Page 26 - cyber law new
P. 26
Cyber Crime and Law (iii) Dissemination of obscene material.
(iv) Defamation.
(v) Unauthorized control/access over computer system.
Notes (vi) Indecent exposure
(vii) Email spoofing
(viii) Cheating & Fraud
Against Individual Property:
(i) Computer vandalism
(ii) Transmitting virus
(iii) Unauthorized control/access over computer system
(iv) Intellectual Property crimes
(v) Internet time thefts
Against Organization:
(i) Unauthorized control/access over computer system
(ii) Possession of unauthorized information.
(iii) Cyber terrorism against the government organization.
(iv) Distribution of pirated software etc.
Against Society at large:
(i) Pornography (basically child pornography).
(ii) Polluting the youth through indecent exposure.
(iii) Trafficking
(iv) Financial crimes
(v) Sale of illegal articles
(vi) Online gambling
(vii) Forgery
1.19 Information Technology Act
The Information Technology Act deals with the following cybercrimes along with others.
Tampering with Computer Source Documents
A person who knowingly or intentionally, conceals (hides or keeps secret), destroys
(demolishes or reduces), alters (change in characteristics) or causes another to conceal,
destroy, and alter any computer source code used for a computer, computer program,
computer system or computer network, when the computer source code is required to
be kept or maintained by law is punishable.
26 Self Learning Material