Cyber Law is an important chapter in the Class 11 Information Technology (IT) HSC syllabus that helps students understand the legal aspects of using computers, the internet, and digital technologies. These notes are prepared strictly according to the Maharashtra State Board (HSC) curriculum, with a focus on exam-oriented learning.
Cyber Law Class 11 HSC Notes
Introduction to Cyberlaw
Cyberlaw is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. Cyberlaw, also known as Internet Law or Digital Law, is the body of legal principles and regulations that govern the use of the internet, digital communications, and emerging technologies.
Advantages of Cyber Law
- The IT Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes. We need such laws so that.
- People can safely use credit cards and other digital payment methods.
- As per the IT Act, electronic records (like emails, PDFs, Word files, and online forms) are also treated as legal documents.
- Government departments can keep records safely in computers instead of huge paper files.
- The IT Act has also proposed a legal framework for the authentication and origin of electronic records/communications through digital signatures.
Ethics and Morals
- Ethics: Ethics, also called moral philosophy, is the discipline concerned with what is morally good and bad, right or wrong.
- Morals: The standards of behaviour; principles of right and wrong behaviour. Thus morals are dictated by society, culture or religion, while ethics are chosen by the person himself, which governs his life. This chapter introduces the dos and don’ts of the cyber world.
Cyber Crime
Cybercrime (computer crime) means using computers or the internet to commit crimes like theft, fraud, forgery, defamation, or damaging data. Hackers may steal private information or corrupt files. These crimes are punishable under the Indian Penal Code (IPC).
Some Examples of Cybercrime
1. Software Piracy
Software piracy is nothing but copyright violation of software created originally by an individual or an institution. Example: When you download a copy of licensed software.
Gaining access without the users’ permission is known as unauthorised access. Examples of unauthorised access are:
- Hacking financial / bank account-related information.
- Stealing organisational/intellectual information.
- Illegal monitoring of information owned by other users.
- illegal use/break of login and password of other users.
3. Copyright violation
A copyright is a legal right that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work.
4. Cracking
Activity such as deciphering codes or passwords and breaking security systems for illegal reasons is called cracking.
5. Cyberbully or Cyberstalking
Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone.
6. Phishing
This is a technique of extracting confidential information such as credit card numbers and username-password combos by pretending to be a legal enterprise. Phishing is typically carried out by email spoofing.
7. Plagiarism
Plagiarism is presenting someone else’s work or idea as your own without their consent.
8. Hacking
Hacking refers to unauthorised intrusion into a computer or a network.
Protecting Ourselves From Cyber Crime
Cyber Safety and Security
Cyber safety is the safe and responsible use of information and communication technology. It is not just about keeping information safe and secure but also about being responsible with that information, being respectful of other people online, and practising good ‘netiquette’ (internet etiquette).
1) Identify threats and risks:
- The system (computer) operates slowly with more response time.
- If the system crashes suddenly and is unable to download updates.
- Appearance of new, unfamiliar icons or messages on the desktop.
2) Protection of data:
- Protect the network with a firewall.
- Create different logins and strong passwords for different users.
- Use only verified open-source or licensed software and operating systems.
- Prohibit use of personal devices on the network, such as personal USBs or hard drives.
- Protect your Wi-Fi connection with a secure password, WEP encryption, etc. Encrypt the network traffic.
3) Recovery from cyber attack:
- After the cyberattack, data should be cleaned, recovered and restored as much as possible.
- Investigation should be carried out with support from a professional expert.
- Measures should be taken to avoid reoccurrence.
4) Educate your stakeholders (students, staff, etc.).
Introduce courses/lessons/activities for students and teachers on major components of cyber security and safety.
Do’s and Don’ts for Students in the Cyber World
Do’s
- Follow copyright rules when downloading.
- Report online bullying quickly.
- Use strong, unique passwords and change them often.
- Download software only from trusted sources.
- Sign in only on sites with https://.
- Connect with known people only.
- Be careful before posting on sensitive topics.
- Report hacking and deactivate the account if needed.
Don’ts
- Don’t share personal info unnecessarily.
- Don’t send photos to strangers.
- Don’t open unknown emails/attachments.
- Don’t give personal info to suspicious sites/messages.
- Don’t share your password/OTP.
- Don’t save login details in the browser.
- Don’t steal or copy others’ information/software.
- Don’t use files without permission.
- Don’t bully or post rude/hateful comments.
- Don’t meet online strangers alone.
- Don’t download from unknown sources.
Parental guidance
Many cybercrimes target teenagers and school children. Parents must protect kids from hackers and identity theft. Treat confidential information as secret. Never share sensitive data online. Children should not give personal details (address, phone, passwords) to friends or strangers.
IT Act of India 2000
The Information Technology Act, 2000, was passed by Parliament in May and got the President’s assent in August 2000. It gives legal recognition to electronic records and transactions, making e-commerce possible in India. The Act ensures that contracts, records, and communications done electronically have the same validity and enforceability as paper documents. It provides the legal framework for cyber laws, e-business, and the digital economy.
Salient Features of the I.T. Act
The salient features of the I.T. Act are as follows:
- Digital signature has been replaced with electronic signature to make it a more technology-neutral act.
- It elaborates on offences, penalties, and breaches.
- It outlines the Justice Dispensation Systems for cybercrimes.justice dispensation systems
- It defines in a new section that a cyber café is any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
- It provides for the constitution of the Cyber Regulations Advisory Committee.
- The IT Act 2000 was amended in 2008 and 2011, and it includes rules for cyber cafes, cyber security, delivery of services by service providers, audits of electronic documents, etc.
Disclaimer: We have provide you with the accurate handout of “Cyber Law Class 11 HSC Notes“. If you feel that there is any error or mistake, please contact me at anuraganand2017@gmail.com. The above study material present on our websites is for education purpose, not our copyrights.
All the above content and Screenshot are taken from Information Technology Class 11 Textbook and MSBSHSE (HSC) Support Material which is present in MSBSHSE (HSC) website, This Textbook and Support Material are legally copyright by Maharashtra State Bureau of Textbook Production and Curriculum Research, Pune. We are only providing a medium and helping the students to improve the performances in the examination.
Images and content shown above are the property of individual organisations and are used here for reference purposes only. To make it easy to understand, some of the content and images are generated by AI and cross-checked by the teachers. For more information, refer to the official website.