Page 26 - cyber law new
P. 26

Cyber Crime and Law        (iii)  Dissemination of obscene material.
                                       (iv)  Defamation.

                                       (v)   Unauthorized control/access over computer system.
                  Notes                (vi)  Indecent exposure

                                       (vii)  Email spoofing
                                       (viii)  Cheating & Fraud

                                       Against Individual Property:
                                       (i)   Computer vandalism
                                       (ii)   Transmitting virus

                                       (iii)  Unauthorized control/access over computer system
                                       (iv)  Intellectual Property crimes

                                       (v)   Internet time thefts
                                       Against Organization:
                                       (i)   Unauthorized control/access over computer system

                                       (ii)   Possession of unauthorized information.
                                       (iii)  Cyber terrorism against the government organization.

                                       (iv)  Distribution of pirated software etc.
                                       Against Society at large:
                                       (i)   Pornography (basically child pornography).

                                       (ii)   Polluting the youth through indecent exposure.
                                       (iii)  Trafficking

                                       (iv)  Financial crimes
                                       (v)   Sale of illegal articles
                                       (vi)  Online gambling

                                       (vii)  Forgery

                                  1.19  Information Technology Act


                                  The Information Technology Act deals with the following cybercrimes along with others.

                                  Tampering with Computer Source Documents
                                  A person who knowingly or intentionally, conceals (hides or keeps secret), destroys
                                  (demolishes or reduces), alters (change in characteristics) or causes another to conceal,

                                  destroy, and alter any computer source code used for a computer, computer program,
                                  computer system or computer network, when the computer source code is required to
                                  be kept or maintained by law is punishable.

           26   Self Learning Material
   21   22   23   24   25   26   27   28   29   30   31