尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
SOCIETY, LAW AND ETHICS
(TOTAL : 10 MARKS)
CLASS XII PYTHON
GENDER INEQUALITY AND DISABILITY ISSUES
IDENTITY THEFT E-WASTE MANAGEMENT
TECHNOLOGY AND SOCIETY
INTELLECTUAL PROPERTY RIGHTS PRIVACY LAWS
Privacy
Privacy is your right to control how information about you is used,
processed, stored, or shared. It is the aspect of information
technology which deals with the ability of an organization or
individual to determine what data in a computer system can be
shared with third parties.
गोपनीयता आपके अधिकार को ननयंत्रित करती है कक कै से आपके बारे में
जानकारी का उपयोग ककया जाता है, संसाधित, संग्रहीत या साझा ककया
जाता है। यह सूचना प्रौद्योधगकी का एक पहलू है जो ककसी संगठन या
व्यक्तत की क्षमता के साथ यह ननिााररत करता है कक कं प्यूटर ससस्टम में
कौन सा डेटा तीसरे पक्ष के साथ साझा ककया जा सकता है।
Meaning in Hindi
Privacy Laws
Meaning in Hindi
Privacy law refers to the laws that deal with the regulation, storing, and
using of personal information of individuals, which can be collected by
governments, public or private organisations, or other individuals. It is
a regulation that protects a person's right to be left alone, and governs
collection, storage, and release of his or her financial, medical, and
other personal information.
गोपनीयता कानून उन कानूनों को संदसभात करता है जो व्यक्ततयों की व्यक्ततगत
जानकारी का विननयमन, भंडारण और उपयोग करते हैं, जो सरकारों, सािाजननक
या ननजी संगठनों या अन्य व्यक्ततयों द्िारा एकि ककए जा सकते हैं। यह एक
विननयमन है जो ककसी व्यक्तत के अके ले रहने के अधिकार की रक्षा करता है, और
उसके , उसकी वित्तीय, धचककत्सा और अन्य व्यक्ततगत जानकारी के संग्रह, भंडारण
और ररलीज को ननयंत्रित करता है।
Privacy Laws
The (Indian)Information Technology Act, 2000 deals with the
issues relating to payment of compensation (Civil)and
punishment (Criminal) in case of wrongful disclosure and
misuse of personal data and violation of contractual terms in
respect of personal data.
Under section 43A rule only deals with protection of sensitive
personal data or information of a person.
Punishment for disclosure of information in breach of lawful
contract. Disclosure of information, knowingly and intentionally,
without the consent of the person concerned.
Threats to a user’s Privacy
Meaning in Hindi
1.Web Tracking
2.Web bug
3.Lack of security
4.Spyware Programs
5. Phishing
6.Illegal and harmful content on the internet
7.Social networking
1.Web ट्रैक िं ग
2.बड़े बग
3. सुरक्षा ा अभाव
4.Spyware ार्यक्रम
5. किश िंग
6. इिंटरऩेट पर अवैध और हानन ार सामग्री
7. सामाजि ऩेटवक िं ग
CYBERCRIME
Meaning in Hindi
Cybercrime, also called computer crime, the use of a computer as an
instrument to further illegal ends, such as committing fraud, trafficking
in child pornography and intellectual property, stealing identities, or
violating privacy.
साइबर अपराि, क्जसे कं प्यूटर अपराि भी कहा जाता है, एक कं प्यूटर का उपयोग
एक उपकरण के रूप में आगे अिैि ससरों के सलए, जैसे कक िोखािडी करना, बाल
पोनोग्राफी और बौद्धिक संपदा की तस्करी, पहचान की चोरी, या गोपनीयता का
उल्लंघन करना।
STEPS TO PROTECT YOURSELF AGAINST CYBERCRIME
Meaning in Hindi
1. Always update software regularly.
2.log off your computer.
3.Go offline when you don’t need an
internet connection.
4.share less information online.
5.Use public Wi-Fi carefully.
1. हमेशा सॉफ्टिेयर को ननयसमत रूप से अपडेट करें।
2. अपने कं प्यूटर को बंद करें।
3.ऑफलाइन जब आपको इंटरनेट कनेतशन की जरूरत नहीं है।
4. ऑनलाइन कम जानकारी साझा करें।
5. सािाजननक िाई-फाई का साििानी से उपयोग करें।
PHISHING
Phishing
Meaning in Hindi
Phishing is a cybercrime in which a target or targets are
contacted by email, telephone or text message by someone
posing as a legitimate institution to lure or attract individuals into
providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
क़िश िंग ए साइबर अपराध है जिसमें क सी व्र्जति द्वारा व्र्जतिगि रूप स़े
पहचान र्ोग्र् िान ारी, बैंक िं ग और क्ऱे डिट ािय वववरण, और पासविय िैस़े
सिंव़ेदन ील ि़ेटा प्रदान रऩे र्ा आ वषयि रऩे ़े शलए ए वैध सिंस्था ़े रूप
में क सी व्र्जति द्वारा ईम़ेल, ट़ेलीिोन र्ा पाठ सिंद़े द्वारा क सी लक्ष्र् र्ा
लक्ष्र् स़े सिंप य क र्ा िािा है।
How to protect from Phishing:
•Be cautious about all communications you receive. If it appears to be a
phishing communication, do not respond. Delete it.
•आप ़े द्वारा प्राप्ि सभी सिंचार ़े बाऱे में सि य रहें। र्दद र्ह ए क़िश िंग सिंचार
प्रिीि होिा है, िो प्रनिकक्रर्ा न रें। इस़े शमटाओ।
•Do not click on any links listed in the email message, and do not open
any attachments contained in a suspicious email.
•ईम़ेल सिंद़े में सूचीबद्ध क सी भी शलिं पर जतल न रें, और ए सिंददग्ध ईम़ेल में
ननदहि क सी भी अटैचमेंट ो न खोलें।
•Do not enter personal information in a pop-up screen
•पॉप-अप स्क्रीन में व्र्जतिगि िान ारी दिय न रें
•Install a phishing filter on your email application and also on your web
browser.
•अपऩे ईम़ेल एजप्ल ़े न पर और अपऩे व़ेब ब्राउज़र पर क़िश िंग क़िल्टर स्थावपि रें।
How to protect from Phishing:
•You should pay particularly close attention to shortened links,
especially on social media.
•आप ो वव ़ेष रूप स़े सो ल मीडिर्ा पर छोट़े शलिं पर वव ़ेष रूप स़े ध्र्ान
द़ेना चादहए।
•You should always, where possible, use a secure website
(indicated by https:// and a security “lock” icon in the browser’s
address bar) to browse
•आप ो हम़े ा, िहािं सिंभव हो, ब्राउज़ रऩे ़े शलए ए सुरक्षक्षि व़ेबसाइट
(https: // और ए सुरक्षा "लॉ " आइ न ा उपर्ोग रें)
Illegal Downloading
Meaning in Hindi
illegal downloading is obtaining files or computer resources that do
not have the right to use from the Internet. Copyright laws prohibit
Internet users from obtaining copies of media that we do not legally
purchase. These laws exist to prevent digital piracy, much of which is
generally conducted through Internet file sharing.
अवैध िाउनलोडििंग उन ़िाइलों र्ा िं प्र्ूटर सिंसाधनों ो प्राप्ि र रही है िो
इिंटरऩेट स़े उपर्ोग रऩे ा अधध ार नहीिं रखि़े हैं। ॉपीराइट ानून इिंटरऩेट
उपर्ोग िायओिं ो मीडिर्ा ी प्रनिर्ािं प्राप्ि रऩे स़े रो ि़े हैं िो हम ानूनी रूप
स़े नहीिं खरीदि़े हैं। ऱ्े ानून डिजिटल पाइऱेसी ो रो ऩे ़े शलए मौिूद हैं, जिनमें
स़े ज्र्ादािर आम िौर पर इिंटरऩेट ़िाइल साझा रण ़े माध्र्म स़े सिंचाशलि होि़े
हैं।
Child Pornography
Meaning in Hindi
It is considered to be any depiction of a minor or an individual who
appears to be a minor who is engaged in sexual or sexually related
conduct. This includes pictures, videos, and computer-generated
content.
इस़े नाबाशलग र्ा क सी ऐस़े व्र्जति ा धचत्रण माना िािा है िो नाबाशलग
प्रिीि होिा है िो र्ौन र्ा र्ौन सिंबिंधधि आचरण में शलप्ि है। इसमें धचत्र,
वीडिर्ो और िं प्र्ूटर िननि सामग्री ाशमल है।
Cyber scam and frauds
Meaning in Hindi
Internet fraud is a type of fraud or deception which makes use of the
Internet and could involve hiding of information or providing incorrect
information for the purpose of tricking victims out of money, property, and
inheritance.
Cyber Crime is a crime in which a computer is the object of the crime (
hacking, phishing, spamming) or is used as a tool to commit an offense.
इंटरनेट फ्रॉड एक प्रकार का फ्रॉड या िोखा है, जो इंटरनेट का उपयोग करता है
और इसमें िन, संपवत्त और विरासत से पीडडतों को बरगलाने के उद्देश्य से
जानकारी निपाना या गलत जानकारी देना शासमल हो सकता है।
साइबर अपराि एक ऐसा अपराि है क्जसमें कं प्यूटर अपराि का उद्देश्य
(हैककं ग, क़िसशंग, स्पैसमंग) है या अपराि करने के सलए एक उपकरण के रूप में
उपयोग ककया जाता है।
Various Cyber scam and frauds carried out :
Meaning in Hindi
•Credit/debit card frauds
•Non delivery of goods ordered online
•Spoofing or phishing scams
•Identity theft
•Auction fraud
•क्ऱे डिट / ि़ेबबट ािय धोखाधडी
•माल ी गैर-डिलीवरी ऑनलाइन ऑियर ी गई
•स्पूकििं ग र्ा किश िंग स् ै म
•चोरी ी पहचान
•नीलामी धोखाधडी
Cyber Forensics:
Meaning in Hindi
Cyber forensics is a way or an electronic discovery technique
which is used to determine and reveal technical criminal
evidence.
Computer or cyber forensics is the application of investigation
and analysis techniques to gather and preserve evidence from a
particular computing device in a way that is suitable for
presentation in a court of law.
साइबर िोरेंशस ए िरी ा र्ा इल़ेतट्रॉनन खोि ि नी है जिस ा उपर्ोग
ि नी ी आपराधध सबूिों ो ननधायररि रऩे और प्र ट रऩे ़े शलए क र्ा
िािा है।
िं प्र्ूटर र्ा साइबर िोरेंशस ए वव ़ेष िं प्र्ूदटिंग डिवाइस स़े इस िरह स़े
सबूि इ ट्ठा रऩे और सिंरक्षक्षि रऩे ़े शलए िािंच और ववश्ल़ेषण ि नी ों
ा अनुप्रर्ोग है िो ानून ी अदालि में प्रस्िुनि ़े शलए उपर्ुति है।
Key elements of Cyber Forensics:
1. Establishing a Policy:
In order ensure no evidence is lost, policies must be structured in a way that
ensures safe retrieval of digital evidence.
र्ह सुननजश्चि रऩे ़े शलए क ोई सबूि नहीिं खो गर्ा है, नीनिर्ों ो इस िरह स़े सिंरधचि
क र्ा िाना चादहए िो डिजिटल साक्ष्र् ी सुरक्षक्षि पुनप्रायजप्ि सुननजश्चि रिा है।
2. Assessing Potential Evidence
This means assessing what type of evidence must be sought out before
attempting to retrieve the evidence.
इस ा अथय र्ह है क साक्ष्र् ो पुनः प्राप्ि रऩे ा प्रर्ास रऩे स़े पहल़े क स प्र ार ़े
साक्ष्र् मािंग़े िाऩे चादहए।
Key elements of Cyber Forensics:
3. Gathering Digital Evidence
Retrieving digital evidence requires not just the technical skills but also a
detailed plan. File recovery, data acquisition, password cracking,
steganography, and log capturing are few techniques applied to retrieve
hidden or lost data on a system.
डिजिटल साक्ष्र् ो पुनः प्राप्ि रऩे ़े शलए न ़े वल ि नी ी ौ ल, बजल् ए ववस्िृि
र्ोिना ी आवश्र् िा होिी है। ़िाइल पुनप्रायजप्ि, ि़ेटा अधधग्रहण, पासविय क्रै क िं ग,
स्ट़ेग्नोग्रा़िी और लॉग ै प्चररिंग ु छ शसस्टम पर नछप़े र्ा खोए हुए ि़ेटा ो पुनः प्राप्ि रऩे
़े शलए लागू ी िािी हैं।
Key elements of Cyber Forensics:
4. Examining Evidence
In order to examine evidence, cyber forensic investigators must place the
gathered evidence in an appropriate database. This evidence is then
examined to find specific file types, keywords, encrypted files, and much
more.
साक्ष्र् ी िािंच रऩे ़े शलए, साइबर िोरेंशस िािंच िायओिं ो ए बत्रि साक्ष्र् ो ए
उपर्ुति ि़ेटाब़ेस में रखना होगा। इस प्रमाण ो िब ववश ष्ट ़िाइल प्र ार, ीविय, एजरक्रप्ट
ी गई ़िाइल और बहुि ु छ खोिऩे ़े शलए िािंच ी िािी है।
5. Documenting and Reporting the Findings
Documentation is one of the most critical aspects of cyber forensics. Methods
used to retrieve evidence and systems assessed as well as recording every
aspect of the investigation is imperative
दस्िाव़ेज़ी रण साइबर िोरेंशस ़े सबस़े महत्वपूणय पहलुओिं में स़े ए है। िािंच ़े हर पहलू
ो दिय रऩे ़े साथ-साथ साक्ष्र् और प्रणाशलर्ों ो किर स़े प्राप्ि रऩे ़े शलए इस्ि़ेमाल
ी िाऩे वाली ववधधर्ािं िरूरी हैं
Various capabilities of Cyber Forensics:
1. Recover deleted files
2. Recover web page
3. Recover emails and users who read them
4. Recover chat logs
5. Determine file servers
6. Discover document history
7. Find malware and data collection
1. हटाई गई ़िाइलें पुनप्रााप्त करें
2. िेबपेज दुबारा प्राप्त करे
3. ईमेल और उन्हें पढ़ने िाले उपयोगकतााओं को पुनप्रााप्त करें
4. चैट लॉग पुनप्रााप्त करें
5. ़िाइल सिार ननिााररत करें
6. दस्तािेज़ इनतहास की खोज करें
7. मैलिेयर और डेटा संग्रह का पता लगाएं
Information Technology Act, 2000
The Information Technology Act, 2000 provides legal recognition to the
transaction done via an electronic exchange of data and other
electronic means of communication or electronic commerce
transactions. Some of sections under it act 2000 are given below.
SECTION OFFENCE PENALTY
67A Publishing images containing sexual
acts
Imprisonment up to seven years,
or/and with fine up to Rs.
1,000,000
67B Publishing child porn or predating
children online
Imprisonment up to five years,
or/and with fine up
toRs.1,000,000 on first conviction.
Imprisonment up to seven years,
or/and with fine up
toRs.1,000,000 on second
conviction.
Information Technology Act, 2000
67C Failure to maintain records Imprisonment up to three years,
or/and with fine.
68 Failure/refusal to comply with
orders
Imprisonment up to three years,
or/and with fine up
toRs.200,00069
69 Failure/refusal to decrypt data Imprisonment up to seven years
and possible fine.
70 Securing access or attempting to
secure access to a protected
system
Imprisonment up to ten years,
or/and with fine.
71 Misrepresentation Imprisonment up to three years,
or/and with fine up toRs.100,000

More Related Content

What's hot

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Ppt
PptPpt
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Abhishek Baranwal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime
Cyber crimeCyber crime

What's hot (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Ppt
PptPpt
Ppt
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Society, law and ethics Privacy Laws

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
sugandhaaggarwal
 
साइबर क्राइम (1).pdf notes fir ddu students
साइबर क्राइम (1).pdf notes fir ddu studentsसाइबर क्राइम (1).pdf notes fir ddu students
साइबर क्राइम (1).pdf notes fir ddu students
forharshever9936
 
Network security
Network securityNetwork security
Network security
vikram mahendra
 
साइबर क्राइम के कई खतरे.pdf
साइबर क्राइम के कई खतरे.pdfसाइबर क्राइम के कई खतरे.pdf
साइबर क्राइम के कई खतरे.pdf
Magbook
 
What is Hacking_.pdf
What is Hacking_.pdfWhat is Hacking_.pdf
What is Hacking_.pdf
CyberSectorInfo
 
Cyber law in Hindi | How to Prevent Cyber Crime in Hindi |
Cyber law in Hindi | How to Prevent Cyber Crime in Hindi | Cyber law in Hindi | How to Prevent Cyber Crime in Hindi |
Cyber law in Hindi | How to Prevent Cyber Crime in Hindi |
Bivas Chatterjee
 
What is cybersecurity.pdf
What is cybersecurity.pdfWhat is cybersecurity.pdf
What is cybersecurity.pdf
anoopagautam
 
What is cybersecurity.pdf
What is cybersecurity.pdfWhat is cybersecurity.pdf
What is cybersecurity.pdf
anoopagautam
 
Cyber Security PDF in Hindi - Cyber Security Guide in Hindi
Cyber Security PDF  in Hindi - Cyber Security Guide in HindiCyber Security PDF  in Hindi - Cyber Security Guide in Hindi
Cyber Security PDF in Hindi - Cyber Security Guide in Hindi
Eduminds Learning
 
Industry 4.0 and others
Industry 4.0 and othersIndustry 4.0 and others
Industry 4.0 and others
SurajKumar1509
 

Similar to Society, law and ethics Privacy Laws (10)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
साइबर क्राइम (1).pdf notes fir ddu students
साइबर क्राइम (1).pdf notes fir ddu studentsसाइबर क्राइम (1).pdf notes fir ddu students
साइबर क्राइम (1).pdf notes fir ddu students
 
Network security
Network securityNetwork security
Network security
 
साइबर क्राइम के कई खतरे.pdf
साइबर क्राइम के कई खतरे.pdfसाइबर क्राइम के कई खतरे.pdf
साइबर क्राइम के कई खतरे.pdf
 
What is Hacking_.pdf
What is Hacking_.pdfWhat is Hacking_.pdf
What is Hacking_.pdf
 
Cyber law in Hindi | How to Prevent Cyber Crime in Hindi |
Cyber law in Hindi | How to Prevent Cyber Crime in Hindi | Cyber law in Hindi | How to Prevent Cyber Crime in Hindi |
Cyber law in Hindi | How to Prevent Cyber Crime in Hindi |
 
What is cybersecurity.pdf
What is cybersecurity.pdfWhat is cybersecurity.pdf
What is cybersecurity.pdf
 
What is cybersecurity.pdf
What is cybersecurity.pdfWhat is cybersecurity.pdf
What is cybersecurity.pdf
 
Cyber Security PDF in Hindi - Cyber Security Guide in Hindi
Cyber Security PDF  in Hindi - Cyber Security Guide in HindiCyber Security PDF  in Hindi - Cyber Security Guide in Hindi
Cyber Security PDF in Hindi - Cyber Security Guide in Hindi
 
Industry 4.0 and others
Industry 4.0 and othersIndustry 4.0 and others
Industry 4.0 and others
 

More from vikram mahendra

Communication skill
Communication skillCommunication skill
Communication skill
vikram mahendra
 
Python Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemPython Project On Cosmetic Shop system
Python Project On Cosmetic Shop system
vikram mahendra
 
Python Project on Computer Shop
Python Project on Computer ShopPython Project on Computer Shop
Python Project on Computer Shop
vikram mahendra
 
PYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMPYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEM
vikram mahendra
 
BOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in PythonBOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in Python
vikram mahendra
 
FLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONFLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHON
vikram mahendra
 
FLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONFLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHON
vikram mahendra
 
FLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONFLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHON
vikram mahendra
 
OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1
vikram mahendra
 
OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2
vikram mahendra
 
USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2
vikram mahendra
 
DATA TYPE IN PYTHON
DATA TYPE IN PYTHONDATA TYPE IN PYTHON
DATA TYPE IN PYTHON
vikram mahendra
 
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
vikram mahendra
 
USER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONUSER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHON
vikram mahendra
 
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
vikram mahendra
 
INTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONINTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHON
vikram mahendra
 
Python Introduction
Python IntroductionPython Introduction
Python Introduction
vikram mahendra
 
GREEN SKILL[PART-2]
GREEN SKILL[PART-2]GREEN SKILL[PART-2]
GREEN SKILL[PART-2]
vikram mahendra
 
GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]
vikram mahendra
 
Dictionary in python
Dictionary in pythonDictionary in python
Dictionary in python
vikram mahendra
 

More from vikram mahendra (20)

Communication skill
Communication skillCommunication skill
Communication skill
 
Python Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemPython Project On Cosmetic Shop system
Python Project On Cosmetic Shop system
 
Python Project on Computer Shop
Python Project on Computer ShopPython Project on Computer Shop
Python Project on Computer Shop
 
PYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMPYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEM
 
BOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in PythonBOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in Python
 
FLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONFLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHON
 
FLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONFLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHON
 
FLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONFLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHON
 
OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1
 
OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2
 
USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2
 
DATA TYPE IN PYTHON
DATA TYPE IN PYTHONDATA TYPE IN PYTHON
DATA TYPE IN PYTHON
 
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
 
USER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONUSER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHON
 
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
 
INTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONINTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHON
 
Python Introduction
Python IntroductionPython Introduction
Python Introduction
 
GREEN SKILL[PART-2]
GREEN SKILL[PART-2]GREEN SKILL[PART-2]
GREEN SKILL[PART-2]
 
GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]
 
Dictionary in python
Dictionary in pythonDictionary in python
Dictionary in python
 

Recently uploaded

Advanced English Structures. .pdf
Advanced English Structures.          .pdfAdvanced English Structures.          .pdf
Advanced English Structures. .pdf
sukhchainkukeyala
 
PORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefullPORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefull
pranavsawarbandhe24
 
Understanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds LearningUnderstanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds Learning
Eduminds Learning
 
Art Intergrated Project of Odisha in Hindi
Art Intergrated Project of Odisha  in HindiArt Intergrated Project of Odisha  in Hindi
Art Intergrated Project of Odisha in Hindi
joe S
 
Pinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdfPinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdf
Yuvraj Singh
 
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESHTHE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
142rakeshraj142
 

Recently uploaded (6)

Advanced English Structures. .pdf
Advanced English Structures.          .pdfAdvanced English Structures.          .pdf
Advanced English Structures. .pdf
 
PORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefullPORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefull
 
Understanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds LearningUnderstanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds Learning
 
Art Intergrated Project of Odisha in Hindi
Art Intergrated Project of Odisha  in HindiArt Intergrated Project of Odisha  in Hindi
Art Intergrated Project of Odisha in Hindi
 
Pinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdfPinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdf
 
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESHTHE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
 

Society, law and ethics Privacy Laws

  • 1. SOCIETY, LAW AND ETHICS (TOTAL : 10 MARKS) CLASS XII PYTHON
  • 2. GENDER INEQUALITY AND DISABILITY ISSUES IDENTITY THEFT E-WASTE MANAGEMENT TECHNOLOGY AND SOCIETY INTELLECTUAL PROPERTY RIGHTS PRIVACY LAWS
  • 3.
  • 4. Privacy Privacy is your right to control how information about you is used, processed, stored, or shared. It is the aspect of information technology which deals with the ability of an organization or individual to determine what data in a computer system can be shared with third parties. गोपनीयता आपके अधिकार को ननयंत्रित करती है कक कै से आपके बारे में जानकारी का उपयोग ककया जाता है, संसाधित, संग्रहीत या साझा ककया जाता है। यह सूचना प्रौद्योधगकी का एक पहलू है जो ककसी संगठन या व्यक्तत की क्षमता के साथ यह ननिााररत करता है कक कं प्यूटर ससस्टम में कौन सा डेटा तीसरे पक्ष के साथ साझा ककया जा सकता है। Meaning in Hindi
  • 5. Privacy Laws Meaning in Hindi Privacy law refers to the laws that deal with the regulation, storing, and using of personal information of individuals, which can be collected by governments, public or private organisations, or other individuals. It is a regulation that protects a person's right to be left alone, and governs collection, storage, and release of his or her financial, medical, and other personal information. गोपनीयता कानून उन कानूनों को संदसभात करता है जो व्यक्ततयों की व्यक्ततगत जानकारी का विननयमन, भंडारण और उपयोग करते हैं, जो सरकारों, सािाजननक या ननजी संगठनों या अन्य व्यक्ततयों द्िारा एकि ककए जा सकते हैं। यह एक विननयमन है जो ककसी व्यक्तत के अके ले रहने के अधिकार की रक्षा करता है, और उसके , उसकी वित्तीय, धचककत्सा और अन्य व्यक्ततगत जानकारी के संग्रह, भंडारण और ररलीज को ननयंत्रित करता है।
  • 6. Privacy Laws The (Indian)Information Technology Act, 2000 deals with the issues relating to payment of compensation (Civil)and punishment (Criminal) in case of wrongful disclosure and misuse of personal data and violation of contractual terms in respect of personal data. Under section 43A rule only deals with protection of sensitive personal data or information of a person. Punishment for disclosure of information in breach of lawful contract. Disclosure of information, knowingly and intentionally, without the consent of the person concerned.
  • 7. Threats to a user’s Privacy Meaning in Hindi 1.Web Tracking 2.Web bug 3.Lack of security 4.Spyware Programs 5. Phishing 6.Illegal and harmful content on the internet 7.Social networking 1.Web ट्रैक िं ग 2.बड़े बग 3. सुरक्षा ा अभाव 4.Spyware ार्यक्रम 5. किश िंग 6. इिंटरऩेट पर अवैध और हानन ार सामग्री 7. सामाजि ऩेटवक िं ग
  • 8. CYBERCRIME Meaning in Hindi Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. साइबर अपराि, क्जसे कं प्यूटर अपराि भी कहा जाता है, एक कं प्यूटर का उपयोग एक उपकरण के रूप में आगे अिैि ससरों के सलए, जैसे कक िोखािडी करना, बाल पोनोग्राफी और बौद्धिक संपदा की तस्करी, पहचान की चोरी, या गोपनीयता का उल्लंघन करना।
  • 9. STEPS TO PROTECT YOURSELF AGAINST CYBERCRIME Meaning in Hindi 1. Always update software regularly. 2.log off your computer. 3.Go offline when you don’t need an internet connection. 4.share less information online. 5.Use public Wi-Fi carefully. 1. हमेशा सॉफ्टिेयर को ननयसमत रूप से अपडेट करें। 2. अपने कं प्यूटर को बंद करें। 3.ऑफलाइन जब आपको इंटरनेट कनेतशन की जरूरत नहीं है। 4. ऑनलाइन कम जानकारी साझा करें। 5. सािाजननक िाई-फाई का साििानी से उपयोग करें।
  • 11. Phishing Meaning in Hindi Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure or attract individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. क़िश िंग ए साइबर अपराध है जिसमें क सी व्र्जति द्वारा व्र्जतिगि रूप स़े पहचान र्ोग्र् िान ारी, बैंक िं ग और क्ऱे डिट ािय वववरण, और पासविय िैस़े सिंव़ेदन ील ि़ेटा प्रदान रऩे र्ा आ वषयि रऩे ़े शलए ए वैध सिंस्था ़े रूप में क सी व्र्जति द्वारा ईम़ेल, ट़ेलीिोन र्ा पाठ सिंद़े द्वारा क सी लक्ष्र् र्ा लक्ष्र् स़े सिंप य क र्ा िािा है।
  • 12. How to protect from Phishing: •Be cautious about all communications you receive. If it appears to be a phishing communication, do not respond. Delete it. •आप ़े द्वारा प्राप्ि सभी सिंचार ़े बाऱे में सि य रहें। र्दद र्ह ए क़िश िंग सिंचार प्रिीि होिा है, िो प्रनिकक्रर्ा न रें। इस़े शमटाओ। •Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email. •ईम़ेल सिंद़े में सूचीबद्ध क सी भी शलिं पर जतल न रें, और ए सिंददग्ध ईम़ेल में ननदहि क सी भी अटैचमेंट ो न खोलें। •Do not enter personal information in a pop-up screen •पॉप-अप स्क्रीन में व्र्जतिगि िान ारी दिय न रें •Install a phishing filter on your email application and also on your web browser. •अपऩे ईम़ेल एजप्ल ़े न पर और अपऩे व़ेब ब्राउज़र पर क़िश िंग क़िल्टर स्थावपि रें।
  • 13. How to protect from Phishing: •You should pay particularly close attention to shortened links, especially on social media. •आप ो वव ़ेष रूप स़े सो ल मीडिर्ा पर छोट़े शलिं पर वव ़ेष रूप स़े ध्र्ान द़ेना चादहए। •You should always, where possible, use a secure website (indicated by https:// and a security “lock” icon in the browser’s address bar) to browse •आप ो हम़े ा, िहािं सिंभव हो, ब्राउज़ रऩे ़े शलए ए सुरक्षक्षि व़ेबसाइट (https: // और ए सुरक्षा "लॉ " आइ न ा उपर्ोग रें)
  • 14. Illegal Downloading Meaning in Hindi illegal downloading is obtaining files or computer resources that do not have the right to use from the Internet. Copyright laws prohibit Internet users from obtaining copies of media that we do not legally purchase. These laws exist to prevent digital piracy, much of which is generally conducted through Internet file sharing. अवैध िाउनलोडििंग उन ़िाइलों र्ा िं प्र्ूटर सिंसाधनों ो प्राप्ि र रही है िो इिंटरऩेट स़े उपर्ोग रऩे ा अधध ार नहीिं रखि़े हैं। ॉपीराइट ानून इिंटरऩेट उपर्ोग िायओिं ो मीडिर्ा ी प्रनिर्ािं प्राप्ि रऩे स़े रो ि़े हैं िो हम ानूनी रूप स़े नहीिं खरीदि़े हैं। ऱ्े ानून डिजिटल पाइऱेसी ो रो ऩे ़े शलए मौिूद हैं, जिनमें स़े ज्र्ादािर आम िौर पर इिंटरऩेट ़िाइल साझा रण ़े माध्र्म स़े सिंचाशलि होि़े हैं।
  • 15. Child Pornography Meaning in Hindi It is considered to be any depiction of a minor or an individual who appears to be a minor who is engaged in sexual or sexually related conduct. This includes pictures, videos, and computer-generated content. इस़े नाबाशलग र्ा क सी ऐस़े व्र्जति ा धचत्रण माना िािा है िो नाबाशलग प्रिीि होिा है िो र्ौन र्ा र्ौन सिंबिंधधि आचरण में शलप्ि है। इसमें धचत्र, वीडिर्ो और िं प्र्ूटर िननि सामग्री ाशमल है।
  • 16. Cyber scam and frauds Meaning in Hindi Internet fraud is a type of fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Cyber Crime is a crime in which a computer is the object of the crime ( hacking, phishing, spamming) or is used as a tool to commit an offense. इंटरनेट फ्रॉड एक प्रकार का फ्रॉड या िोखा है, जो इंटरनेट का उपयोग करता है और इसमें िन, संपवत्त और विरासत से पीडडतों को बरगलाने के उद्देश्य से जानकारी निपाना या गलत जानकारी देना शासमल हो सकता है। साइबर अपराि एक ऐसा अपराि है क्जसमें कं प्यूटर अपराि का उद्देश्य (हैककं ग, क़िसशंग, स्पैसमंग) है या अपराि करने के सलए एक उपकरण के रूप में उपयोग ककया जाता है।
  • 17. Various Cyber scam and frauds carried out : Meaning in Hindi •Credit/debit card frauds •Non delivery of goods ordered online •Spoofing or phishing scams •Identity theft •Auction fraud •क्ऱे डिट / ि़ेबबट ािय धोखाधडी •माल ी गैर-डिलीवरी ऑनलाइन ऑियर ी गई •स्पूकििं ग र्ा किश िंग स् ै म •चोरी ी पहचान •नीलामी धोखाधडी
  • 18. Cyber Forensics: Meaning in Hindi Cyber forensics is a way or an electronic discovery technique which is used to determine and reveal technical criminal evidence. Computer or cyber forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. साइबर िोरेंशस ए िरी ा र्ा इल़ेतट्रॉनन खोि ि नी है जिस ा उपर्ोग ि नी ी आपराधध सबूिों ो ननधायररि रऩे और प्र ट रऩे ़े शलए क र्ा िािा है। िं प्र्ूटर र्ा साइबर िोरेंशस ए वव ़ेष िं प्र्ूदटिंग डिवाइस स़े इस िरह स़े सबूि इ ट्ठा रऩे और सिंरक्षक्षि रऩे ़े शलए िािंच और ववश्ल़ेषण ि नी ों ा अनुप्रर्ोग है िो ानून ी अदालि में प्रस्िुनि ़े शलए उपर्ुति है।
  • 19. Key elements of Cyber Forensics: 1. Establishing a Policy: In order ensure no evidence is lost, policies must be structured in a way that ensures safe retrieval of digital evidence. र्ह सुननजश्चि रऩे ़े शलए क ोई सबूि नहीिं खो गर्ा है, नीनिर्ों ो इस िरह स़े सिंरधचि क र्ा िाना चादहए िो डिजिटल साक्ष्र् ी सुरक्षक्षि पुनप्रायजप्ि सुननजश्चि रिा है। 2. Assessing Potential Evidence This means assessing what type of evidence must be sought out before attempting to retrieve the evidence. इस ा अथय र्ह है क साक्ष्र् ो पुनः प्राप्ि रऩे ा प्रर्ास रऩे स़े पहल़े क स प्र ार ़े साक्ष्र् मािंग़े िाऩे चादहए।
  • 20. Key elements of Cyber Forensics: 3. Gathering Digital Evidence Retrieving digital evidence requires not just the technical skills but also a detailed plan. File recovery, data acquisition, password cracking, steganography, and log capturing are few techniques applied to retrieve hidden or lost data on a system. डिजिटल साक्ष्र् ो पुनः प्राप्ि रऩे ़े शलए न ़े वल ि नी ी ौ ल, बजल् ए ववस्िृि र्ोिना ी आवश्र् िा होिी है। ़िाइल पुनप्रायजप्ि, ि़ेटा अधधग्रहण, पासविय क्रै क िं ग, स्ट़ेग्नोग्रा़िी और लॉग ै प्चररिंग ु छ शसस्टम पर नछप़े र्ा खोए हुए ि़ेटा ो पुनः प्राप्ि रऩे ़े शलए लागू ी िािी हैं।
  • 21. Key elements of Cyber Forensics: 4. Examining Evidence In order to examine evidence, cyber forensic investigators must place the gathered evidence in an appropriate database. This evidence is then examined to find specific file types, keywords, encrypted files, and much more. साक्ष्र् ी िािंच रऩे ़े शलए, साइबर िोरेंशस िािंच िायओिं ो ए बत्रि साक्ष्र् ो ए उपर्ुति ि़ेटाब़ेस में रखना होगा। इस प्रमाण ो िब ववश ष्ट ़िाइल प्र ार, ीविय, एजरक्रप्ट ी गई ़िाइल और बहुि ु छ खोिऩे ़े शलए िािंच ी िािी है। 5. Documenting and Reporting the Findings Documentation is one of the most critical aspects of cyber forensics. Methods used to retrieve evidence and systems assessed as well as recording every aspect of the investigation is imperative दस्िाव़ेज़ी रण साइबर िोरेंशस ़े सबस़े महत्वपूणय पहलुओिं में स़े ए है। िािंच ़े हर पहलू ो दिय रऩे ़े साथ-साथ साक्ष्र् और प्रणाशलर्ों ो किर स़े प्राप्ि रऩे ़े शलए इस्ि़ेमाल ी िाऩे वाली ववधधर्ािं िरूरी हैं
  • 22. Various capabilities of Cyber Forensics: 1. Recover deleted files 2. Recover web page 3. Recover emails and users who read them 4. Recover chat logs 5. Determine file servers 6. Discover document history 7. Find malware and data collection 1. हटाई गई ़िाइलें पुनप्रााप्त करें 2. िेबपेज दुबारा प्राप्त करे 3. ईमेल और उन्हें पढ़ने िाले उपयोगकतााओं को पुनप्रााप्त करें 4. चैट लॉग पुनप्रााप्त करें 5. ़िाइल सिार ननिााररत करें 6. दस्तािेज़ इनतहास की खोज करें 7. मैलिेयर और डेटा संग्रह का पता लगाएं
  • 23. Information Technology Act, 2000 The Information Technology Act, 2000 provides legal recognition to the transaction done via an electronic exchange of data and other electronic means of communication or electronic commerce transactions. Some of sections under it act 2000 are given below. SECTION OFFENCE PENALTY 67A Publishing images containing sexual acts Imprisonment up to seven years, or/and with fine up to Rs. 1,000,000 67B Publishing child porn or predating children online Imprisonment up to five years, or/and with fine up toRs.1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up toRs.1,000,000 on second conviction.
  • 24. Information Technology Act, 2000 67C Failure to maintain records Imprisonment up to three years, or/and with fine. 68 Failure/refusal to comply with orders Imprisonment up to three years, or/and with fine up toRs.200,00069 69 Failure/refusal to decrypt data Imprisonment up to seven years and possible fine. 70 Securing access or attempting to secure access to a protected system Imprisonment up to ten years, or/and with fine. 71 Misrepresentation Imprisonment up to three years, or/and with fine up toRs.100,000
  翻译: