Posts

Showing posts with the label cyberlaw

Best Cyber and Privacy Lawyer 2022 awarded to Adv Prashant Mali

Image
Prashant Mali receiving award from Actor Makrand Deshpande  Advocate Prashant Mali Got Best Cyber and Privacy lawyer of the year by the hands of Makrand Deshpande , other awardees include Mumbai Mayor Kishori Pednekar, ex Mumbai Police Commissioner Hemant Nagrale , VC of University of Mumbai, Hon. Sharad Pawar  n others . Lop Devendra Phadnavis and MP Sanjay Raut were chief guests  Earlier Lt. Balasaheb Thakre and Lt. Lata Mangeshkar we’re also recipients of the same award.  #award #cybercrime #privacy #lawyer #law #follow #media #mumbai #cybersecurity #publicpolicy #IamChevening #IVLP #media #news

IT Rules 2021 - Social Media & OTT Rules

Image
Social media, OTT Platforms, online news websites regulation in india (Information Technology Rules, 2021 ) This are the Rules framed pursuant to the powers conferred by Section 79(2)(c) and Section 69A(2) of the Information Technology Act, 2000 provides for classification of films and other entertainment programmes, including web series, bring digital news platforms within the ambit of regulations covering print and electronic media and attempts to rein in social media intermediaries.  Guidelines for intermediary and social media intermediary  The Rules define 'significant social media intermediary' as social media with users above the threshold notified by the Central government.  The Rules mandate that social media intermediary should 'enable the identification of the first originator of the information on its computer, as "may be required by a judicial or or an order passed by the Competent authority" and such an order shall only be passed for  the purposes of

When IT Act, 2000 is applied, IPC cannot be applied by Police in the FIR

Image
IT Act is a Special Act: case laws By Advocate (Dr.) Prashant Mali Sharat Babu Digumarti   Vs . Govt. of NCT of Delhi.  MANU /SC/1592/2016.  Gagan Harsh Sharma and Ors. Vs. The State of Maharashtra and Ors. MANU/MH/3012/2018. Ajay Murlidhar Batheja Vs. The State Of Maharashtra and Ors. MANU/MH/  /2018. Special Law:   A law that applies to a place or especially to a particular member or members of a class of persons or things in the same situation but not to the entire class and that is unconstitutional if the classification made is arbitrary or without a reasonable or legitimate justification or basis 1. The Indian Parliament enacted in the Fifty-First Year of the Republic of India, an act called the Information Technology Act, 2000. This act is based on the resolution A/RES/51/162 adopted by the General Assembly of the United Nations on the 30 TH January 1997 regarding the model law on the electronic commerce earlier adopted by the United Nations Commiss

Petya Ransomeware Attack : What to Do immediately

Image
Petya/Petwrap ransomware What is Petya Ransomeware do? Ans:  Ransomware, Petya does not encrypt files on a targeted system one by one. Instead, Petya reboots victims computers and encrypts the hard drive's master file table (MFT) and rendering the master boot record (MBR) inoperable, restricting access to the full system by seizing information about file names, sizes, and location on the physical disk. Petya replaces the computer's MBR with its own malicious code that displays the ransom note and leaves computers unable to boot. Why it spreads fast? Ans : Petya ransomware successful in spreading because it combines both a client-side attack (CVE-2017-0199) and a network based threat (MS17-010) So patch both first! Affected countries: UK, Ukraine, India, the Netherlands, Spain, Denmark, and others Behavior: Encrypts MFT (Master File Tree) tables for NTFS partitions and overwrites the MBR (Master Boot Record) with a custom bootloader that s

In Cyber Crime Matters How to SERVE SUMMONS TO PARTY RESIDING ABROAD

Image
Cybercrime : HOW TO SERVE SUMMONS, PROCESS, WARRANT TO PARTY RESIDING ABROAD- Comprehensive guidelines referred to in Letter No. 55019/17/2017-Legal Cell, dated ______ of Internal security Division, Ministry of Home Affairs regarding service of summons/notices/judicial process on persons residing abroad. -- 1. Section 105 of Criminal Procedure Code (CrPC) speaks of reciprocal arrangements to be made by Central Government with the Foreign Governments with regard to the service of summons / warrants / judicial processes. The Ministry of Home Affairs has entered into Mutual Legal Assistance treaty/Agreements with 22 countries which provide for serving of documents. These countries are Switzerland, Turkey, United Kingdom, Canada, Kazakhastan, United Arab Emirates, Russia, Uzbekistan, Tajikistan, Ukraine, Mongolia, Thailand, France, Bahrain, South Korea, United States of America, Singapore, South Africa, Mauritius, Belarus, Spain and Kuwait. In other cases the ministry makes a

Online impersonation and Sending bomb hoax email - Section 66D Cybercrime

Section 66(D) Cyber Crime - THE MYSTERY BEHIND HOAX MAIL SOLVED –ONE HELD                          On 20-04-2017, the sleuths of Commissioner’s Task Force, West Zone team with the assistance of S.R Nagar police, on credible information made sustained efforts and solved the mystery behind hoax mail which was generated from Hyderabad.   Details of apprehended Accused :- Motaparthi Vamshi Krishna @ vamshi chowdary S/o. M.A.sV. Prasad, age. 32 yrs, Occ. Transport agent  R/o. Flat no.G-1, TP Sanjana  Amrutha Residency, Miyapur, R.R.Dist, N/o.  Dendullur (village & Mandal), West Godavari Dist, A.P.  Brief facts On 15-04-2017 at 1647 hours commissioner of police,Mumbai received a mail from a mail ID ununn0801@gmail.com  claimed to be woman in the email and stated that she overheard six men chating in a hotel and stating that all 23 people have to split from here and board flights in three cities i.e Hyderabad, Chennai and Mumbai to hijack planes at a time tomorrow.  On th

New age Cyber Crimes : 2016

Image
New Age Cyber Crimes : 2016 New trends in cybercrime are emerging all the time, with estimated costs to the global economy running to billions of dollars. In the past, cybercrime was committed mainly by individuals or small groups. Today, we are seeing highly complex cybercriminal networks bring together individuals from across the globe in real time to commit crimes on an unprecedented scale. Criminal organizations turning increasingly to the Internet to facilitate their activities and maximize their profit in the shortest time. The crimes themselves are not necessarily new – such as theft, fraud, illegal gambling, sale of fake medicines – but they are evolving in line with the opportunities presented online and therefore becoming more widespread and damaging . Identity theft Identity theft and fraud is one of the most common types of cybercrime. The term Identity Theft is used, when a person purports to be some other person, with a view to crea