You are on page 1of 8

PART A

CASE STUDY OF CYBER LAWS


Project title
1.0 Brief Introduction/Rational:

Cyber law is a term which is used for the legal issues of internet technology including
computer hardware and software, networks and information system. Cyber law is also known
as internet law or digital law.
Nowadays, there is rush on internet traffic which leads to increase the legal issues of
cybercrime, not only within a country but it is affecting the world globally. There are various
cybercrimes like fraud, theft, money laundering and many more which are done using the
computers or networks. Cybercrime basically affects the things which are related to the use of
internet, computer, e-mails, mobile phones and data storage devices. Cyber law plays a great
role in preventing the users from unwanted things and providing security to information access,
communication and intellectual property. As mentioned before that cybercrime damages the
whole world, every country has different type of cyber laws.

2.0 Aim of the Micro-Project:

1.To ensure that every team member is familiar with the given topic.
2.Collect qualitative data regarding the topic assigned.
3.Analyze the data and represent in a precise manner in a document.
4.Work persistently to achieve the targets.
3.0 Intended Course Outcomes:

1. Identify risks related to computer security and information hazard in various situations.
2. Apply measures to prevent attacks on network using firewall.
3. Maintain secured network and describe information security compliance standards.

4.0 Resources Required:

S. Name of Resource/material Specifications


No.
1 GOOGLE
www.google.com
2 MS office 2010 MS office 2010
3 Computer System Windows 11(64-bits OS)
4 Internet -

5.0 Actio Plan

Sr. no. Detail of activity Planned start Planned Name of team


date finished members
date
1 Topics given by subject Teacher ALL TEAM
and discussed on given topic MEMBERS
with all members.
2 Collection of information Saniya Bhaldar
related to the topic.
3 Planning of project. Sudhir Pandey

4 Analyze the collected data Saniya Bhaldar


and finalize structure of
project.
5 Distribution of task and Sudhir Pandey
discussion of roles and
responsibilities of each
member.

6 Design of project. Saniya Bhaldar

7 Implementation. Sudhir Pandey


8 Final submission of micro – ALL TEAM
Project MEMBERS
9 Seminar ALL TEAM
MEMBERS

SR. NO. NAME ROLL NO. Teachers name & sign


1. Saniya Bhaldar 60
2. Sudhir Pandey 61

Mr
PART B
TITLE OF MICRO PROJECT
FILE ACCESS METHODS FILE ALLOCATION METHODS
& RAID STRUCTURE

1.0 Rationale:

Cyber law is a term which is used for the legal issues of internet technology including
computer hardware and software, networks and information system. Cyber law is also known
as internet law or digital law.
Nowadays, there is rush on internet traffic which leads to increase the legal issues of
cybercrime, not only within a country but it is affecting the world globally. There are various
cybercrimes like fraud, theft, money laundering and many more which are done using the
computers or networks. Cybercrime basically affects the things which are related to the use of
internet, computer, e-mails, mobile phones and data storage devices. Cyber law plays a great
role in preventing the users from unwanted things and providing security to information access,
communication and intellectual property. As mentioned before that cybercrime damages the
whole world, every country has different type of cyber laws

2.0 Aim/Benefits of the Micro-Project:

1.To ensure that every team member is familiar with the given topic.
2.Collect qualitative data regarding the topic assigned.
3.Analyze the data and represent in a precise manner in a document.
4.Work persistently to achieve the targets.
3.0 Intended Course Outcomes:
1. Identify risks related to computer security and information hazard in various situations.
2. Apply measures to prevent attacks on network using firewall.
3. Maintain secured network and describe information security compliance standards.

4.0 Literature Review:

https://www.infosecawareness.in/cyber-laws-of-india.

5.0 Actual Methodology Followed:

1. Make a group as per the teacher instruction.


2. Group discussion for the microproject assigned.
3. Collections of information through website and books.
4. Distributing the work equally in our group and planned to execute it.
5. Practical execution of everyone in group.
6. Submission on date assigned.

6.0 Resources Required:

S. No. Name of Specifications Qty. Remarks


Resource/Material
1. GOOGLE - -
www.google.com
2. MS office 2010 MS office 2010 1 -

3. Computer System Windows 11(64-bits 1 -


OS)
4. Internet - - -
7.0 Outputs of the Micro Project:

Section 65 – Tampering with computer Source Documents


A person who intentionally conceals, destroys or alters any computer source code (such as
programmers, computer commands, design and layout), when it is required to be maintained by
law commits an offence and can be punished with 3 years’ imprisonment or a fine of 2 Lakhs
INR or both

Section 66 - Using password of another person


If a person fraudulently uses the password, digital signature or other unique identification of
another person, he/she can face imprisonment up to 3 years or/and a fine of 1 Lakh INR.

Section 66D - Cheating Using computer resource


If a person cheats someone using a computer resource or a communication device, he/she could
face imprisonment up to 3 years or/and fine up to 1 Lakh INR

Section 66E - Publishing private Images of Others


If a person captures, transmits or publishes images of a person’s private parts without his/her
consent or knowledge, the person is entitled to imprisonment up to 3 years of fine up to 2 Lakhs
INR or both

Section 66F - Acts of cyber-Terrorism


A person can face life imprisonment if he/she denies an authorized person the access to the
computer resource or attempts to penetrate/access a computer resource without authorization,
with an aim to threaten the unity, integrity, security or sovereignty of the nation. This is a non-
bailable offence.

Section 67 - Publishing Child Porn or predating children online


If a person captures, publishes or transmits images of a child in a sexually explicit act or
induces anyone under the age of 18 into a sexual act, then the person can face imprisonment up
to 7 years or fine up to 10 lakhs INR or both.
Section 69 - Govt.'s Power to block websites
If the government feel it necessary in the interest of sovereignty and integrity of India, it can
intercept, monitor or decrypt any information generated, transmitted, received or stored in any
computer resource. The power is subject to compliance of procedure. Under section 69A, the
central government can also block any information from public access

8.0 Skill Developed/Learning outcome of this Micro-project:

Sr. Technical/ Non-technical Skills Tick Mark( √) for


No. Developed Skill
1 Information Collection √

2 Information Analysis √
3 Design of Project √
4 Programming Skills √
5 Leadership √
6 Team Management √
7 Planning √
8 Critical Thinking √
9 Task Management √
10 Creativity √
11 Develop Project in deadline driven environment √
12 Any other
9.0 Applications of this Micro Project:

SR. NO. NAME ROLL NO. Teachers name & sign


1. Saniya Bhaldar 60
2. Sudhir Pandey 61

Mr

You might also like