Cyber LAW
Cyber LAW
Cyber LAW
• Money/Greed
• Curiosity
• Revenge
• Fun
• Praise seekers
Cyber Crime – Upward Trends
Cyber Crime
• Curiosity and Revenge may be
primary reasons for a perpetrator
to get motivated for a cyber crime.
• Most of the times, people are not
aware about the implications of
cyber crimes/laws
• Girls are the most found victims of
a cyber crimes
• Monetary un-lawful or quick
Gain/profit
Common Scenarios – Defamatory Post
It is usually found that a victim shares photographs and personal videos in
good faith at the time of good relationship but the same photographs and
videos can be edited and uploaded in different social media sites and bad
websites in the pretext of revenge, defame, blackmail etc.
BANK NEVER ASK FOR ANY CARD NO OR OTP’S OR PIN NO. ETC
FACEBOOK RELATED FRAUD
Fraudsters these days use face book as the platform to cheat
innocent people, the fraudster creates an fancy face book profile
(foreigners) and sends friend requests which gets accepted by
common victims. Over a period of time and several
conversations once the fraudster has relevant information
about the victim (birthdays, anniversary, etc) he poses to have
sent gifts from abroad having high values, the victim then gets
call of confirmation from airport customs that a gift has come
which has high value and needs payment for clearance, the
victim pays the initial amount and there on keeps on receiving
call demanding money for more clearance and at the day gets
cheated.
"Dos and Don'ts"
DO NOT ACCEPT FRIEND REQUEST FROM UNKNOWN
PERSONS ON FACEBOOK OR ANY SOCIAL MEDIA.
DO NOT PAY FOR ANY GIFTS
Fake website related recruitment fraud:
A fraudster creates alike website copying the entire
details from the Original Organisation and they
upload the false results containing the name of the
candidates (victims), charges money from innocent
youths pursuing a career. Who pay them in the
belief of getting Job? But later finds out at the time
of Joining that the entire process was a fraud.
• Cyber stalking
• Cyber Bullying
• Installing Key loggers
• Cyber Terrorism
• Email based Frauds
• Web jacking
• Online Gambling
• DoS Attacks
CYBER CRIME UNDER IPC
Apart from punishments in IT Act, 2000,
there are certain crimes that are attracted by
IPC provisions as well. The following is the
enumeration of the IPC provisions along with
various cyber crimes that are attracted by
respective Sections and the punishment for
the same.
Section 292 of IPC:
Although this Section was drafted to deal with the
sale of obscene material, it has evolved in the
current digital era to be concerned with various
cybercrimes.
The publication and transmission of obscene
material or sexually explicit act or exploit acts
containing children, etc which are in electronic
form are also governed by this section. Though
the crimes mentioned above seem to be alike,
they are recognized as different crimes by the IT
Act and
The punishment imposed upon the
commission of such acts is imprisonment
and fine up to 2 years and Rs. 2000. If any
of the aforementioned crimes are committed
for the second time, the imprisonment could
be up to 5 years and the fine could be
imposed up to Rs. 5000.
Section 354C of IPC:
The cybercrime dealt with under this
provision is capturing or publication of a
picture of private parts or acts of a woman
without such person’s consent. This section
exclusively deals with the crime of ‘voyeurism’
which also recognizes watching such acts of a
woman as a crime.
If the essentials of this Section (such as
gender) are not satisfied, Section 292 of IPC
and Section 66E of IT Act, 2000 is broad
enough to take the offenses of a similar kind
into consideration.
The punishment includes 1 to 3 years of
imprisonment for first-time offenders and 3 to
7 years for second-time offenders.
Section 354D of IPC: This section describes and
punishes ‘stalking’ including both physical and
cyberstalking. If the woman is being monitored
through electronic communication, internet, or email
or is being bothered by a person to interact or
contact despite her disinterest, it amounts to cyber-
stalking.
The latter part of the Section states the punishment
for this offense as imprisonment extending up to 3
years for the first time and 5 years for the second
time along with a fine imposed in both the instances.
Section 379 of IPC:
If a mobile phone, the data from that mobile
or the computer hardware is stolen, Section
379 comes into the picture and the
punishment for such crime can go up to 3
years of imprisonment or fine or both. But the
attention must be given to the fact that these
provisions cannot be applied in case the
special law i.e IT Act, 2000 provisions are
attracted.
Section 411 of IPC:
This deals with a crime that follows the offenses
committed and punished under Section 379. If anyone
receives a stolen mobile phone, computer, or data
from the same, they will be punished in accordance
with Section 411 of IPC. It is not necessary that the
thief must possess the material. Even if it is held by a
third party knowing it to be others, this provision will
be attracted. The punishment can be imposed in the
form of imprisonment which can be extended up to 3
years or fine or both.
Section 419 and Section 420 of
IPC
These are related provisions as they deal with frauds. The
crimes of password theft for the purpose of meeting
fraudulent objectives or the creation of bogus websites and
commission of cyber frauds are certain crimes that are
extensively dealt with by these two sections of IPC. On the
other hand, email phishing by assuming someone’s identity
demanding password is exclusively concerned with Section
419 of IPC. The punishments under these provisions are
different based upon the gravity of the committed
cybercrime. Section 419 carries a punishment up to 3 years
of imprisonment or fine and Section 420 carries up to 7
years of imprisonment or fine.
Section 465 of IPC:
In the usual scenario, the punishment for forgery is
dealt with in this provision. In cyberspace, the
offenses like email spoofing and preparation of false
documents are dealt with and punished under this
Section which imbibes the imprisonment reaching up
to 2 years or fine or both.
Security Awareness
Security Awareness
• Passwords are the only and/OR the primary option to
ensure privacy of your information
• Ensure Passwords are complex in nature
•Do not write passwords
•Do Not Keep your Display Pic (DP) in Whatsapp open
to everyone
• Do Not Accept friend request from unknown person.
• Keep your photos in Facebook secured
• Log- out from all devices after completing your work.
Security Awareness – Social Media
Social Media (FB, twitter, etc) is now an integral part of
our daily life
Be sensitive in what you upload on your social
networking account (status, pics, etc)
Use security and privacy options provided by social
media sites
SMS based second factor authentication
Access control (who can see what)
Browser /machine mapping to your social media profile
Block
Keep your personal details, personal.
Security Awareness – Smart mobile devices
• Connect to ONLY authorized wifi access
• Use auto lock features
• Download apps from authorized app stores ONLY
• Use Privacy options provided by various mobile
Operating system
• Do NOT accept calls from weird numbers OR do not
give a call back
Thank You.