You are on page 1of 22

Mukesh N Tekwani mukeshtekwani@outlook.

com
What is Cyber Law?
1. Cyber law – all legal and regulatory aspects of the
Internet.
2. Cyber space - governed by a system of laws and
regulations called cyber law.
3. Why is cyber law needed? Millions of people around the
world use Internet for business, banking, social
interactions, and Internet is misused for criminal
activities. Hence the need for laws

2
Cyber Security Law – What you can do
1. In case you become a victim of cyber crime, what can you do?
2. Preserve the relevant incriminating electronic evidence.
3. Legal liability can be:
a) Civil liability
b) Criminal liability
4. Even if you are the victim, you still have a legal liability. The law
expects you to have the duty of due diligence.
5. If you are the victim, you must report the breach to the relevant
statutory authorities
6. Example – getting email from a bank with a bank statement/invoice
meant for someone else
3
Cyber Security Law – Challenges
1. The person committing cybercrime may not be located in your
country and so legal remedies could be difficult.
2. Anyone sitting in one country could target the network of a
company or a govt in another country.
3. There is no international legal law for such matters. So jurisdiction is
going to pay a very important role in tackling cybercrime.

4
International Cyber Law
1. There are no international cyber laws.
2. Every country has its own cyber laws – only for its citizens.
3. What happens if a cyber crime is committed on country X from
country Y ?
4. Some countries have come up with bilateral agreements with other
countries – but no international laws in place
5. July 2015 – Germany came up with cyber laws – laws to protect
critical infrastructure only. Equipment, plants that are important for
running the country.
6. June 2017 – China’s cyber security law – very broad – personal
information also covered
5
What should companies do?
1. Inform customers of the breach
2. Tell customers what to do in this case
3. Examples –
1. Yahoo password leaks.
2. British Airways credit card and other info leak

6
Copyright
1. Copyright is an intellectual property right attached to
original works – e.g., books, movies, music, logo,…
2. Copyright is a protection provided by law to authors of
original works. This includes literature, films, music,
paintings, etc
3. Copyright laws apply to published and unpublished
work.
4. Copyright law helps to determine authorship, duration
of protection and laws for transfering rights to others
7
Security
1. Security is an organisational concern.
2. Every business needs safeguards that protect computer
systems and data from damage or unlawful use.
3. Protect systems from hackers
4. Protect data from unlawful use.

8
Controls
1. What are controls? These are policies, procedures,
rules, techniques designed to prevent errors in data and
systems.
2. Examples are :
a. access privileges – who, what, when
b. Data validation – numeric data for DOB, no numeric
for name, etc
c. Input authorizations, view rights, edit rights

9
Privacy
1. Security is an organisational concern
2. Privacy is an individual concern.
3. People need assurance that their personal information
such as employment, financial records, medical records,
employment history will not be misused.
4. You must ensure that you don’t reveal your personal /
private information to others.
5. Info such as – bank details, date of birth, medical
history, employment records, educational records…..
10
Software Piracy
1. It is the unauthorized copying and distribution of
copyrighted software
2. How is it done ? – Downloading, copying, sharing, selling
copies of original software
3. Software license – how many copies can be installed. If
you install more than the specified number of copies, it is
piracy
4. Sharing login credentials used to access a web-based
software application – e.g. one person pays for an online
service and many use that service by sharing password. 11
Code of Ethics
1. Ethics => Ethics is a branch of philosophy. Ethics defines
what is good and bad, what is right and wrong, obligations.
2. All software professionals (programmers, systems admins,…)
have the responsibility to provide certain quality or work
and assure control, privacy and security in their services and
products.
3. What does a code of ethics do? It gives these norms and
principles. Code of ethics sets standards.
4. Code of ethics sets commitments, requirements and
responsibilities for members of an organization. 12
Code of Ethics for Computer Professionals
1. Fair Treatment – treat everyone fairly. No discrimination on
grounds of age, gender, post, etc
2. Access private info only when it is extremely necessary for
your official duties, after taking permissions from concerned
authorities.
3. Don’t use confidential information for your personal gain.

13
Code of Ethics for Computer Professionals
4. Maintain the privacy of users and professionals.
5. Maintain good communication with users – inform users of
which resources can be shared, legal obligations, etc.
6. Maintain good system integrity – regularly perform
maintenance of hardware and software, check network and
Internet availability. Analyze system performance
(download speeds, bootup times for computers, etc)
7. Prevent unauthorized access to systems and resources
(applications, printers, data, …)
14
Code of Ethics for Computer Professionals
8. Maintain healthy cooperation. ‘We’, not ‘I’.
9. Support your colleagues – cooperate with other colleagues.
Learn from them if you don’t know something. Train them
if they need help in learning
10. Acknowledge the responsibility of the team – the
community.
11. Be honest – honesty is the best policy. Take help of seniors
if it is necessary, to perform your duties efficiently.
12. Update yourself with latest technology, software, systems
practices. If necessary, go for training, self-study. 15
Code of Ethics for Computer Professionals
13. Update yourself on social ad legal issues relating to
computing. Share with others whatever new you have
learnt. Encourage others to adopt changes in policies – this
is social responsibility
14. If you make mistakes, admit them and correct them. Don’t
try to blame others for your mistakes. Maintain
professionalism while performing your duties.
15. Remove any wrong data about individuals.

16
Do’s for Computer Professionals
1. Use the Internet to enhance your knowledge. Take courses
from sites such as Udacity, Udemy, Coursera, MIT, etc
2. When communicating with strangers, don’t share your
personal data. Personal data = family, financial, job, health
3. Respect privacy of others
4. Avoid political discussions with strangers
5. Use antivirus software to protect your computer systems
6. Download software from reliable sites only

17
Don’ts for Computer Professionals
1. Don’t share your passwords and usernames with others
2. Don’t arrange to meet unknown persons whom you met on
Internet
3. Don’t use unauthorized or pirated software
4. Don’t break / hack into computers. It’s a crime.
5. Don’t answer any improper messages
6. Don’t fall prey to lottery, cashback, loan schemes.
7. Don’t fall into traps of friendship from strangers.

18
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)

19
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)

20
Cyber Insurance
Cyber Insurance covers the following:
i. A financial loss resulting from being a victim of email spoofing and
phishing
ii. Fraudulent online transactions in bank account, debit/credit card or e-
wallet
iii. Reputational liability, including claims alleging defamation and invasion of
privacy
iv. Losses and expenses related to defence and prosecution cost related to
identity theft
v. Restoration cost to retrieve data or computer program damaged by entry
of the malware
vi. Cyber extortion loss
21
THANK YOU

Prof Mukesh N Tekwani


mukeshtekwani@outlook.com

November 9, 2019

You might also like