Cyber law & IPR- Part 1

Cyber Law and Intellectual Property Rights (IPR)

  • Course: CC- SIUCSSE141

  • Instructor: Asst. Prof. Jesica Deruz

Basic Concepts

  • Computer:

    • A programmable machine for storing and processing information.

    • Executes sequences of arithmetic or logical operations automatically.

  • Computer Network:

    • Interconnected collection of devices that share resources and information.

  • Intranet:

    • A private network within an organization for secure information sharing.

Internet and Cyberspace

  • Internet:

    • Global interconnected computer networks facilitating information and communication.

    • Comprises private, public, academic, and government networks linked by various communication technologies.

  • Cyberspace:

    • Digital realm for interactions across interconnected systems.

    • Represents both the virtual environment and geographical borders.

Data and Information

  • Data:

    • Unprocessed facts typically presented numerically.

    • Lacks independent meaning.

  • Information:

    • Processed data that has been enhanced to provide context and meaning.

    • Helps in decision-making.

Internet Overview

  • Connectivity:

    • Connects computers globally, enabling information sharing.

  • Historical Figures:

    • Robert W. Taylor - ARPANET developer.

    • Vinton Cerf and Robert Kahn - TCP/IP technologies developers.

  • Challenges:

    • Rise in cyber threats: spam, malware, cyberbullying, doxxing.

    • Privacy concerns over user data collection by companies.

Internet: Advantages and Disadvantages

  • Advantages:

    • Global connection.

    • E-commerce opportunities.

    • Ease of online education and abundant information.

  • Disadvantages:

    • Loss of personal data.

    • Fake information circulation.

    • Distractions and health concerns.

Security in Cyberspace

  • Network Security:

    • Safeguarding data and networks from unauthorized access and attacks.

    • Utilizes various tools, technologies, and practices.

  • Controls in Network Security:

    • Physical Control: Prevents unauthorized physical access to network components.

    • Technical Control: Protects data on the network from internal and external threats.

    • Administrative Control: Security policies governing user behavior and access levels.

Types of Network Security

  • Network Access Control (NAC):

    • Restricts unauthorized access to networks.

  • Antivirus and Antimalware Software:

    • Protects systems from malicious software.

  • Firewall:

    • Monitors and controls network traffic.

  • Virtual Private Network (VPN):

    • Encrypts data and masks IP addresses for private browsing.

Aspects of Network Security

  • Key Aspects:

    • Privacy: Confidentiality between sender and receiver.

    • Message Integrity: Ensures data integrity in transit.

    • Authentication: Validates the identity of the sender.

    • Non-Repudiation: Assurance that a sender cannot deny sending a message.

Common Cyber Threats

  • Phishing: Fake messages from purported sources to obtain personal information.

  • Email Miscommunication: Issues arise even when email services track opened messages.

  • Malware: Result of downloading compromised software updates.

  • Eavesdropping: Breaches into private online communications.

Legal Framework and Regulations

  • Cyber Law:

    • Governs legal issues related to cyberspace and communication technology.

    • Includes provisions regarding cyber crimes, electronic signatures, and data protection.

  • Key Components:

    • Fraud: Protects from online identity theft and financial crimes.

    • Copyright: Addresses copyright violations made easier by the internet.

    • Defamation: Regulates inaccurate statements made online.

    • Harassment: Online behavior violating laws against harassment.

Cyber Law in India

  • Cybercrime:

    • Encompasses all crimes involving information technology.

    • Classified as:

      • Computer as Target: Attacks on computers (e.g., hacking).

      • Computer as Weapon: Real-world crimes committed using computers (e.g., cyber terrorism, fraud).

Information Technology Act, 2000 (IT Act)

  • Introduction:

    • India’s cyber law framework was established with the IT Act.

    • Legal acknowledgment of electronic transactions and communications.

  • Objectives of the IT Act:

    • Enables legal recognition of digital signatures.

    • Facilitates e-document filings and electronic data storage.

  • Key Features:

    • Validates all electronic contracts.

    • Established a Cyber Regulatory Appellant Tribunal for oversight.

Cryptography

  • Definition:

    • Technique for securing communication via conversion of plain text into ciphertext.

  • Key Features:

    • Ensures confidentiality, integrity, and non-repudiation of data.

    • Utilizes algorithms for data encryption and transaction verification.

Types of Cryptography

  • Symmetric Key Cryptography:

    • Same key used for encryption and decryption. Faster but requires secure key exchange.

  • Hashing:

    • One-way conversion of data into fixed-length strings (message digest) ensuring data integrity.

  • Asymmetric Key Cryptography:

    • Uses a pair of keys (public and private) for encryption and decryption.

Digital Signature vs Electronic Signature

  • Digital Signature:

    • Regulated verification method to protect documents.

  • Electronic Signature:

    • Less regulated, primarily verifies identity.

Key Issues in Cyber Laws

  • E-Commerce:

    • Cyber laws need to address data privacy, security, consumer protection, and intellectual property issues.

  • E-Governance:

    • Focus on accessibility, legal recognition of electronic records, data security, and transparency.

  • E-Records & E-Contracts:

    • Legal binding of digital contracts, authentication, consumer protection.

  • Regulators:

    • Oversee compliance, monitoring, standards development, and collaboration across jurisdictions.

  • Certifying Authority:

    • Issues digital certificates, essential for secure online transactions.