Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Unit – 5

Cyber Ethics and Laws

Introduction to Cyber Laws:


Cyber laws are legal frameworks that govern and regulate activities in cyberspace. They are designed
to address legal issues related to the use of computers, networks, and the internet.
Cyber laws cover a wide range of areas, including data protection, privacy, intellectual property,
cybercrime, e-commerce, and digital signatures.
Cyber Law also called IT Law is the law regarding Information-technology including computers and
the internet. It is related to legal informatics and supervises the digital circulation of information,
software, information security, and e-commerce.
Write the Importance of Cyber Law?
1. It covers all transactions over the internet.
2. It keeps eye on all activities over the internet.
3. It touches every action and every reaction in cyberspace.
Write some Advantages of Cyber Law?
• Organizations are now able to carry out e-commerce using the legal infrastructure provided
by the Act.
• Digital signatures have been given legal validity and sanction in the Act.
• It allows Government to issue notifications on the web e-governance.
• It gives authority to the companies or organizations to file any form, application, or any other
document with any office, authority, body, or agency owned or controlled by the suitable
Government in e-form using such e-form as may be prescribed by the suitable Government.
• The IT Act also addresses the important issues of security, which are so critical to the success
of electronic transactions.
• Cyber Law provides both hardware and software security.
Explain Area of Cyber Law?
1. Cyber laws contain different types of purposes.
2. Some laws create rules for how individuals and companies may use computers and the internet
while some laws protect people from becoming the victims of crime.
A. Fraud:
Consumers depend on cyber laws to protect them from online fraud. Laws are made to prevent
identity theft, credit card theft, and other financial crimes that happen online.
B. Copyright: Copyright violation is an area of cyber law that protects the rights of individuals and
companies to profit from their creative works.
C. Defamation: Defamation laws are civil laws that save individuals from fake public statements that
can harm a business or someone’s reputation. When people use the internet to make statements that
violate civil laws, that is called Defamation law.
D. Harassment and Stalking: When a person makes threatening statements again and again about
someone else online, there is a violation of both civil and criminal laws. Cyber lawyers both prosecute
and defend people when stalking occurs using the internet and other forms of electronic
communication.
E. Freedom of Speech: Cyber lawyers must advise their clients on the limits of free speech including
laws that prohibit obscenity. Cyber lawyers may also defend their clients when there is a debate about
whether their actions consist of permissible free speech.
F. Contracts and Employment Law:
Every time you click a button that says you agree to the terms and conditions of using a website, you
have used cyber law. There are terms and conditions for every website that are somehow related to
privacy concerns.
E-Commerce and E-Governance:
E-commerce refers to the buying and selling of goods and services over the internet. It involves online
transactions, electronic payments, and digital contracts.

Advantages of E-commerce:
1. Global Reach: E-commerce provides businesses with the opportunity to reach a global
audience. With an online store, businesses can transcend geographical limitations and sell
their products or services to customers worldwide. This expanded reach can lead to increased
sales and growth opportunities.
2. 24/7 Availability: Unlike physical stores with fixed operating hours, e-commerce platforms
are accessible 24/7. This convenience allows customers to make purchases at any time,
accommodating their busy schedules. It also means that businesses can generate sales even
when their physical locations are closed.
3. Lower Costs: E-commerce can significantly reduce costs for both businesses and customers.
Online stores eliminate the need for a physical storefront, which can be expensive to rent or
buy. Additionally, operational costs like staffing, utilities, and inventory management can be
streamlined with e-commerce systems. For customers, online shopping eliminates travel
expenses and allows them to compare prices easily, leading to potential cost savings.
4. Increased Customer Convenience: E-commerce offers customers unparalleled
convenience. They can browse and purchase products or services from the comfort of their
homes or on the go, using various devices like computers, smartphones, or tablets. E-
commerce also enables customers to have their purchases delivered directly to their doorstep,
saving them time and effort.
5. Personalization and Targeted Marketing: E-commerce platforms allow businesses to
collect and analyze customer data, enabling them to personalize the shopping experience. By
understanding customer preferences and behaviours, businesses can offer targeted
recommendations, personalized discounts, and tailored marketing campaigns, enhancing
customer satisfaction and increasing sales.
6. Expanded Product Range: Unlike physical stores limited by shelf space, e-commerce allows
businesses to offer a wider range of products or services. Online stores can showcase an
extensive inventory without the constraints of physical storage, providing customers with
more choices and increasing the likelihood of finding what they need.
7. Seamless Integration with Digital Marketing: E-commerce aligns well with various digital
marketing strategies. Businesses can leverage search engine optimization (SEO), social media
marketing, email marketing, and other online advertising techniques to drive traffic to their
online stores. This integration enhances brand visibility, customer engagement, and overall
marketing effectiveness.
8. Streamlined Inventory Management: E-commerce systems provide efficient inventory
management tools, automating processes such as stock tracking, replenishment, and order
fulfillment. Real-time inventory updates prevent overselling or stockouts, improving
customer satisfaction and reducing operational inefficiencies.
9. Data-driven Insights and Analytics: E-commerce platforms generate vast amounts of data
that can be analyzed to gain valuable insights. Businesses can track customer behavior, buying
patterns, and other metrics to optimize their strategies. Data-driven decision-making enables
businesses to make informed choices, enhance operational efficiency, and improve customer
satisfaction.
10. Scalability and Growth Potential: E-commerce offers businesses scalability and the
potential for rapid growth. With an online presence, businesses can easily expand their
operations without the constraints of physical infrastructure. E-commerce platforms can
handle increased traffic and transactions, allowing businesses to accommodate higher sales
volumes and expand into new markets.
Types of Ecommerce
1. Business-to-Consumer (B2C): B2C e-commerce refers to transactions conducted directly
between businesses and individual consumers. It is the most common form of e-commerce
and involves online retailers selling products or services to customers. Examples include
online shopping platforms like Amazon, eBay, and Shopify.
2. Business-to-Business (B2B): B2B e-commerce involves transactions between businesses. It
typically involves the exchange of goods, services, or information between manufacturers,
wholesalers, or distributors. B2B e-commerce platforms focus on streamlining procurement
processes and facilitating efficient transactions between businesses. Examples include
Alibaba.com and ThomasNet.
3. Consumer-to-Consumer (C2C): C2C e-commerce facilitates transactions between
individual consumers through online platforms. These platforms act as intermediaries,
connecting buyers and sellers. Users can sell products they no longer need or buy items from
other individuals. Popular C2C platforms include eBay, Craigslist, and Facebook
Marketplace.
4. Consumer-to-Business (C2B): In C2B e-commerce, individual consumers offer products or
services to businesses. This model is commonly seen in freelancing platforms, where
individuals provide services like graphic design, writing, or consulting to companies.
Crowdsourcing platforms also fall under this category, where consumers contribute their ideas
or solutions to businesses.
5. Mobile Commerce (m-commerce): M-commerce refers to e-commerce transactions
conducted using mobile devices such as smartphones and tablets. With the widespread
adoption of mobile devices, many online retailers have optimized their websites for mobile
browsing and developed dedicated mobile apps. Mobile wallets and payment systems like
Apple Pay and Google Pay have also facilitated mobile transactions.
6. Social Commerce: Social commerce integrates e-commerce with social media platforms. It
leverages social networks to facilitate product discovery, recommendations, and purchasing.
Social commerce often involves user-generated content, influencer marketing, and social
shopping features. Examples include Instagram's shopping tags and Facebook's Marketplace.
7. Dropshipping: Dropshipping is a retail fulfillment method where a store doesn't keep the
products it sells in stock. Instead, when a store sells a product, it purchases the item from a
third party and has it shipped directly to the customer. Dropshipping eliminates the need for
inventory management and allows businesses to focus on marketing and customer service.
8. Subscription-based E-commerce: This model involves offering products or services on a
subscription basis. Customers pay a recurring fee to receive products regularly or access
specific services. Subscription e-commerce is common in industries like streaming media
(Netflix, Spotify), meal kits (HelloFresh), and beauty products (Birchbox).
9. Omni-channel E-commerce: Omni-channel e-commerce provides customers with a
seamless shopping experience across multiple channels, such as online websites, mobile apps,
brick-and-mortar stores, and even call centers. Customers can browse, purchase, and return
products through various channels, allowing them to choose the most convenient option.

Write the difference between traditional commerce and ecommerce.

E-governance refers to the use of technology and electronic platforms to provide government services, engage
with citizens, and improve the efficiency of administrative processes.

Advantages of E-governance:
1. Increased Efficiency: E-governance enables government processes to be automated and
streamlined, reducing paperwork, eliminating manual errors, and speeding up decision-
making. This efficiency leads to faster service delivery and improved overall governance.
2. Transparency and Accountability: E-governance promotes transparency by providing
citizens with access to information and government services. It enables citizens to track the
progress of their applications, access public documents, and participate in decision-making
processes. This transparency fosters accountability among government officials and reduces
corruption.
3. Cost Savings: Implementing E-governance can lead to significant cost savings for
governments. It reduces administrative costs associated with manual processes, such as
paperwork, storage, and transportation. Additionally, digital platforms can enable
governments to deliver services more cost-effectively, eliminating the need for physical
infrastructure in some cases.
4. Enhanced Citizen Engagement: E-governance facilitates better citizen-government
interaction. Online portals and platforms allow citizens to provide feedback, raise concerns,
and participate in public consultations from the convenience of their homes. This engagement
leads to increased citizen satisfaction and a sense of ownership in the governance process.
5. Improved Service Delivery: E-governance enables governments to provide services more
efficiently and effectively. Online portals allow citizens to access government services 24/7,
eliminating the need for physical visits during limited office hours. This convenience
improves service delivery and enhances the overall user experience.
6. Data-Driven Decision Making: E-governance generates vast amounts of data that can be
analyzed to gain insights and make informed policy decisions. Governments can use data
analytics to identify trends, assess the impact of policies, and allocate resources more
efficiently. This data-driven approach improves governance and policy outcomes.
7. Accessibility and Inclusivity: E-governance promotes inclusivity by providing access to
government services for all citizens, including those in remote areas or with disabilities.
Online platforms can be designed to be user-friendly, multilingual, and accessible to
individuals with visual or hearing impairments, ensuring that no one is left behind.
8. Faster Response to Emergencies: During emergencies or crises, E-governance systems can
facilitate rapid response and coordination among government agencies. Real-time
communication, data sharing, and emergency alert systems enable authorities to quickly
disseminate information and provide assistance to affected populations.
9. Environmental Sustainability: E-governance reduces the consumption of paper and other
physical resources, leading to a smaller ecological footprint. Digital processes eliminate the
need for excessive printing and physical documentation, contributing to environmental
sustainability and conservation.
10. Global Connectivity and Collaboration: E-governance enables governments to collaborate
and share best practices on a global scale. International forums and platforms foster
knowledge exchange, enabling countries to learn from each other and implement successful
initiatives in their own contexts.
Types of E-governance
1. Government-to-Citizen (G2C):
• G2C e-governance focuses on providing online services and information to citizens.
• It aims to enhance convenience, accessibility, and transparency in the delivery of government
services.
• Examples include online portals for tax filing, bill payments, passport applications, voter
registration, and access to government information.

2. Government-to-Business (G2B):
• G2B e-governance aims to facilitate interactions between the government and the business
community.
• It streamlines processes such as business registration, license applications, permits, and
procurement.
• Examples include online business registration platforms, e-procurement systems, and portals
for submitting bids and tenders.

3. Government-to-Government (G2G):
• G2G e-governance focuses on improving collaboration and information sharing between
government agencies and departments.
• It aims to enhance efficiency, coordination, and integration of government services.
• Examples include interdepartmental data exchange platforms, e-filing systems for internal
government processes, and shared databases for information sharing.

4. Government-to-Employees (G2E):
• G2E e-governance initiatives target improving internal government operations and
communication with employees.
• It aims to enhance administrative efficiency, human resource management, and knowledge
sharing within the government.
• Examples include employee portals for accessing HR services, internal communication
platforms, and e-learning platforms for training and development.

5. Government-to-Society (G2S):
• G2S e-governance focuses on promoting citizen engagement, participation, and collaboration
in policy-making and governance processes.
• It aims to empower citizens and facilitate their involvement in decision-making.
• Examples include e-participation platforms, online consultation mechanisms, and social
media engagement for soliciting public input.

6. Government Internal Processes (GIP):


• GIP e-governance initiatives target improving the internal processes and workflows within
government organizations.
• It aims to enhance efficiency, productivity, and accountability.
• Examples include enterprise resource planning (ERP) systems, document management
systems, and workflow automation tools.
Write the difference between ecommerce and e governance.

Certifying Authority and Controller:


Certifying authorities are trusted entities that issue digital certificates to verify the authenticity of electronic
documents, transactions, and identities in the digital realm.
Controllers, in the context of cyber laws, refer to entities or individuals responsible for ensuring compliance
with data protection and privacy regulations.

1st Answer:
2nd Answer:
What is Intellectual Property Rights in Cyberspace?
Intellectual Property (IP) simply refers to the creation of the mind. It refers to the possession of
thought or design by the one who came up with it. It offers the owner of any inventive design or any
form of distinct work some exclusive rights, that make it unlawful to copy or reuse that work without
the owner’s permission. It is a part of property law. People associated with literature, music,
invention, etc. can use it in business practices.
Intellectual property rights (IPR) refer to legal protections granted to creators and owners of
intellectual property, such as inventions, patents, trademarks, copyrights, and trade secrets.
In cyberspace, IPR is crucial due to the ease of copying and distributing digital content. Laws related
to copyright infringement, piracy, and unauthorized use of intellectual property apply in the digital
domain.
There are numerous types of tools of protection that come under the term “intellectual property”.
Notable among these are the following:
•Patent
•Trademark
•Geographical indications
•Layout Designs of Integrated Circuits
•Trade secrets
•Copyrights
•Industrial Designs
Cyberspace is the non-physical domain where numerous computers are connected through computer
networks to establish communication between them. With the expansion of technology, cyberspace
has come within reach of every individual. This fact led to the emergence of cyberspace as a business
platform and hence increases pressure on Intellectual Property.
Offences under IT Act:
The IT Act (Information Technology Act) is a legislation in India that provides legal recognition to
electronic transactions and addresses cybercrimes.
The act defines various offenses, such as unauthorized access to computer systems, hacking, identity
theft, cyber stalking, cyber terrorism, and dissemination of obscene or offensive material.
The offences included in the IT Act 2000 are as follows:
1. Tampering with the computer source documents.
2. Hacking with computer system.
3. Publishing of information which is obscene in electronic form.
4. Power of Controller to give directions
5. Directions of Controller to a subscriber to extend facilities to decrypt information
6. Protected system
7. Penalty for misrepresentation
8. Penalty for breach of confidentiality and privacy
9. Penalty for publishing Digital Signature Certificate false in certain particulars
10. Publication for fraudulent purpose
11. Act to apply for offence or contravention committed outside India
12. Confiscation
13. Penalties or confiscation not to interfere with other punishments.
14. Power to investigate offences.
It also outlines penalties and punishments for these offenses.
Computer Offences and Penalties under IT Act 2000:
The IT Act 2000 specifies penalties for various computer offenses. Some examples include:
➢ Unauthorized access to a computer system: Imprisonment up to 2 years or a fine.
➢ Hacking with the intent to cause damage: Imprisonment up to 3 years or a fine.
➢ Publishing or transmitting obscene material: Imprisonment up to 5 years or a fine.
➢ Breach of confidentiality and privacy: Imprisonment up to 3 years or a fine.
What is IP security (IPSec)?
IPSec (Internet Protocol Security) is a set of protocols and standards used to secure communication
at the network layer of the internet protocol suite.
IPSec provides authentication, integrity, and confidentiality of IP packets through encryption and
digital signatures.
It is commonly used to establish virtual private networks (VPNs) and secure communications
between network nodes, ensuring data privacy and integrity.
1. The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of protocols
between 2 communication points across the IP network that provide data authentication, integrity,
and confidentiality.
2. It also defines the encrypted, decrypted and authenticated packets. The protocols needed for secure
key exchange and key management are defined in it.
➢ Uses of IP Security –
IPsec can be used to do the following things:
• To encrypt application layer data.
• To provide security for routers sending routing data across the public internet.
• To provide authentication without encryption, like to authenticate that the data
originates from a known sender.
• To protect network data by setting up circuits using IPsec tunneling in which all data
is being sent between the two endpoints is encrypted, as with a Virtual Private Network
(VPN) connection.
➢ Components of IP Security –
A. Encapsulating Security Payload (ESP) –
It provides data integrity, encryption, authentication and anti replay. It also provides
authentication for payload.
B. Authentication Header (AH) –
It also provides data integrity, authentication and anti replay and it does not provide
encryption.
C. Internet Key Exchange (IKE) –
It is a network security protocol designed to dynamically exchange encryption keys
and find a way over Security Association (SA) between 2 devices. The Security
Association (SA) establishes shared security attributes between 2 network entities to
support secure communication.

You might also like