1 / 20

Cyber Laws – world wide

International Cyber laws. Cyber Laws – world wide. legal system leading to…. By - Kai . Connecting Cyber Justice…. These types of crimes are referred as cybercrimes globally…. Illegal access Illegal interception Data interference System interference Misuse of devices

wilbur
Télécharger la présentation

Cyber Laws – world wide

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Cyber laws Cyber Laws – world wide legal system leading to… By - Kai Connecting Cyber Justice…

  2. These types of crimes are referred as cybercrimes globally….. • Illegal access • Illegal interception • Data interference • System interference • Misuse of devices • Computer-related forgery • Computer-related fraud • Damage to computer data or programs Laws control the lesser man…

  3. Illegal access The access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system. Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally.

  4. Electronic Communications Privacy Act - ECPA • Accessing mails with out permissions • Hacking system and controlling • Accessing web servers with out rights

  5. Illegal interception Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system.

  6. U.S code - § 2521. Injunction against illegal interception • Phone tapping • Whenever it shall appear that any person is engaged or is about to engage in any act which constitutes or will constitute a felony violation of this chapter, the Attorney General may initiate a civil action in a district court of the United States to enjoin such violation. The court shall proceed as soon as practicable to the hearing and determination of such an action, and may, at any time before final determination, enter such a restraining order or prohibition, or take such other action, as is warranted to prevent a continuing and substantial injury to the United States or to any person or class of persons for whose protection the action is brought. • A proceeding under this section is governed by the Federal Rules of Civil Procedure, except that, if an indictment has been returned against the respondent, discovery is governed by the Federal Rules of Criminal Procedure.

  7. Data interference Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the damaging, deletion, deterioration, alteration or suppression of computer data without right. A Party may reserve the right to require that the conduct described in paragraph 1 result in serious harm.

  8. Example • It should be a crime to intentionally damage, delete, degrade, alter or suppress data in someone else's computer without right. • intentionally sending viruses that delete files, or hacking a computer and changing or deleting data, or hacking a web site and changing its appearance. The element of intentionality is important, since otherwise producing defective software or unintentionally forwarding a virus would be a crime

  9. Illegal System interference • Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data.

  10. Misuse of devices • Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right Such as • a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with - a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed.

  11. Devices misuse act in • Gambling Devices Act - U.S code: 15 U.S.C. 1171 • Gambling Devices Transportation Act - U.S code :15 U.S.C. 1171 et seq • Rural Access to Emergency Devices Act knows as u.sRural AED Act - 42 U.S.C. 254c • Safe Medical Devices Act of 1990 - U.S code: 21 U.S.C. 301 note

  12. Computer-related forgery • Anyone who knowingly obtains or possesses another person’s identity information in circumstances giving rise to a reasonable inference that the information is intended to be used to commit an indictable offence that includes fraud, deceit or falsehood as an element of the offence. • Computer forgery act in Canada - Section 402.2 • Forgery Detection service - www.acoelectronics.com

  13. Computer forgery • Forgery in the Second Degree, arising out of actions in sending electronic mail messages (`e-mail’) purporting to have originated from three different e-mail accounts without permission from the accounts' owners. • Email forgery – creating rumor • Phone call forgery • Sms forgery

  14. Computer-related fraud, abuse • NEW LAW - In the United States, unauthorised computer access is punishable under the Computer Fraud and Abuse Act • U.S Code: - 18 USC 1030

  15. Crimes under abuse act • producing child pornography for the purpose of its distribution through a computer system; • offering or making available child pornography through a computer system; • distributing or transmitting child pornography through a computer system; • procuring child pornography through a computer system for oneself or for another person; • possessing child pornography in a computer system or on a computer-data storage medium

  16. 419 Legal - Internet Fraud and Online Scam • 419 Scams operate as : The target receives an unsolicited fax, email, or letter often concerning Nigeria or another African nation containing either a money laundering or other illegal proposal OR you may receive a Legal and Legitimate business proposal by normal means. More info on 419 -> http://www.419legal.org/

  17. Tips - Precautions THE FIVE RULES FOR DOING BUSINESS WITH NIGERIA - Courtesy of The 419 Coalition • 1. NEVER pay anything up front for ANY reason. • 2. NEVER extend credit for ANY reason. • 3. NEVER do ANYTHING until their check clears. • 4. NEVER expect ANY help from the Nigerian Government. • 5. NEVER rely on YOUR Government to bail you out.

  18. Online Help • You may file a Financial Loss complaint online with the Internet Crime Complaint Center (IC3) [formerly the Internet Fraud Complaint Center (IFCC) ]. This organization is a partnership of the National White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI). • www.ic3.gov/ • http://www.ic3.gov/complaint/ • http://www.fbi.gov/scams-safety/fraud/internet_fraud/

  19. Case studies Indian Case Studies • Pune Citibank MphasiS Call Center Fraud US $ 3,50,000 from accounts of four US customers were dishonestly transferred to bogus accounts. This will give a lot of ammunition to those lobbying against outsourcing in US. Such cases happen all over the world but when it happens in India it is a serious matter and we can not ignore it. • It is a case of sourcing engineering. Some employees gained the confidence of the customer and obtained their PIN numbers to commit fraud. • They got these under the guise of helping the customers out of difficult situations. Highest security prevails in the call centers in India as they know that they will lose their business. There was not as much of breach of security but of sourcing engineering.

  20. Thanks For the Chance To Talk - Are there any questions ? ^_^ It's something unpredictable but in the end it's right. I hope you had the time of your life…

More Related