University student won his case, having his


paper graded without submitting it to Turnitin.com,
claiming the paper was his intellectual property and
could not be used for turnitin.com to profit
Most students believe that using a tool to help reduce
plagiarism is a good thing
Turnitin.com has released a Canadian legal opinion
that it is 100 percent in compliance with Canadian
intellectual and privacy laws

Cyber Law

INTRODUCTION
Growth of
cyber space
Onset of
internet
Cyber law or
law of internet

NEED FOR CYBER LAWS


Tackling cyber
crimes
Intellectual
property rights
and copyrights
protection act

CYBER LAWS IN INDIA


IT act passed in
2000
Internet in india
Implementation
of cyber law

IT ACT PROVISIONS
Email would now be a valid and legal
form of communication in our country
that can be duly produced and approved
in a court of law.
Companies shall now be able to carry
out electronic commerce using the legal
infrastructure provided by the Act.
Digital signatures have been given legal
validity and sanction in the Act.

IT ACT PROVISIONS
The Act now allows Government to
issue notification on the web thus
heralding e-governance
Statutory remedy in case if
anyone breaks into companies
computer systems or network and
causes damages or copies data

CYBER CRIMES
CYBER CRIMES AGAINST
PERSONS
eg melissaand lovebug
virus
CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
CYBER CRIMES AGAINST
GOVERNMENT
eg Al-Qaeda

CYBER CRIMES

CRIME THROUGH
ORKUT

Koushambi ,24-year old


software professional
working for TCS was
brutally killed by
Manish Thakur , in a
hotel room at Andheri.

INTERNET AND ITS


EFFECT

20% - 30% of Internet Adult


content consumption is by
children of ages 12 - 17.
MySpace is being used by
predators to meet and
entice kids online.

Specific marketing
strategies are being used to
attract children to Adult
sites.

OFFENCES AND LAWS IN


CYBER SPACE
Tampering with
computer documents
Hacking with
computer system
Publishing obscene
material on internet
Breaching of
confidentiality and
privacy

CYBER LAWS
AMENDMENTS

INDIAN PENAL CODE,1860


INDIAN EVIDENCE ACT,1872
BANKERS BOOK EVIDENCE
ACT,1891
GENERAL CLAUSES ACT,1897

CONCLUSION
CYBER LAWS_ ESSENTIAL
FEATURE IN TODAYS WORLD OF
INTERNET

ACHIEVING GLOBAL PEACE


AND HARMONY

You might also like