Professional Documents
Culture Documents
2|Page
. Piracy: This is related to the act of copying copyrighted material. The personal
2
computer and the Internet both offer new way for an 'old' crime. Online theft is
known as any type of piracy or private data that involves the use of the Internet to
market or distribute creative works protected by copyright.
. Hacking: This crime is related to the act of gaining illegal access to a computer
3
system or network and some time making unauthorized use of such access. Also, it
is the act by which other forms of cyber-crime like fraud, terrorism, etc. are
committed.
. Cyber-terrorism: The main outcome of acts of hacking is designed to cause
4
terror. E-terrorism is the result of hacking which will cause violence against
persons or property, or at least cause enough harm to generate fear like other
conventional terrorism.
. Online Pornography: There are laws against possessing or distributing child
5
pornography. Distributing pornography of any form to a minor is illegal. The
Internet is merely a new medium for this 'old' crime, but how best to regulate this
global medium of communication across international boundaries and age groups
has sparked a great deal of controversy and debate.
. Sabotage: It is another type of hacking involves the hijacking of a government or
6
corporation Web site. It means a purposeful destruction of property or slowing
down of work with the intention of damaging a business or economic system or
weakening a government or nation in a time of national emergency.
3|Page
or computer and without authorization. His malicious purposes can range from all
sorts cybercrimes such as piracy, identity theft, credit card fraud, damage, and so
forth. He may or may not utilize questionable tactics such as deploying worms and
malicious sites to meet his ends.
. Grey Hat : A grey hat hacker is a combination of both white hats and black hats.
3
This is the kind of hacker that is not a penetration tester but will go ahead and surf
the Internet for vulnerable systems he could exploit. Like a white hat, he will
inform the administrator of the website of the vulnerabilities he found after
hacking through the site. Like a black hat and unlike a pen tester, he will hack any
site freely and without any prompting or authorization from owners what so ever.
He will even offer to repair the vulnerable site he exposed in the first place for a
small fee.
. Elite Hacker : As with any society, better than average people are rewarded for
4
their talent and treated as special. This social status among the hacker
underground, the elite are the hackers among hackers in this subculture of sorts.
They are the masters of deception that have a solid reputation among their peers as
the cream of the hacker crop.
. Script Kiddie : A script kiddie is basically an part-time or non-expert hacker, who
5
breaks into people's computer systems not through his knowledge in IT security
and the ins and outs of a given website, but through the prepackaged automated
scripts (hence the name), tools, and software written by people who are real
hackers, unlike him. He usually has little to know knowledge of the underlying
concept behind how those scripts he has on hand works.
Cracking:
a. In the cyber world, a cracker is someone who breaks into a computer system or
network without authorization and with the intention of doing damage.
. Cracker is used to describe a malicious hacker.
b
c. Crackers get into all kinds of mischief like he may destroy files, steal personal
information like credit card numbers or client data, infect the system with a virus,
or undertake many others things that cause harm.
. Cracking can be done for profit, maliciously, for some harm to organization or to a
d
individuals.
e. Cracking activity is harmful, costly and unethical.
4|Page
.f It is a kind of protection given for creations of the inventions like to literary and
artistic works, symbols, names and images used in commerce. IP has two kinds of
values - moral and commercial.
. IP will provide exclusive rights to the creator to use his/her creation for a certain
g
period of time.
It is divided into two main categories:
. Copyright :
1
a. Copyright will protect the rights of authors for their work of literary - novels,
poems and plays, films, music, and artistic works(drawings, paintings,
photographs and sculptures and architectural design) etc.
. Copyright protection is provided for minimum 50 years from the death of the
b
author.
c. Rights mentioned in copyright include the performances, producers of
phonograms in recordings, broadcasters in radio and television programs etc.
. The important and social purpose for giving protection of copyright will
d
encourage and reward the creative work.
. Industrial Property :
2
Patents for inventions, trademarks, industrial designs and geographical
indications.
(i) Patent :
a. It is a special right given for an individual for his invention. Patent is a new
process or product which shows a new way of doing something or it may
offer a new technical solution to the previous problem.
. Patent will provide the protection to the patent owners for their inventions
b
and it is granted for at least next 20 years.
c. It will also provide incentives to patent owner by identifying his creativity
and by offering the material reward for his marketable inventions.
. Such type of incentives will encourage new innovation and indirectly it will
d
improve the quality of human life.
(ii)Trademark :
a. The trademark sign is used to identify certain goods or services produced or
provided by an individual or by a company.
. It is originated from the ancient times when craftsmen produced their
b
signatures, or marks or any symbol on his artistic works or products. Over a
period of years, such marks or symbols are entered into today’s system in
terms of trademark registration and protection.
5|Page
(iii)Industrial design :
a. It is related to the ornamental or artistic part of an article. A design can be
made up of three-dimensional (3D) features like shape or surface of an
article, or it may have two-dimensional (2D) features like - patterns, lines
or color etc.
. Industrial designs are used by a wide variety of industrial products like
b
technical, medical instruments, jwellery and other luxury items etc.
(iv)Geographical Indication :
a. Geographical Indication is a sign used on goods, which specifies the
geographical origin of the product or good.
. A geographical indication for particular good contains the name of the
b
place of good’s origin.
c. Many Agricultural products have qualities which are derived from the place
of origin and they are influenced by particular geographical factors like
climate and soil.
6|Page
Cyber Crimes
Intellectual Property
Data Protection and Privacy
Electronic and Digital Signatures
7|Page
6.Chapter VI gives information about the controller of certifying
authority. This is appointed by govt. of India and he will control the
activities of certifying authorities.
7.Chapter VII gives the information about the powers and duties
performed by certifying authority.
8.Chapter VIII gives information about the duties performed by
subscribers related to digital signature certificate.
9.Chapter IX gives information about penalties to damage computers
and networks by electronic hacking.
10.Chapter X gives information about the cyber regulation appellate
court that can be established to solve the cases relating to orders of
adjudicating officers.
11.Chapter XI gives information about the cyber regulation advisory
committee which is appointed by Govt. to check all cyber crime
relating to publishing others information.
12.Chapter XII gives information about the powers given to Police
officers, who can investigate cybercrime under IPC 1860, Indian
Evidence Act 1872 and RBI Act 1934.
Advantages :
1.ITAct 2000 are helpful to promote e-commerce because validation is provided
to Email, Digital signature, credit card, Online contract.
2.Because of digital signature & certificate, the Indian corporate business can
improve.
3.By providing facility to fill online forms for various purposes has become
easy.
4.Because of high penalty for doing cybercrime will reduce the ratio of
cybercrime.
Limitation :
1.No law for violation of copyright.
2.No security for accessing domain names.
3.No law for the power of attorney trusts and will.
4.No hard law for taxation.
5.No provision for payment of stamp duty for online documents.
8|Page
. This Act provides legal recognition for the transaction i.e. Electronic Data
1
Interchange (EDI) and other electronic communications. Electronic Commerce is
the alternative to paper based methods of communication to store information.
. This Act also gives facilities for electronic filling of information with the
2
Government agencies and further to change the Indian Penal Code - Indian
Evidence Act 1872, Bankers code Evidence Act 1891 and Reserve Bank of India
Act, 1934 and for matter connected therewith or incidental thereto.
. The General Assembly of the United Nations by resolution A/RES/51/162, dated
3
30 January 1997 has adopted the model law on Electronic Commerce adopted by
the United Nations Commission on International Trade Law.
. This recommends that all States give favorable consideration to the above said
4
model law when they enact or revise their laws, in terms of need for uniformity of
the law applicable to alternative to paper-based methods of communication and
storage of information.
. It is considered necessary to give effect to the said resolution and to promote
5
efficient delivery of Government services by means of reliable electronic records.
9|Page