UNIT V CYBER LAWS-Cyber security Digital Signature.docx

ManochithraPrabhu 3 views 7 slides Oct 31, 2025
Slide 1
Slide 1 of 7
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7

About This Presentation

Cyberspace refers to the virtual environment of computer networks where online communication, transactions, and information sharing occur. It is a borderless digital world where users interact through the Internet.
Features of Cyberspace:
• Global connectivity
• Virtual communication and transac...


Slide Content

UNIT V – CYBER LAWS (9 HOURS)
1. Introduction to Cyberspace
Cyberspace refers to the virtual environment of computer networks where
online communication, transactions, and information sharing occur. It is a
borderless digital world where users interact through the Internet.
Features of Cyberspace:
Global connectivity
Virtual communication and transactions
Real-time data exchange
Storage and transmission of digital information
Involves computers, networks, and digital devices
Examples:
Online banking
Social media communication
E-commerce transactions
Cloud data storage
2. Scope and Need for Cyber Laws
With the rapid growth of the Internet, crimes and misuse of technology have
increased. Therefore, cyber laws were enacted to regulate activities in
cyberspace and protect users’ interests.
Scope of Cyber Laws:
1.E-commerce and online contracts
2.Digital signatures and authentication

3.Cyber crimes and data protection
4.Intellectual property in cyberspace
5.E-governance and online documentation
Need for Cyber Laws:
To prevent misuse of technology
To protect personal data and privacy
To control cyber crimes like hacking, fraud, and identity theft
To promote e-commerce and digital transactions
To provide legal recognition to electronic records and communication
3. Types of Cyber Crimes
Cybercrime refers to any criminal activity involving computers, networks, or
digital devices.
Major Types:
Category Examples Description
1. Hacking
Unauthorized access to
computer systems
Stealing, deleting, or
altering data
2. Cyber Fraud
Online banking fraud,
phishing, credit card fraud
Deception for financial
gain
3. Identity Theft
Using another’s personal
details online
Misuse of name, Aadhar,
or bank info
4. Cyber Stalking
Continuous online
harassment
Sending threats, obscene
messages
5. Cyber
Defamation
Posting defamatory content
online
Damaging reputation
digitally

Category Examples Description
6. Malware
Attacks
Virus, worms, ransomware
Damages data or
disrupts systems
7. Phishing and
Spoofing
Fake websites or emails
To obtain passwords or
confidential info
8. Child
Pornography
Publishing or transmitting
obscene material
Punishable under IT Act,
2000
9. Cyber
Terrorism
Attacking national security
systems
Spreading fear or
disruption
4. Overview of the Information Technology Act, 2000
The Information Technology Act, 2000 (IT Act) is India’s first law dealing
with cybercrime and electronic commerce. It came into effect on 17th
October 2000.
Objectives of the IT Act, 2000
To give legal recognition to electronic records and digital signatures
To facilitate electronic filing of documents with government
departments
To regulate cybercrime and online frauds
To promote e-governance and digital communication
To amend other laws like IPC, Evidence Act, and RBI Act to include
electronic records
Key Features of the IT Act, 2000
1.Legal Recognition of Electronic Records and Signatures

oElectronic documents are considered valid evidence in court.
2.Digital Signature Authentication
oEnsures the authenticity of electronic communication.
3.E-Governance Provisions
oFiling, issuing licenses, and maintaining records electronically.
4.Cyber Crime Provisions (Sections 65–79)
oPunishment for hacking, data theft, and publishing obscene
material.
5.Establishment of Certifying Authorities
oFor issuing digital signature certificates.
6.Cyber Appellate Tribunal (now merged with TDSAT)
oFor handling cyber disputes and appeals.
Limitations of the IT Act, 2000
Does not cover cyber defamation and intellectual property
violations adequately.
Limited coverage for data privacy and protection.
No clear framework for cross-border cybercrimes.
Needs regular amendments to handle emerging threats like AI-driven
crimes, deepfakes, and crypto frauds.
5. Digital Signature
A Digital Signature is an electronic method used to authenticate the
identity of the sender of a message or the signer of a document.
Features:

Based on asymmetric cryptography (public and private key system)
Provides authentication, integrity, and non-repudiation
Legally recognized under Section 3 of the IT Act, 2000
Process:
1.Sender signs the document using a private key.
2.Receiver verifies the signature using the sender’s public key.
Certifying Authorities:
Entities authorized to issue Digital Signature Certificates (DSCs), e.g., NIC,
e-Mudhra, Sify, etc.
6. Electronic Records and E-Governance
Electronic Records:
Documents, data, or information stored or transmitted electronically.
Legally recognized under Sections 4 to 7 of the IT Act, 2000.
Examples: E-mails, PDFs, scanned documents, online contracts.
E-Governance:
Use of information technology for efficient and transparent public service
delivery.
Key Provisions:
Filing forms, applications, and documents electronically.
Issue and storage of digital licenses and certificates.
Promotes paperless administration and transparency.
Examples:
Digital India initiative

Online Income Tax filing
Passport Seva Portal
e-Municipality systems
7. Data Protection and Adjudication
Data Protection:
Protection of personal and sensitive information from misuse, unauthorized
access, or disclosure.
Section 43A of the IT Act, 2000:
Companies handling sensitive personal data are liable to pay compensation
if they fail to protect it due to negligence.
Sensitive Personal Data Includes:
Passwords
Financial information
Health information
Biometric data
Adjudication:
Under Section 46, an Adjudicating Officer is appointed to handle disputes
involving:
Unauthorized access or data theft
Hacking or virus attacks
Damage to computer systems
Compensation up to ₹5 crore
Appeals can be made to the Cyber Appellate Tribunal (TDSAT).

8. Important Case Laws
1.State of Tamil Nadu v. Suhas Katti (2004):
First case in India where the accused was convicted for cyber
defamation under the IT Act.
2.Shreya Singhal v. Union of India (2015):
Supreme Court struck down Section 66A of the IT Act as
unconstitutional for violating freedom of speech.
3.C.B.I. v. Arif Azim (2004):
Case of credit card fraud involving online transactions — convicted
under IT Act provisions.
9. Summary Table
Concept Key Points
Cyberspace
Virtual network environment for communication and
trade
Need for Cyber
Law
To regulate e-commerce, data protection, and
cybercrime
Cyber Crimes Hacking, phishing, identity theft, cyber terrorism
IT Act, 2000
Provides legal recognition to electronic records and
signatures
Digital SignatureAuthenticates identity and ensures document integrity
E-Governance Facilitates online public services and transparency
Data Protection Prevents misuse of personal information
Adjudication Legal mechanism for resolving cyber disputes
Tags