Cyber Law in India
Cyber Law in India
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb
Cyber-crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000
Cyber Law is the law governing cyber space. It is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
Cyber law encompasses laws relating to: o o o o 1. Cyber Crimes 2. Electronic and Digital Signatures 3. Intellectual Property 4. Data Protection and Privacy
Cyber crime is the latest and perhaps the most complicated problem in the cyber world. It may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime. Cyber crimes are unlawful acts where computer is used either as a tool; or a target; or both.
Cybercrimes can be basically divided into three major categories: 1. Cybercrimes against persons. 2. Cybercrimes against property. 3. Cybercrimes against government.
Cybercrimes committed against persons: It include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, is one of the most important Cybercrimes known today.
Cybercrimes against property: These crimes include: o o o o Computer vandalism (destruction of others' property); Transmission of harmful programmes; Siphoning of funds from financial institutions; Stealing secret information & data.
Cybercrimes against government: Cyber terrorism is one distinct kind of crime in this category. The medium of Cyberspace is used by individuals and groups to threaten the international governments as also to terrorise the citizens of a country. This crime manifests itself into terrorism when an individual cracks; into a government or military maintained website.
Technical Aspects
Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as a. Unauthorized
Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. b.
Trojan Attack:-
The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. c.
A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. e.
Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. g.
Forgery:-
Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Also impersonate another person is considered forgery. h
. IPR Violations:-
These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.
i.
Cyber Terrorism:-
Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. j.
In the corporate world, Internet hackers are continually looking for opportunities to compromise a companys security in order to gain access to confidential banking and financial information. k.
Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.
l.
This would include trade of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication. m
. Online gambling:-
There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. n
. Defamation: -
Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Stalking:Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. q
. Identity Theft :-
Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud.
Privacy Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. Confidentiality It means non disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected.
o Here the original information , so to say, remains in the possession of the owner and yet information gets stolen
The Information Technology Amendment Act, 2008 (IT Act 2008) has been passed by the parliament on 23rd December 2008. It received the assent of President of India on 5th February, 2009. The IT Act 2008 has been notified on October 27, 2009. o ITA 2008, as the new version of Information Technology Act 2000 is often referred, has provided additional focus on Information Security. It has added several new sections on offences
including Cyber Terrorism and Data Protection. In the 2008 version of the Act, there are 124 sections (excluding 5 sections that have been omitted from the earlier version) and 14 chapters. o o Schedule I and II have been replaced. Schedules III and IV are deleted.