Cyber Tort: LAW OF Torts

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

CYBER TORT

LAW OF
TORTS

Submitted to: Submitted by:


Prof.Himanshu priyadarshi ANANYA SINGH

(Assistant prof. SOLS) (B.A L.L.B 3RD Semester)


1200992019 section-A
CONTENT
>INTRODUCTION
>TYPES
>EVOLUTION AND PRESENT DEVELOPMENT
>CATEGORIES OF CYBER CRIMES
>NEEDS
>INDIAN PERSPECTIVE

ACKNOWLEDGEMENT
I would like to express My Special thanks or Gratitude to My Law of torts
teacher.

“Mr.Himanshu Sir” for their able Guidance and support in completing My


Project.

I would also like to extend My Gratitude to the Dean Sir,”Mr. T.N Prasad” for
providing me with all the facility that was required.

DATE-20/10/2021 ANANYA SINGH


B.A LLB 3rd Semester.
INTRODUCTION
 “When a man is denied the right to live the life he believes in, he has no
choice but to become an outlaw.”
― Nelson Mandela
What does crime mean?
Crime, in modern times this term doesn’t have any universally accepted definition,
but one can define crime, also called an offense as an act harmful not only to some
individual,  but also to the community or the state also known as a public wrong.
Such acts are forbidden and punishable by law. What is a criminal offense is
defined by criminal law of each country? While many countries have a crime
catalog known as the criminal code however in some common law countries no
such comprehensive statute exists.

The state has the power to severely restrict one’s liberty for committing a crime.
Modern societies, therefore, adopt and adhere a criminal procedure during the
investigation and trial of the offense and only if found guilty, the offender may be
sentenced to various punishments, such as life imprisonment or in some
jurisdictions like in India even death.

To be classified as a crime, the act of doing something bad also called as actus reus
must be usually accompanied by the intention to do something bad i.e. mens rea,
with certain exceptions like strict liability.
What is cybercrime?
Cybercrime is any criminal activity in which a computer or network is the source,
target or tool or place of crime. According to The Cambridge English Dictionary,
cyber crimes are the crimes committed with the use of computers or relating to
computers, especially through the internet. Crimes which involve use of
information or usage of electronic means in furtherance of crime are covered under
the ambit of cybercrime. Cyberspace crimes may be committed against persons,
property, government and society at large.

The common types of cyber crimes are:-


1. Hacking – An unauthorized user who attempts to or gains access to an
information system is known as a hacker. Hacking is a cyber crime even if
there is no visible damage to the system because it is an invasion in to the
privacy of data.
There are 3 different classes of Hackers.
a)      White Hat Hackers – They are those hackers who believe that information
sharing is good, and that it is their duty to share their expertise by facilitating
access to information. However there are some white hat hackers who are just “joy
riding” on computer systems.

b)      Black Hat Hackers – Black hat hackers cause damage after intrusion. They
may steal or modify data or insert viruses or worms which damage the system.
They are also known as crackers.

c)      Grey Hat Hackers – These type of hackers are typically ethical but
occasionally they can violate the hacker ethics. They will hack into networks,
stand-alone computers and software. Network hackers try to gain unauthorized
access to private computer networks just for challenge, curiosity, and distribution
of information.

2. Cyber Stalking – Cyber stalking involves use of internet to harass someone.


The   behavior includes false accusations, threats etc. Normally, majority of cyber
stalkers are men and the majority of victims are women.

3. Spamming – Spamming is sending of unsolicited bulk and commercial


messages over the internet. Although irritating to most email users, it is not illegal
unless it causes damage such as overloading network and disrupting service to
subscribers or creates negative impact on consumer attitudes towards Internet
Service Provider.
 4. Cyber Pornography – With the increasing approach of internet to the people,
there is also a increase in the victimization of Women and children for sexual
exploitation through internet. Pedophiles (a person 16 years of age or older who is
primarily or exclusively sexually attracted to children who have not begun puberty)
use the internet to send photos of illegal child pornography to targeted children so
as to attract children to such funs and later they are sexually exploited for gains.
5. Cyber Phishing – It is a criminally fraudulent process in which cyber criminal
acquires sensitive information such as username, passwords and credit card details
by disguising as a trustworthy entity in an electronic communication.
6. Software Piracy – It is an illegal reproduction and distribution of software for
business or personal use. This is considered to be a type of infringement of copy
right and a violation of a license agreement. Since the unauthorized user is not a
party to the license agreement it is difficult to find out remedies. There are
numerous cases of software piracy. Infact according to one report New Delhi’s
Nehru market is the Asia’s largest market where one can easily find pirated
software.
7. Corporate Espionage – It means theft of trade secrets through illegal means
such as wire taps or illegal intrusions.
8. Money Laundering – Money laundering basically means the moving of
illegally acquired cash through financial and other systems so that it appears to be
legally acquired. This is possible prior to computer and internet technology and
now times electronic transfers have made it easier and more successful.
9. Embezzlement – Internet facilities are misused to commit this crime. It is the
unlawful misappropriation of money, property or any other thing of value that has
been entrusted to the offender’s care, custody or control.
10. Password Sniffers – These are programs that monitor and record the name and
password of network users as they log in, jeopardizing security at a site. Whoever
installs the sniffer can impersonate an authorized user and log in to access on
restricted documents.
11. Spoofing – Spoofing is the act of disguising one computer to electronically
“look” like another compute, in order to gain access to a system that would be
normally is restricted.
12. Credit Card Fraud – In U.S.A. half a billion dollars have been lost annually
by consumers who have credit cards and calling card numbers. These are stolen
from on-line databases. In present world this cyber crime is emerged as a major
threat as numerous cases had been filed in almost every major developed and
developing country.
13. Web Jacking – The term refers to forceful taking of control of a web site by
cracking the password.
14. Cyber terrorism – The use of computer resources to intimidate or coerce
government, the civilian population or any segment thereof in furtherance of
political or social objectives is called cyber terrorism. Individuals and groups quite
often try to exploit anonymous character of the internet to threaten governments
and terrorize the citizens of the country. [1]
EVOLUTION & PRESENT DEVELOPMENT
“Cyber bullies can hide behind a mask of anonymity online, and do not need
direct physical access to their victims to do unimaginable harm.”     -Anna
Maria Chavez
Crime is both a social as well as an economic phenomenon. Its history is as old as
human society. Many books right from the pre-historic days, and mythological
stories have spoken about crimes committed by individuals be it against another
individual like ordinary theft and burglary or against the nation like spying, treason
etc. Kautilya’s Arthashastra which is written around 350 BC, considered to be an
authentic administrative treatise in India, discusses the various crimes, security
initiatives to be taken by the rulers, possible crimes in a state etc. and also
advocates punishment for the list of some stipulated offenses. Different kinds of
punishments have been prescribed for listed offenses and the concept of restoration
of loss to the victims has also been discussed in it.

Crime in any form adversely affects all the members of society. In developing
economies, cybercrime has increased at rapid strides, due to the rapid diffusion of
the Internet and the digitization of economic activities. Thanks to the huge
penetration of technology in almost all walks of society right from corporate
governance and state administration, up to the lowest level of petty shop keepers
computerizing their billing system, we find computers and other electronic devices
pervading the human life. The penetration is so deep that man cannot spend a day
without computers or a mobile. Snatching some one’s mobile will tantamount to
dumping one in solitary confinement!

The Internet is the fastest technique on earth that one can find these days and for
everything, it is the best solution that people consider looking into. It has all the
benefits and advantages like communication, advertisement, online movie and
songs downloads, emailing, instant messaging and searching out the concerns and
issues there are plenty of things that internet has got wrong as well. There are
different kinds of internet scams and frauds that are happening and one needs to be
very careful. This is something that has been bothering individuals and
organizations ever since the internet was introduced and many a time, simple
things could make you a victim even when you are unaware of it.

It is rightly said that technological development in every area is likely to cause


drastic effects in every walk of life. The scientific and technological advancement,
especially in the field of communication and information have created havoc thus,
opening new vistas for the human beings including the criminals. Today’s crime
reports reveal that many cyber crimes are committed by assistance of internet and
cell phones. On the other hand, legislatures have been compelled to frame
exclusive enactments to deal with crimes committed with the help of concerned
device.

If one is to believe newspaper reports, many scandals such as C.D. rackets were
busted by the police. It is other side of revolution in the field of information and
technology. Under the Information Technology Act, 2000, there is a apparatus
defined as “computer” which means “Any electronic magnetic, optical or other
high speed data processing device or system which performs logical arithmetical
and memory functions by manipulations of electronic magnetic or optical impulses
and all input, output, processing storage, computer software, or communication
facilities which are connected and related to the computer in a computer system or
computer network”. [2]

Development of Cyber Crime:-


CyberCrime is neither defined in the IT Act 2000 nor in the I.T. Amendment Act
2008 nor in any other legislation in India. To define cybercrime, we can say, it is
just a combination of crime and computer. To put it in simple terms ‘any offense or
crime in which a computer is used is a cybercrime’. Interestingly even a petty
offense like stealing or pick-pocket can be brought within the broader purview of
cybercrime if the basic data or aid to such an offense is a computer or information
stored in a computer used (or misused) by the fraudster. It could be hackers
vandalizing one’s site, viewing confidential information or stealing trade secrets or
intellectual property with the use of the internet. It can also include ‘denial of
services’ and viruses attacks preventing regular traffic from reaching your site.
Cyber crimes also includes criminal activities done with the use of computers
which further perpetuates crimes i.e. financial crimes, sale of illegal articles,
pornography, online gambling, intellectual property crime, e-mail, spoofing,
forgery, cyber defamation, cyberstalking, unauthorized access to Computer system,
theft of information contained in the electronic form, e-mail bombing, physically
damaging the computer system etc. In a cybercrime, computer or the data itself is
the target or the object of offense or a tool in committing some other offense,
providing the necessary inputs for that offense. All such acts of crime will come
under the broader definition of cybercrime.

In the past, cybercrime has been committed by individuals or small groups of


individuals. However, we are now seeing an emerging trend with traditional
organized crime syndicates and criminally minded technology professionals
working together and pooling their resources and expertise.

This approach has been very effective for the criminals involved. In 2007 and 2008
the cost of cybercrime worldwide was estimated at approximately USD 8 billion.
As for corporate cyber espionage, cybercriminals have stolen intellectual property
from businesses worldwide worth up to USD 1 trillion.

Categories Of Cyber Crimes


Cyber crimes can be classified into the following different categories:

i) Crimes Against Persons:


 Harassment via E-Mails:  Harassment through sending letters, attachments
of files & folders i.e. via e-mails. At present harassment is common as usage
of social sites i.e. Orkut, hangout, zapak, Facebook, Twitter etc. increasing
day by day.
 Cracking: It is amongst the gravest cyber crimes known till date. In this a
cyber criminal broke into your computer systems without your knowledge
and consent and Tampere with your precious confidential data and
information.
 Cyber-Stalking: It means expressed or implied a physical threat that creates
fear through the use to computer technology such as internet, e-mail,
phones, text messages, webcam, websites or videos.
 Hacking: It means unauthorized control/access over computer system and
act of hacking completely destroys the whole data as well as computer
program. Hackers usually hacks telecommunication and mobile network.
 Dissemination of Obscene Material: It includes Indecent exposure/
Pornography (basically child pornography), hosting of web site containing
these prohibited materials. These obscene matters may cause harm to the
mind of the adolescent and tend to deprave or corrupt their mind. This can
create a huge blunder in the society.
 SMS Spoofing: Spoofing is a blocking through spam which means the
unwanted uninvited messages. Here a offender steals identity of another in
the form of mobile phone number and sending SMS via internet and
receiver gets the SMS from the mobile phone number of the victim.
 Assault by Threat: it refers to threatening a person with fear for their lives or
lives of their families through the use of a computer network i.e. E-mail,
videos or phones.
 Page jacking: when a user, click on a certain link and an unexpected
website gets opened through that link then the ser is said to be ‘pagejacked’.
This happens when someone steals part of a real website and uses it in a
fake site. If they use enough of the real site, Internet search engines can be
tricked into listing the fake site and people will visit it accidentally.
Unfortunately one cannot prevent page jacking but only can deal with it.
 Advance fee scams: An advance fee scam is fairly easy to identify as you
will be asked for money or goods upfront in return for giving you credit or
money later. These advance fee scams can seem convincing and have taken
in many people.
 Defamation: It is an act of imputing any person with intent to lower down
the dignity of the person by hacking his mail account and sending some
mails with using vulgar language to unknown persons mail account.
 E-Mail Spoofing: A spoofed e-mail may be said to be one, which
misrepresents its origin. It shows it’s origin to be different from which
actually it originates.
 Child Pornography: It involves the use of computer networks to create,
distribute, or access materials that sexually exploit underage children.
 Carding: It means false ATM cards i.e. Debit and Credit cards used by
criminals for their monetary benefits through withdrawing money from the
victim’s bank account mala-fidely. There is always unauthorized use of
ATM cards in this type of cyber crimes.
 Cheating & Fraud: It means the person who is doing the act of cybercrime
i.e. stealing password and data storage has done it with having guilty mind
which leads to fraud and cheating.
ii) Crimes Against Persons Property:
As a result of rapid growth in the international trade where businesses and
consumers are increasingly using computers to create, transmit and to store
information in the electronic form instead of traditional paper documents there are
some of the offenses which affect person’s property:
 Intellectual Property Crimes:  Any unlawful act by which the owner is
deprived completely or partially of his rights is an offense. The common
form of IPR violation may be said to be software piracy, infringement of
copyright, trademark, patents, designs and service mark violation, theft of
computer source code, etc.
 Cybersquatting: It means where two persons claim for the same Domain
Name either by claiming that they had registered the name first on by right
of using it before the other or using something similar to that previously. For
example two similar names i.e. www.yahoo.comand www.yaahoo.com.
 Cyber Vandalism: Vandalism means deliberately destroying or damaging
property of another. Hence cyber vandalism means destroying or damaging
the data when a network service is stopped or disrupted. It may include
within its purview any kind of physical harm done to the computer of any
person. These acts may take the form of the theft of a computer, some part
of a computer or a peripheral attached to the computer.
 Hacking Computer System:  Due to the hacking activity there will be loss
of data as well as computer. Also research especially indicates that those
attacks were not mainly intended for financial gain too and to diminish the
reputation of particular person or company.
 Transmitting Virus: Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to other files and to other
computers on a network. They usually affect the data on a computer, either
by altering or deleting it. Worm attacks plays major role in affecting the
computerize system of the individuals.
 Cyber Trespass: It means to access someone’s computer without the right
authorization of the owner and does not disturb, alter, misuse, or damage
data or system by using wireless internet connection.
 Internet Time Thefts: Basically, Internet time theft comes under hacking.
It is the use by an unauthorized person, of the Internet hours paid for by
another person. The person who gets access to someone else’s IP user ID
and password, either by hacking or by gaining access to it by illegal means,
uses it to access the Internet without the other person’s knowledge. You can
identify time theft if your Internet time has to be recharged often, despite
infrequent usage.
iii) Cyber Crimes Against Government:
There are certain offenses done by group of persons intending to threaten the
international governments by using internet facilities:

 Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic


as well as global concern. The common form of these terrorist attacks on the
Internet is by distributed denial of service attacks, hate websites and hate e-
mails, attacks on sensitive computer networks etc. Cyber terrorism activities
endanger the sovereignty and integrity of the nation.
 Cyber Warfare: It refers to politically motivated hacking to conduct
sabotage and espionage. It is a form of information warfare sometimes seen
as analogous to conventional warfare although this analogy is controversial
for both its accuracy and its political motivation.
 Distribution of pirated software: It means distributing pirated software
from one computer to another intending to destroy the data and official
records of the government.-25
 Possession of Unauthorized Information: It is very easy to access any
information by the terrorists with the aid of internet and to possess that
information for political, religious, social, ideological objectives.
iv) Cybercrimes Against Society at large:
An unlawful act done with the intention of causing harm to the cyberspace will
affect large number of persons:

 Child Pornography: It involves the use of computer networks to create,


distribute, or access materials that sexually exploit underage children. It also
includes activities concerning indecent exposure and obscenity.
 Cyber Trafficking: It may be trafficking in drugs, human beings, arms
weapons etc. which affects large number of persons. Trafficking in the
cyberspace is also a gravest crime.
 Online Gambling: Online fraud and cheating is one of the most lucrative
businesses that are growing today in the cyberspace. There are many cases
that have come to light are those pertaining to credit card crimes, contractual
crimes, offering jobs, etc. [3]
 Financial Crimes: This type of offence is common as there is rapid growth
in the users of networking sites and phone networking where culprit will try
to attack by sending bogus mails or messages through internet. Ex: Using
credit cards by obtaining password illegally. [4]
 Forgery: It means to deceive large number of persons by sending
threatening mails as online business transactions are becoming the habitual
need of today’s life style. [5]
NEED FOR CYBER LAWS
Information technology has spread throughout the world. As the user of cyberspace
grows increasingly diverse and the range of online interaction expands, there is
expansion in the cyber crimes i.e. breach of online contracts, perpetration of online
torts and crimes etc. Due to the consequences, there was need to adopt a strict law
by the cyberspace authority to regulate criminal activities relating to cyber and to
provide better administration of justice to the victim of cybercrime. In the modern
cyber technology world it is very much necessary to regulate cyber crimes and
most importantly cyber law should be made stricter in the case of cyber terrorism
and hackers.
Cyber law, it is a term that encapsulates the legal issues related to use of
communicative, transactional, and distributive aspects of networked information
devices and technologies. It is less a distinct field of law than property or contract
law, as it is a domain covering many areas of law and regulation. IT Law is a set of
recent legal enactments, currently in existence in several countries, which governs
the process and dissemination of information digitally. These legal enactments
cover a broad gamut of different aspects relating to computer software, protection
of computer software, access and control of digital information, privacy, security,
internet access and usage, and electronic commerce. These laws have been
described as “paper laws” for “paperless environment”.

IT legislation in India: Mid 90’s saw an impetus in globalization and


computerization, with more and more nations computerizing their governance, and
e-commerce seeing an enormous growth. Previously, most of international trade
and transactions were done through documents being transmitted through post and
by telex only. Evidences and records, until then, were predominantly paper
evidences and paper records or other forms of hard-copies only. With much of
international trade being done through electronic communication and with email
gaining momentum, an urgent and imminent need was felt for recognizing
electronic records i.e. The data what is stored in a computer or an external storage
attached thereto. The United Nations Commission on International Trade Law
(UNCITRAL) adopted the Model Law on e-commerce in 1996. The General
Assembly of United Nations passed a resolution in January 1997 inter alia,
recommending all States in the UN to give favorable considerations to the said
Model Law, which provides for recognition to electronic records and according it
the same treatment like a paper communication and record.
Objectives of I.T. legislation in India: It is against this background the
Government of India enacted its Information Technology Act 2000 with the
objectives as follows, stated in the preface to the Act itself. “to provide legal
recognition for transactions carried out by means of electronic data interchange and
other means of electronic communication, commonly referred to as “electronic
commerce”, which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of
documents with the Government agencies and further to amend the Indian Penal
Code, the Indian Evidence Act, 1872, the Bankers’ Books Evidence Act,
1891 and the Reserve Bank of India Act, 1934 and for matters connected
therewith or incidental thereto.”
The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000,
got President’s assent on 9 June and was made effective from 17 October 2000.

The Act essentially deals with the following issues:

 Legal Recognition of Electronic Documents


 Legal Recognition of Digital Signatures
 Offenses and Contraventions
 Justice Dispensation Systems for cyber crimes. [6]
Amendment Act 2008: Being the first legislation in the nation on technology,
computers and ecommerce and e-communication, the Act was the subject of
extensive debates, elaborate reviews and detailed criticisms, with one arm of the
industry criticizing some sections of the Act to be draconian and other stating it is
too diluted and lenient. There were some conspicuous omissions too resulting in
the investigators relying more and more on the time-tested (one and half century-
old) Indian Penal Code even in technology based cases with the I.T. Act also being
referred in the process and the reliance more on IPC rather on the ITA.
Thus the need for an amendment – a detailed one – was felt for the I.T. Act almost
from the year 2003-04 themselves. Major industry bodies were consulted and
advisory groups were formed to go into the perceived lacunae in the I.T. Act and
comparing it with similar legislations in other nations and to suggest
recommendations. Such recommendations were analyzed and subsequently taken
up as a comprehensive Amendment Act and after considerable administrative
procedures; the consolidated amendment called the Information Technology
Amendment Act 2008 was placed in the Parliament and passed without much
debate, towards the end of 2008. This

Amendment Act got the President assent on 5 Feb 2009 and was made effective
from 27 October 2009.

Some of the notable features of the ITAA are as follows:

 Focusing on data privacy


 Focusing on Information Security
 Defining cyber café
 Making digital signature technology neutral
 Defining reasonable security practices to be followed by corporate
 Redefining the role of intermediaries
 Recognizing the role of Indian Computer Emergency Response Team
 Inclusion of some additional cyber crimes like child pornography and cyber
terrorism
 Authorizing an Inspector to investigate cyber offences (as against the DSP
earlier)
INDIAN PERSPECTIVE
Talking about Indian scenario of cyber space crimes and cyber space laws, there
was no statute in India for governing Cyber Laws involving privacy issues,
jurisdiction issues, intellectual property rights issues and a number of other legal
questions. With the tendency of misusing of technology, there arisen a need of
strict statutory laws to regulate the criminal activities in the cyber world and to
protect the true sense of technology IT ACT, 2000 was enacted by Parliament of
India to protect the field of e-commerce, e-governance, e-banking as well as
penalties and punishments in the field of cyber crimes. The above Act was further
amended in the form of IT Amendment Act, 2008. Also certain sections of IPC and
as some cyber space crime are invading right to privacy, article 21 of Indian
constitution are some governing laws for cyber space crime which imposes various
liabilities in India.

CONSTITUTIONAL LIABILITY
Hacking into someone’s private property or stealing some one’s intellectual work
is a complete violation of his right to privacy. The Indian constitution does not
specifically provide the “right to privacy” as one of the fundamental rights
guaranteed to the Indian citizens but it is protected under IPC.

Right to privacy is an important natural need of every human being as it creates


boundaries around an individual where the other person’s entry is restricted. The
right to privacy prohibits interference or intrusion in others private life. The apex
court of India has clearly affirmed in its judicial pronouncements that right to
privacy is very much a part of the fundamental right guaranteed under article 21 of
the Indian constitution.

Thus right to privacy is coming under the expended ambit of article 21 of Indian
constitution. So whenever there is some cyber crime which is related to the persons
private property or its personal stuff then the accused can be charged of violation
of article 21 of Indian constitution, and prescribed remedy can be invoked against
the accused.

CRIMINAL LIABILITY
Criminal liability in India for cyber crimes is defined under the Indian Penal Code
(IPC). Certain Following sections of IPC deal with the various cyber crimes:

 Sending threatening messages by e-mail  (Sec .503 IPC)


 Word, gesture or act intended to insult the modesty of a woman (Sec.509
IPC)
 Sending defamatory messages by e-mail (Sec .499 IPC)
 Bogus websites , Cyber Frauds (Sec .420 IPC)
 E-mail Spoofing (Sec .463 IPC )
 Making a false document (Sec.464 IPC)
 Forgery for purpose of cheating (Sec.468 IPC)
 Forgery for purpose of harming reputation (Sec.469 IPC)
 Web-Jacking (Sec .383 IPC)
 E-mail Abuse (Sec .500 IPC)
 Punishment for criminal intimidation (Sec.506 IPC)
 Criminal intimidation by an anonymous communication (Sec.507 IPC)
 Obscenity (Sec. 292 IPC )
 Printing etc. of grossly indecent or scurrilous matter or matter intended for
blackmail (Sec.292A IPC)
 Sale, etc., of obscene objects to young person (Sec .293 IPC)
 Obscene acts and songs (Sec.294 IPC )
 Theft of Computer Hardware (Sec. 378 )
 Punishment for theft (Sec.379 )
 Other then the IPC some other piece of legislations also imposes criminal
liability on the accused and these legislations are:-
 Online Sale of Drugs  (NDPS Act )
 Online Sale of Arms (Arms Act )
 Copyright infringement (Sec.51 of copyright act, 1957)
 Any person who knowingly infringes or abets the infringement of (Sec.63 of
copyright act, 1957)
 Enhanced penalty on second and subsequent convictions (Sec.63 A of
copyright act, 1957)
 Knowing use of infringing copy of computer program to be an offence
(Sec.63B of copyright act, 1957)

BIBLIOGRAPHY
WEBSITES
1. https://www.lawctopus.com/academike/cyber-crimes-other-liabilities/
2.https://en.wikipedia.org/wiki/Cybercrime#:~:text=Cyberterrorism%2C%20in%20general%2C%20can
%20be,holidays%20can%20be%20considered%20cyberterrorism.
BOOKS
R.K BANGIA

You might also like