Unit 5
Unit 5
Proposal stage. The first step in developing a new standard starts when
industry associations or consumer groups make a request. The relevant ISO
committee determines whether a new standard is indeed required.
Enquiry stage. The draft standard at this stage is called a Draft International
Standard (DIS). It is distributed to ISO members for comments and, ultimately,
a vote. If the DIS is approved at this stage without any technical changes, ISO
publishes it as a standard. If not, it moves to the approval stage.
Publication stage. If ISO members approve the new standard, the FDIS is
published as an official international standard.
According to the ISO, the phrase "ISO certification" should never be used to
indicate that a product or system has been certified by a certification body as
conforming to an ISO standard. Instead, ISO suggests referring to certified
products or systems using the full identification of the ISO standard.
For example, instead of "ISO certified", ISO recommends using the phrase "ISO
9001:2015 certified." This fully identifies the standard being certified, including
the version -- in this case, the version of ISO 9001 released in 2015.
Cyber laws help to reduce or prevent people from cybercriminal activities on a large
scale with the help of protecting information access from unauthorized people,
freedom of speech related to the use of the Internet, privacy, communications, email,
websites, intellectual property, hardware and software, such as data storage devices.
As Internet traffic is increasing rapidly day by day, that has led to a higher percentage
of legal issues worldwide. Because cyber laws are different according to the country
and jurisdiction, restitution ranges from fines to imprisonment, and enforcement is
challenging.
Cyberlaw offers legal protections for people who are using the Internet as well as
running an online business. It is most important for Internet users to know about the
local area and cyber law of their country by which they could know what activities are
legal or not on the network. Also, they can prevent ourselves from unauthorized
activities.
The Computer Fraud and Abuse Act was the first cyber law, called CFFA, that was
enacted in 1986. This law was helpful in preventing unauthorized access to computers.
And it also provided a description of the stages of punishment for breaking that law
or performing any illegal activity.
If anyone breaks a cyber law, the action would be taken against that person on the
basis of the type of cyberlaw he broke, where he lives, and where he broke the law. It
is most important to punish the criminals or to bring them to behind bars, as most of
the cybercrimes cross the limit of crime that cannot be considered as a common crime.
These crimes may be very harmful for losing the reliability and confidentiality of
personal information or a nation. Therefore, these issues must be handled according
to the laws.
o When users apply transactions on the Internet, cyber law covers every transaction and
protect them.
o It touches every reaction and action in cyberspace.
o It captures all activities on the Internet.
Fraud
Cyber laws are formed to prevent financial crimes such as identity theft, credit card
theft and other that occurring online. A person may face confederate or state criminal
charges if he commits any type of identity theft. These laws have explained strict
policies to prosecute and defend against allegations of using the internet.
Copyrighting Issues
The Internet is the source that contains different types of data, which can be accessed
anytime, anywhere. But it is the authority of anyone to copy the content of any other
person. The strict rules are defined in the cyber laws if anyone goes against copyright
that protects the creative work of individuals and companies.
Scam/ Treachery
There are different frauds and scams available on the Internet that can be personally
harmful to any company or an individual. Cyber laws offer many ways to protect people
and prevent any identity theft and financial crimes that happen online.
The offences and the punishments that falls under the IT Act, 2000 are as
follows :-
1. Tampering with the computer source documents.
2. Directions of Controller to a subscriber to extend facilities to decrypt
information.
3. Publishing of information which is obscene in electronic form.
4. Penalty for breach of confidentiality and privacy.
5. Hacking for malicious purposes.
6. Penalty for publishing Digital Signature Certificate false in certain
particulars.
7. Penalty for misrepresentation.
8. Confiscation.
9. Power to investigate offences.
10. Protected System.
11. Penalties for confiscation not to interfere with other punishments.
12. Act to apply for offence or contravention committed outside India.
13. Publication for fraud purposes.
14. Power of Controller to give directions.
Intellectual property rights are the rights given to each and every
person for the creation of new things according to their minds. IPR
usually give the creator a complete right over the use of his/her creation
for a certain period of time.
Intellectual property rights are the legal rights that cover the benefits
given to individuals who are the owners and inventors of work and have
created something unique with their intellectual creativity or capability.
Every person related to areas such as literature, music, invention, etc.,
can be granted such rights, which can then be used in their business
practices by them.