KNOW ABOUT CYBER LAWS | CRIMES | ONLINE ARTICLE THEFT - must read

|
             
   KNOW ABOUT CYBER LAWS | CRIMES | ONLINE ARTICLE THEFT

Friends today I am here,with some articles based on Cyber theft and laws.There are many people in websites and blog who do cyber crime some do it knowingly but some unknowingly.


 Here I am  going to describe about this topic which I had gained referring  internet (google) and news papers.

Cyber Law of India:
  
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.

Now we can categorize cyber crime in 2 ways 

  • The Computer as a Target :-using a computer to attack other computers.
    e.g. Hacking, Virus/Worm attacks, DOS attack etc.

  •  The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
The Technical acpects:
  • COPYING OTHERS CONTENT

    copying  from others blog or website( PLAGIARISM ) with out obeying their TOS is a cyber crime.That will
    be liable to a fine  of rupees one lakh. or Imprisonment up to 2 years.So never copy others site content If victim admin.'s register a complaint on cyber cell . PLAGIARIST  can happily live rest of their life in prison!!!! SO NEVER DO IT!!!!!!!

  • Unauthorized access & Hacking

    Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
    There are many people who writes articles on hacking.The code says that those people who spreads their knowledge on hacking are also doing a crime,Which  in fact is same as doing a cyber crime.If you are among them stop  right now.Why going prison in  Young ages?
  • Trojan Attack:-
    The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. The name Trojan Horse is popular. Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan. 
  • Virus and Worm attack:-
    A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms. 
E-mail & IRC related crimes:-
  
1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. 

2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code. 

4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related 

For more details  about cyber laws log on to cyberlawsindia

 LIST OF PUNISHMENT FOR CYBER CRIMES                                                               

                            Information Technology (Amendment) Act 2008

Information Technology (Amendment) Act 2008  has been notified and enforced on 27th Oct, 2009.
This Act punishes various cyber crimes including Cyber Terrorism.
Important Sections Related to Cyber Crimes

Tampering with Computer Source Documents
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
Explanation -
For the purposes of this section, "Computer Source Code" means the listing of programmes, Computer Commands, Design and layout and programme analysis of computer resource in any form.

Punishment for dishonestly receiving stolen computer resource or communication device
Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.

 A Punishment for sending offensive messages through communication service, etc
Any person who sends, by means of a computer resource or a communication device,-
a) any information that is grossly offensive or has menacing character; or
b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device,
c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to three years and with fine.
Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail Message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message.

Punishment for identity theft
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.

Read more on these topics- visit alertindian

Blogging and social networking is good but if it is for bad purpose the impact will be bad..

Friends hope you have gone through this post .Now  you  can comment below if You were affected  By these laws.THANK YOU!!!!