Presentation On Cyber Law

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 35

PRE SE N TAT IO

N
ON
CYBE R L AW
INTRODUCTI
• Tourism is one of the fastest growing sectors of any country’s economy.
ON sectors of any country’s economy.
• Tourism is one of the fastest growing
• With digitalization of the world and to provide best tourism facilities,
online reservations, online payments and online bookings are prominent.
• Therefore there is a significant rise in cyber crime being committed.
• Therefore there is a need for awareness amongst the chain of travel agents
who are involved in the Tourism sector on the issue and also help them
take preventive measures to ensure digital safety.
In today’s session we will be covering
the aspects of Cyber Law under the
following heads:

1.Cyber Security
2.Data Privacy

3.E-Contracts

4.Privacy Policy Framework

5.Hash Tag & Meta Tag

6.Confidential Information
WHAT IS CYBER
LAW?
• Cyber Law also called IT Law is the law regarding
Information-technology including computers and the
internet. It is related to legal informatics and
supervises the digital circulation of information,
software, information security and e-commerce.

• IT law does not consist of a separate area of law


rather it encloses aspects of contract, intellectual
property, privacy and data protection laws.
Intellectual property is a key element of IT law.
AREAS OF CYBER
• Fraud
• LAW
Copyright
• Defamation
• Harassment & Stalking
• Trade Secrets
• Contracts & Employment
• Theft
• Piracy
• Terrorism
ADVANTAGES OF CYBER
LAW
• Organizations are now able to carry out e-commerce using the legal infrastructure provided by the Act.
• Digital signatures have been given legal validity and sanction in the Act.
• It has opened the doors for the entry of corporate companies for issuing Digital Signatures Certificates in the business of
being Certifying Authorities.
• It allows Government to issue notification on the web thus heralding e-governance.
• It gives authority to the companies or organizations to file any form,.
• It gives authority to the companies or organizations to file any form, application or any other document with any office,
authority, body or agency owned or controlled by the suitable Government in e-form by means of such e-form as may be
prescribed by the suitable Government.
• The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions.
What is Cyber Security?
• The term cyber security is used to refer to the security offered
through on-line services to protect your online information.
• Cyber Security and Information Security differs only in its
response and Reduction/Prevention.
• Cyber security encompasses all aspects of security viz.,
Physical, Technical, Environmental, Regulations and
Compliance including Third Parties involved in delivering an
objective
• With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm are
increasing also
Why Cyber Security is Important?
• Our world today is ruled by technology and we can’t do without it at all. From
booking our flight tickets, to catching up with an old friend, technology plays an
important role in it.
• However, the same technology may expose you when it’s vulnerable and could lead to loss of
essential data. Cyber security, alongside physical commercial security has thus, slowly and
steadily, become one of the most important topics in the business industry to be talked about.
• Cyber security is necessary since it helps in securing data from threats such as data theft or
misuse, also safeguards your system from viruses
Why Cyber Security is Important?
• Cyber security becomes important as Businesses are being
carried now on the Network of Networks. Computer
networks have always been the target of criminals, and it is
likely that the danger of cyber security breaches will only
increase in the future as these networks expand, but there are
sensible precautions that organizations can take to minimize
losses from those who seek to do harm.
Objectives of Cyber Security
• Confidentiality (disclosure)
• Integrity (authenticity)
• Availability (access)
Advantages of Cyber Security
• It will defend us from hacks and virus. It helps us to browse
the safe website.
• Internet Security process all the incoming and outgoing data
on our computer.
• The cyber security will defend us from critical attacks.
• The application of cyber security used in our PC needs update
every week.
• The security developers will update their database every
week once. Hence the new virus also detected
Safety Tips to avoid Cyber Crime
• Use Antivirus Software.
• Insert Firewalls.
• Uninstall unnecessary software.
• Maintain backup.
• Check security settings.
• Never give your full name or address to strangers.
• Learn more about the internet privacy
What is Data Privacy?
Data privacy or information privacy is a branch of data security concerned with the proper handling

of data – consent, notice, and regulatory obligations. More specifically, practical data privacy

concerns often revolve around:

• Whether or how data is shared with third parties.

• How data is legally collected or stored.

• Regulatory restrictions such as GDPR, HIPAA, GLBA, or CCPA.


Why is Data Privacy Important?
• There are two drivers for why data privacy is one of the most significant issues in our industry.
• Data is one of the most important assets a company has. With the rise of the data economy, companies find
enormous value in collecting, sharing and using data. Companies such as Google, Facebook, and Amazon
have all built empires atop the data economy. Transparency in how businesses request consent, abide by their
privacy policies, and manage the data that they’ve collected is vital to building trust and accountability with
customers and partners who expect privacy. Many companies have learned the importance of privacy the hard
way, through highly publicized privacy fails.
• Second, privacy is the right of an individual to be free from uninvited surveillance. To safely exist in one’s
space and freely express one’s opinions behind closed doors is critical to living in a democratic society.
DUE
DILLIGENCE
1.Mandatory to develop a well drafted privacy policy in order to ensure the safe handling of personal data or
information to the clients and such policy to be made available on the website of such body corporate.
2.Such Privacy will mainly deal with the following content :
• Type of personal data to be collected,
• Purpose of collecting the data,
• Usage of such collected data,
• Disclosure of information including sensitive data, and
• Reasonable security practices and procedures taken.
5. The Agency shall ensure that the person providing
information has the knowledge of the fact that the
3. The prior consent in the writing or through email
data is being collected, the purpose for which the
shall be obtained from the provider of the data i.e.
data has been collected, the intended recipients of
client regarding purpose of usage before collection of the information and the name and address of the

data. agency that is collecting and retaining the data.


6. Such Personal Information shall not be retained
4. Such Data shall not be collected unless data is
for the any period longer than the period required for
necessary for the purpose of service. the purpose.
7. Any disclosure of these sensitive data or
information to any third party shall be made
only after the prior consent of the provider.
8. Such sensitive data shall not be published anywhere.
What is E-Contracts?
Online contract or an electronic contract is an agreement modeled, signed and
executed electronically, usually over internet. An Online contract is conceptually
very similar and is drafted in the same manner in which a traditional paper-based
contract is drafted. (13) E-contract is any kind of contract formed in the course of e-
commerce by the interaction of two or more individuals using electronic means,
such as e-mail, the interaction of an individual with an electronic agent, such as a
computer program, or the interaction of at least two electronic agents that are
programmed to recognize the existence of a contract.
Kinds of E-Contracts
1. E-mail Contracts
2. Contracts through websites:
a. Clickwrap agreement or
adhesive agreement.
b. Browse wrap
c. Shrink-wrap
Essentials of E-Contract
• The offer needs to be accepted as stated earlier; the acceptance is usually undertaken by the
business after the offer has been made by the consumer in relation with the invitation to offer.
An offer is revocable at any time until the acceptance is made.
• Any contract to be enforceable by law must have lawful consideration i.e. when both parties
give and receive something in return. There should be an intention to create legal relations
while entering into a contract. If there is no intention on behalf of the parties to create legal
relationships, then no contract is possible between them.
• Further, the parties must be competent to contract. Contracts by minors, lunatics etc are void.
There must be free And genuine consent.
• The object of the contract must be lawful. A valid contract presupposes a lawful object. There
must be certainty and possibility of performance a contract, to be enforceable, must not be
vague or uncertain and there must be a possibility of performance.
Issues relating to E-Contracts
1. Jurisdiction
2. Capacity to contract
3. Issue of consent
4. Probability of loss of data
5. Acts by computer programmes
6. Interface with payment gateways
Suggestions
• The terms and conditions should not be generic but specific depending
upon the nature of the goods & services offered and they should be
brought to the sufficient attention of the consumers and provide ample
opportunity to read and then accept.
• E-commerce players should ensure reasonable efforts to prevent
unauthorized transaction. Working and more crucially implementing the
risk management policy and strategy for overall risk mitigation of the
company is critical.
• IT Act of our country does not cover all aspects of the Online Contracts which also include Mobile
Applications and Software, which also needs to be taken into consideration.
• There is certainly nothing about the subject matter of computer-generated agreements under any law
present which should render them unenforceable but the laws prevalent doesn’t even lays down any
express provisions when it comes to formation of such contracts and the difficulties arise only because
the legal doctrine of contract law which is based on an idealized model of communication between
natural persons. Therefore the real issue before us is to determine how the law should be changed,
rather than whether it should be changed.
• There is a strict need of strong and pervasive laws at the international level, both for determining the
governing law of the contract and also for establishing the proper forum for settling the disputes and
the recognition and compulsory enforcement of such forum decisions in other territorial jurisdiction
Privacy Policy Framework
• Under the IT Act, 2000, it is mandatory to provide for the Privacy Policy terms
over the websites for the purpose of satisfying the norms that the users and
providers of the data have the knowledge about the disclosure of their data and its
subsequent uses.
• An Ideal and well covered Policy Framework should mainly include following
contents
1.Purpose of Collecting the Data,
2.Type of Information which is collected (e.g. Personal details, username, passwords,
transactional history, passport details, photographs, email, etc.
(Continue)
3. How the data is used (e.g. While making a booking, while confirming
reservations, while sending updates, while contacting for birthday/anniversary
special offers, surveys, marketing promotions, etc.)
4. How long the data is kept or stored,
5. With whom the Personal Data is shared,
6. Permissions for using the mobile applications (Android, IOS, etc.),
7. What kind of protection is provided,
8. Right to change any stipulation with respect to Privacy Policy.
Hash Tag & Meta Tag
• A hashtag, introduced by the number sign, or hash symbol, #, is a type of metadata tag
used on social networks such as Twitter and other microblogging services. It lets users
apply dynamic, user-generated tagging that helps other users easily find messages with a
specific theme or content. The hashtag may contain letters, digits, and underscores.
• Searching for that hashtag yields each message that someone has tagged with it. A
hashtag archive is consequently collected into a single stream under the same hashtag.
• For example, on the photo-sharing service Instagram, the hashtag BlueSky allows users to
find all the posts that have been tagged using that hashtag.
Meta Tag
• Metadata is ‘data about data’ or
information about information.
• Metadata is defined as “standardized
descriptive information about resources,
including non-digital ones.” (e.g. book
metadata, photograph metadata, etc.)
Why create Metadata?
Metadata makes your work readily available because:
• Searchable: it's easy to find.
• Authority: it's clear who created it.
• Citation: it's easy for others to cite your work in their
publications.
• Collaboration: it helps other people to build on your
work rather than having to recreate it.
• Efficiency: you save time and money, if everyone
creates metadata.
• Funding: you may be required to make your work
readily available to others.
Confidential Information
• Confidential Information is any
information or data that is not
generally known or accessible, and
which gives the owner a competitive
advantage.
Confidential information includes…
• Technical information
• Know-how
• Technology
• Equipment Specs
• Trade Secrets
• Customer list
• Equipment
• Product plans
• Financials
• Pricing/Proposals
• Agreements
Not Confidential Info if .…
• Generally known at time of disclosure
• Information rightfully received from a third party
authorized to make disclosure
• Becomes publicly known through no fault of the
recipient
• Confidential information that goes outside of the
organization without an obligation of confidentiality –
even if disclosed to only one person – is no longer
confidential
Protecting Confidential Information
• Law provides us with legal protection to protect our
confidential information by
1.Trade Secrets and
2.Confidential Agreements; Non-Disclosure Agreements.
Steps to protect Confidential Information
• Limited Access
• Know your visitors
• Keep Employees Aware
• Keep it Clean:
1. Clear Conference Rooms
2.Log Off Computers
• Disclose with care:
Disclose only what is needed
Secure Signed confidentiality agreements.
Thank you

You might also like