Cyber Law of India : Introduction
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
This document provides an overview of cyber law and cyber crimes in India. It begins by defining cyber crime and outlining the relevant sections of the Information Technology Act 2000. It then provides case studies to illustrate the application of sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69 of the IT Act. It concludes by summarizing common cyber crime scenarios and the applicable legal sections, such as hacking, credit card fraud, cyber terrorism, and online harassment.
This document discusses various cyber crimes and relevant cases in India. It defines cybercrime and outlines offenses covered under the Information Technology Act 2000. Several cases are described that relate to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, and 67 of the Act, dealing with issues like unauthorized access, data tampering, hacking, identity theft, impersonation, privacy violations, cyber terrorism, and transmitting obscene material. The document analyzes the relevant sections applied and verdicts reached in these cases.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and explaining how it is not officially defined in legislation due to the evolving nature of such offenses. It then provides examples of common cyber crimes like hacking, phishing, and online harassment and discusses the relevant sections of the Information Technology Act 2000 and Indian Penal Code that could apply to each case. The document concludes by examining several real-world cases related to different cyber crimes and the legal provisions under which individuals were prosecuted.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and noting that it is not officially defined in Indian law. It then discusses various cyber crimes and the relevant sections of the Information Technology Act 2000 that apply to them, including illegal access, hacking, data theft, cyber terrorism, and more. Several case studies are provided as examples. In conclusion, it examines common cyber crime scenarios and the applicable legal sections for crimes like online harassment, hate communities, credit card fraud, and others.
This document discusses cyber crimes and relevant cases in India related to sections of the Information Technology Act 2000. It begins by explaining that cyber crime is not officially defined but refers to illegal behavior using electronic means that targets computer security or data. The document then presents several case studies corresponding to specific sections of the IT Act, including cases related to unauthorized access, tampering with source code, computer hacking, identity theft, cheating by impersonation, privacy violations, and cyber terrorism.
Cybercrime involves any illegal activity carried out through computers or online. This document discusses several sections of the Indian Penal Code related to cybercrime and provides case studies to illustrate how the courts have applied each section. Several cases involved unauthorized access to steal financial information, creating fake online profiles, sending hoax emails about bombs, and circulating private videos without consent. The courts interpreted these acts as violating sections around unauthorized access, tampering with data, computer-related offenses, identity theft, privacy violations, and the new section related to cyber terrorism.
Cybercrime involves illegal activities conducted through electronic means. The document discusses several cases related to sections of the Indian Penal Code dealing with cybercrime. These include cases of identity theft, sending offensive messages, hacking, and tampering with computer systems or data. The cases illustrate how various cybercrimes have been prosecuted under the relevant sections of the Indian Penal Code.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This document provides an overview of cyber law and cyber crimes in India. It begins by defining cyber crime and outlining the relevant sections of the Information Technology Act 2000. It then provides case studies to illustrate the application of sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69 of the IT Act. It concludes by summarizing common cyber crime scenarios and the applicable legal sections, such as hacking, credit card fraud, cyber terrorism, and online harassment.
This document discusses various cyber crimes and relevant cases in India. It defines cybercrime and outlines offenses covered under the Information Technology Act 2000. Several cases are described that relate to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, and 67 of the Act, dealing with issues like unauthorized access, data tampering, hacking, identity theft, impersonation, privacy violations, cyber terrorism, and transmitting obscene material. The document analyzes the relevant sections applied and verdicts reached in these cases.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and explaining how it is not officially defined in legislation due to the evolving nature of such offenses. It then provides examples of common cyber crimes like hacking, phishing, and online harassment and discusses the relevant sections of the Information Technology Act 2000 and Indian Penal Code that could apply to each case. The document concludes by examining several real-world cases related to different cyber crimes and the legal provisions under which individuals were prosecuted.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and noting that it is not officially defined in Indian law. It then discusses various cyber crimes and the relevant sections of the Information Technology Act 2000 that apply to them, including illegal access, hacking, data theft, cyber terrorism, and more. Several case studies are provided as examples. In conclusion, it examines common cyber crime scenarios and the applicable legal sections for crimes like online harassment, hate communities, credit card fraud, and others.
This document discusses cyber crimes and relevant cases in India related to sections of the Information Technology Act 2000. It begins by explaining that cyber crime is not officially defined but refers to illegal behavior using electronic means that targets computer security or data. The document then presents several case studies corresponding to specific sections of the IT Act, including cases related to unauthorized access, tampering with source code, computer hacking, identity theft, cheating by impersonation, privacy violations, and cyber terrorism.
Cybercrime involves any illegal activity carried out through computers or online. This document discusses several sections of the Indian Penal Code related to cybercrime and provides case studies to illustrate how the courts have applied each section. Several cases involved unauthorized access to steal financial information, creating fake online profiles, sending hoax emails about bombs, and circulating private videos without consent. The courts interpreted these acts as violating sections around unauthorized access, tampering with data, computer-related offenses, identity theft, privacy violations, and the new section related to cyber terrorism.
Cybercrime involves illegal activities conducted through electronic means. The document discusses several cases related to sections of the Indian Penal Code dealing with cybercrime. These include cases of identity theft, sending offensive messages, hacking, and tampering with computer systems or data. The cases illustrate how various cybercrimes have been prosecuted under the relevant sections of the Indian Penal Code.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This document summarizes penalties and offenses under the IT Act 2000 in India with case studies. It discusses sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, and 69 of the Act and associated cases. One case study describes a credit card fraud where victims' computers were infected to make unauthorized online transactions. Another case found an individual guilty under sections 66 and 420 of tampering with broadband internet accounts and hacking sites across cities. The document concludes with an example of web defacement where a government site was altered on a symbolic day.
This document provides an overview of cyber crimes and relevant cases in India. It defines cyber crimes as illegal acts conducted using electronic means, targeting computer security or data. Several cases are described that demonstrate the application of sections of the Indian Penal Code and Information Technology Act related to unauthorized access, data tampering, identity theft, offensive online messages, privacy violations, and cyber terrorism. Penalties for convicted individuals have included imprisonment and fines.
This document provides case studies for selected sections of the Indian Information Technology Act of 2000. It discusses 9 cases related to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, and 67 of the Act which deal with offenses such as unauthorized access to computers, tampering with source code, computer-related offenses, sending offensive messages, identity theft, cheating by impersonation, violation of privacy, cyber terrorism, and transmitting obscene materials. Each case provides details of the offense, investigation, and verdict. The document is intended to help understand penalties and offenses outlined in the IT Act.
- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
This document summarizes several sections of India's Information Technology Act related to data protection and cybercrime. Section 43 discusses corporate liability for data breaches if reasonable security practices were not followed. Section 65 covers tampering with computer source documents. Section 66 discusses hacking computers and networks. Section 66A establishes punishment for sending offensive messages online. Section 66B covers penalties for dishonestly receiving stolen electronic devices. Case studies provide examples of cases tried under these sections, such as companies moving operations due to data theft, manipulation of cell phone identifiers, and a juvenile charged for a vulgar website.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
This document summarizes sections of the Indian Information Technology Act relating to data protection, hacking, and cyber crimes. It discusses sections that deal with compensation for corporate negligence that results in data loss, tampering with computer source code, hacking, sending offensive messages online, and dishonestly receiving stolen electronic devices. Case studies are provided for each section to illustrate how related legal cases have been handled. The document aims to explain the IT Act and associated punishments around these cyber issues.
This document summarizes cybercrime offenses and relevant cases under the Information Technology Act 2000 of India. It begins by defining cybercrime and outlining the Act's penalties and offenses. It then discusses 10 case studies related to sections 43, 65, 66, 66A-F, 67, 67B, 69 of the Act. Common cybercrime scenarios are also mapped to their applicable legal sections. The document aims to provide clarity on cybercrime and the IT Act through real examples.
This document provides an overview of penalties and offenses outlined in the Information Technology Act 2000 in India. It discusses key sections of the Act related to cyber crimes and provides case studies. The Act aims to provide legal recognition for electronic transactions and commerce. It defines cyber crimes and outlines penalties for offenses involving unauthorized access to computers, identity theft, cyber terrorism, and transmitting obscene material online. The document also discusses the need for the 2008 amendment to the original Act and provides an overview of the Act's structure.
The document discusses cyber law and the Information Technology Act 2000. It defines cyber crime as any offence committed using a computer. The Act was passed in 2000 to regulate e-commerce, digital signatures, and e-governance. It covers 13 chapters and 90 sections dealing with electronic documents, digital signatures, data privacy, information security, and additional cyber crimes like child pornography and cyber terrorism. The document also outlines reasonable security practices organizations should follow and some key aspects of the Information Technology Act.
The document discusses cyber laws in India and the crime of phishing. It provides background on the Information Technology Act 2000 which provides the legal framework for e-commerce and cyber crimes in India. It then defines and explains the crime of phishing, how it works, and common phishing techniques like man-in-the-middle attacks and URL obfuscation. Factors that enable phishing like lack of awareness and technical sophistication are also covered. Lastly, it discusses a legal case related to phishing and compensation.
Cyber Crime| Tracking and Tracing of Digital EvidenceJay Nagar
This document describes a case of revenge porn involving a 21-year-old female student in Salem, Tamil Nadu. Her parents reported to police that morphed photos of her were being posted on Facebook. The police began an investigation but did not register an official FIR at the parents' request. They identified the Facebook profile as fake. Police initially suspected a man the victim had a relationship with but ruled him out. The investigation included an unhelpful phone number. Police submitted a request to Facebook for IP details of the fake profile, which was their last hope to identify the culprit.
This document summarizes an assignment on cyber law submitted to a professor. It discusses the objectives and structure of the Information Technology Act 2000 and the need for the Information Technology Amendment Act 2008. It then provides case studies related to selected sections of the IT Act, including Section 43 on penalties for computer damage, Section 65 on tampering with computer source documents, Section 66 on computer-related offenses, and Section 66A on sending offensive messages.
Section 66A of India's Information Technology Act, which made it a crime to send offensive messages online, was ruled unconstitutional by the Supreme Court in 2015. The section had been used to arrest many people for social media posts or messages that authorities deemed offensive. The Supreme Court found the section's language to be too broad and vague, and that it violated freedom of expression. While Section 66A was removed, other sections of the IT Act regarding online fraud and privacy violations remain. The Supreme Court's ruling was celebrated by online freedom of expression advocates.
Email fraud involves intentional deception through email for personal gain or harming others. Common types of email fraud include spoofing identities, phishing for personal data, and bogus offers. The document outlines Indian laws against email fraud including sections of the IT Act and IPC that define the crimes and associated punishments. Key tactics used by fraudsters are impersonating legitimate organizations through misleading emails to steal financial or personal information from victims.
Cyber law refers to laws governing the internet and online communication. Cyber laws are needed to ensure the integrity and security of information, protect intellectual property rights and privacy, and establish the legal status of online transactions. Some key cyber laws in Malaysia include the Digital Signature Act of 1997, Computer Crimes Act of 1997, and Communications and Multimedia Act of 1998. These laws aim to secure electronic communications, protect against computer crimes, and ensure high levels of user confidence in Malaysia's information and communication technology industry.
This document summarizes key sections of the Information Technology Act 2000 of India related to cyber crimes and offenses. It provides:
1) An overview of cyber crimes and how they are defined in a narrow and broader sense under the IT Act.
2) Summaries of specific sections of the IT Act that outline penalties for offenses such as unauthorized access to computers, computer contamination, tampering with computer source documents, and transmitting offensive content.
3) Descriptions of relevant case studies that demonstrate how various sections of the IT Act have been applied and interpreted in court rulings related to cyber crimes.
The document discusses the common types of cyber crimes. It begins by defining cyber crime as any criminal activity involving computers or networks as tools, targets, or places of crime. Some common cyber crimes mentioned include hacking, cyber stalking, spamming, cyber pornography, phishing, software piracy, corporate espionage, money laundering, and cyber terrorism. The Information Technology Act of 2000 establishes penalties for unauthorized computer access and damage to computers. It defines relevant terms and outlines compensation requirements for companies that are negligent in protecting sensitive personal data.
This document provides an overview of cyber law and case studies in India. It discusses key sections of the Information Technology Act, 2000 regarding offenses and penalties. Section 65 discusses tampering with computer source documents and penalties of up to 3 years imprisonment and 2 lakh rupees fine. Section 66 covers hacking with computer systems and similar penalties. Section 67 addresses publishing obscene content electronically and penalties of up to 5 or 10 years imprisonment and 1 or 2 lakh rupees fine for first and second convictions. Case studies are presented for each section.
The document discusses cyber crime and the Information Technology Act 2000 in India. It provides an overview of the growth of internet usage, the objectives of the IT Act to provide legal recognition to electronic records and digital signatures. It describes some cyber crimes like hacking, publishing obscene material, and breach of privacy. It discusses the types of cyber crimes like denial of service attacks, viruses, software piracy, and credit card fraud. It also summarizes some recent cases of cyber crimes in India.
This document summarizes penalties and offenses under the IT Act 2000 in India with case studies. It discusses sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, and 69 of the Act and associated cases. One case study describes a credit card fraud where victims' computers were infected to make unauthorized online transactions. Another case found an individual guilty under sections 66 and 420 of tampering with broadband internet accounts and hacking sites across cities. The document concludes with an example of web defacement where a government site was altered on a symbolic day.
This document provides an overview of cyber crimes and relevant cases in India. It defines cyber crimes as illegal acts conducted using electronic means, targeting computer security or data. Several cases are described that demonstrate the application of sections of the Indian Penal Code and Information Technology Act related to unauthorized access, data tampering, identity theft, offensive online messages, privacy violations, and cyber terrorism. Penalties for convicted individuals have included imprisonment and fines.
This document provides case studies for selected sections of the Indian Information Technology Act of 2000. It discusses 9 cases related to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, and 67 of the Act which deal with offenses such as unauthorized access to computers, tampering with source code, computer-related offenses, sending offensive messages, identity theft, cheating by impersonation, violation of privacy, cyber terrorism, and transmitting obscene materials. Each case provides details of the offense, investigation, and verdict. The document is intended to help understand penalties and offenses outlined in the IT Act.
- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
This document summarizes several sections of India's Information Technology Act related to data protection and cybercrime. Section 43 discusses corporate liability for data breaches if reasonable security practices were not followed. Section 65 covers tampering with computer source documents. Section 66 discusses hacking computers and networks. Section 66A establishes punishment for sending offensive messages online. Section 66B covers penalties for dishonestly receiving stolen electronic devices. Case studies provide examples of cases tried under these sections, such as companies moving operations due to data theft, manipulation of cell phone identifiers, and a juvenile charged for a vulgar website.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
This document summarizes sections of the Indian Information Technology Act relating to data protection, hacking, and cyber crimes. It discusses sections that deal with compensation for corporate negligence that results in data loss, tampering with computer source code, hacking, sending offensive messages online, and dishonestly receiving stolen electronic devices. Case studies are provided for each section to illustrate how related legal cases have been handled. The document aims to explain the IT Act and associated punishments around these cyber issues.
This document summarizes cybercrime offenses and relevant cases under the Information Technology Act 2000 of India. It begins by defining cybercrime and outlining the Act's penalties and offenses. It then discusses 10 case studies related to sections 43, 65, 66, 66A-F, 67, 67B, 69 of the Act. Common cybercrime scenarios are also mapped to their applicable legal sections. The document aims to provide clarity on cybercrime and the IT Act through real examples.
This document provides an overview of penalties and offenses outlined in the Information Technology Act 2000 in India. It discusses key sections of the Act related to cyber crimes and provides case studies. The Act aims to provide legal recognition for electronic transactions and commerce. It defines cyber crimes and outlines penalties for offenses involving unauthorized access to computers, identity theft, cyber terrorism, and transmitting obscene material online. The document also discusses the need for the 2008 amendment to the original Act and provides an overview of the Act's structure.
The document discusses cyber law and the Information Technology Act 2000. It defines cyber crime as any offence committed using a computer. The Act was passed in 2000 to regulate e-commerce, digital signatures, and e-governance. It covers 13 chapters and 90 sections dealing with electronic documents, digital signatures, data privacy, information security, and additional cyber crimes like child pornography and cyber terrorism. The document also outlines reasonable security practices organizations should follow and some key aspects of the Information Technology Act.
The document discusses cyber laws in India and the crime of phishing. It provides background on the Information Technology Act 2000 which provides the legal framework for e-commerce and cyber crimes in India. It then defines and explains the crime of phishing, how it works, and common phishing techniques like man-in-the-middle attacks and URL obfuscation. Factors that enable phishing like lack of awareness and technical sophistication are also covered. Lastly, it discusses a legal case related to phishing and compensation.
Cyber Crime| Tracking and Tracing of Digital EvidenceJay Nagar
This document describes a case of revenge porn involving a 21-year-old female student in Salem, Tamil Nadu. Her parents reported to police that morphed photos of her were being posted on Facebook. The police began an investigation but did not register an official FIR at the parents' request. They identified the Facebook profile as fake. Police initially suspected a man the victim had a relationship with but ruled him out. The investigation included an unhelpful phone number. Police submitted a request to Facebook for IP details of the fake profile, which was their last hope to identify the culprit.
This document summarizes an assignment on cyber law submitted to a professor. It discusses the objectives and structure of the Information Technology Act 2000 and the need for the Information Technology Amendment Act 2008. It then provides case studies related to selected sections of the IT Act, including Section 43 on penalties for computer damage, Section 65 on tampering with computer source documents, Section 66 on computer-related offenses, and Section 66A on sending offensive messages.
Section 66A of India's Information Technology Act, which made it a crime to send offensive messages online, was ruled unconstitutional by the Supreme Court in 2015. The section had been used to arrest many people for social media posts or messages that authorities deemed offensive. The Supreme Court found the section's language to be too broad and vague, and that it violated freedom of expression. While Section 66A was removed, other sections of the IT Act regarding online fraud and privacy violations remain. The Supreme Court's ruling was celebrated by online freedom of expression advocates.
Email fraud involves intentional deception through email for personal gain or harming others. Common types of email fraud include spoofing identities, phishing for personal data, and bogus offers. The document outlines Indian laws against email fraud including sections of the IT Act and IPC that define the crimes and associated punishments. Key tactics used by fraudsters are impersonating legitimate organizations through misleading emails to steal financial or personal information from victims.
Cyber law refers to laws governing the internet and online communication. Cyber laws are needed to ensure the integrity and security of information, protect intellectual property rights and privacy, and establish the legal status of online transactions. Some key cyber laws in Malaysia include the Digital Signature Act of 1997, Computer Crimes Act of 1997, and Communications and Multimedia Act of 1998. These laws aim to secure electronic communications, protect against computer crimes, and ensure high levels of user confidence in Malaysia's information and communication technology industry.
This document summarizes key sections of the Information Technology Act 2000 of India related to cyber crimes and offenses. It provides:
1) An overview of cyber crimes and how they are defined in a narrow and broader sense under the IT Act.
2) Summaries of specific sections of the IT Act that outline penalties for offenses such as unauthorized access to computers, computer contamination, tampering with computer source documents, and transmitting offensive content.
3) Descriptions of relevant case studies that demonstrate how various sections of the IT Act have been applied and interpreted in court rulings related to cyber crimes.
The document discusses the common types of cyber crimes. It begins by defining cyber crime as any criminal activity involving computers or networks as tools, targets, or places of crime. Some common cyber crimes mentioned include hacking, cyber stalking, spamming, cyber pornography, phishing, software piracy, corporate espionage, money laundering, and cyber terrorism. The Information Technology Act of 2000 establishes penalties for unauthorized computer access and damage to computers. It defines relevant terms and outlines compensation requirements for companies that are negligent in protecting sensitive personal data.
This document provides an overview of cyber law and case studies in India. It discusses key sections of the Information Technology Act, 2000 regarding offenses and penalties. Section 65 discusses tampering with computer source documents and penalties of up to 3 years imprisonment and 2 lakh rupees fine. Section 66 covers hacking with computer systems and similar penalties. Section 67 addresses publishing obscene content electronically and penalties of up to 5 or 10 years imprisonment and 1 or 2 lakh rupees fine for first and second convictions. Case studies are presented for each section.
The document discusses cyber crime and the Information Technology Act 2000 in India. It provides an overview of the growth of internet usage, the objectives of the IT Act to provide legal recognition to electronic records and digital signatures. It describes some cyber crimes like hacking, publishing obscene material, and breach of privacy. It discusses the types of cyber crimes like denial of service attacks, viruses, software piracy, and credit card fraud. It also summarizes some recent cases of cyber crimes in India.
This document provides an overview of cyber crime. It begins with an introduction to the growth of internet usage in India and the corresponding rise of cyber crime. It then defines cyber crime and discusses the history and categories of cyber crime. Specific cyber crimes discussed include phishing and botnets. The document also examines cyber criminals, IT and cyber law, cyber attack statistics, and prevention techniques. It concludes by noting the impact of cyber crime and need for international cooperation to combat it.
This document describes a student project to develop an online student feedback system called "Rate Ur Faculty" for evaluating faculty members at a university. It includes sections on introduction, objectives, existing system limitations, proposed new online system, project requirements and analysis, project design including UML diagrams, coding and outputs. The system allows students, faculty, heads of departments and administrators to provide and view feedback on faculty performance to help evaluate and counsel staff.
The document summarizes a presentation on cyber crime in India. It discusses what cyber crime is, the history and types of cyber crimes, how crimes are committed, relevant laws, case studies, and recommendations. Cyber crime in India is growing rapidly due to increasing internet usage. Common crimes include phishing, hacking, and identity theft. The document outlines India's IT Act and amendments that created laws to address cyber crimes.
An online feedback system allows students to provide feedback on teachers and courses from a particular semester by selecting a teacher-course combination and completing a questionnaire with ratings and optional comments. Students see a 5-star rating scale and a confirmation is displayed after each submission, along with a progress bar. Managers can generate PDF reports of the feedback results with a single click.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
Yahoo was founded in 1994 by two Stanford students and grew rapidly, going public in 1996. Between 1994 and 2000, Yahoo's strategy evolved as planned with the goal of becoming a major internet portal, however the company struggled to adapt to unforeseen events like the dot-com bubble bursting in 2001. Facing declining advertising revenue, the then-CEO Timothy Koogle resigned in 2001, demonstrating for a public company the CEO often takes responsibility for performance issues beyond their control.
This document outlines the project plan for developing a Student Feedback System. It includes sections on project analysis, hardware and software requirements, planning and scheduling, project design using UML diagrams, database design using ER diagrams, testing strategies, and conclusions. The project aims to develop a web-based system allowing students to provide feedback to staff online and the principal to view feedback reports. It will save time compared to a manual process and help enhance staff performance.
Intellectual Property: Introduction, Protection of Intellectual Property Copyright, Related Rights, Patents, Industrial Designs, Trademark, Unfair Competition
Information Technology Related Intellectual Property Rights Computer Software and Intellectual Property-Objective, Copyright Protection, Reproducing, Defences, Patent Protection. Database and Data Protection-Objective, Need for Protection, UK Data Protection Act, 1998, US Safe Harbor Principle, Enforcement. Protection of Semi-conductor Chips-Objectives Justification of protection, Criteria, Subject-matter of Protection, WIPO Treaty, TRIPs, SCPA. Domain Name Protection-Objectives, domain name and Intellectual Property, Registration of domain names, disputes under Intellectual Property Rights, Jurisdictional Issues, and International Perspective.
Patents (Ownership and Enforcement of Intellectual Property) Patents-Objectives, Rights, Assignments, Defences in case of Infringement Copyright-Objectives, Rights, Transfer of Copyright, work of employment Infringement, Defences for infringement Trademarks-Objectives, Rights, Protection of good will, Infringement, Passing off, Defences. Designs-Objectives, Rights, Assignments, Infringements, Defences of Design Infringement
Enforcement of Intellectual Property Rights - Civil Remedies, Criminal Remedies, Border Security measures. Practical Aspects of Licencing – Benefits, Determinative factors, important clauses, licensing clauses.
Cyber Law: Basic Concepts of Technology and Law : Understanding the Technology of Internet, Scope of Cyber Laws, Cyber Jurisprudence Law of Digital Contracts : The Essence of Digital Contracts, The System of Digital Signatures, The Role and Function of Certifying Authorities, The Science of Cryptography Intellectual Property Issues in Cyber Space: Domain Names and Related issues, Copyright in the Digital Media, Patents in the Cyber World. Rights of Netizens and E-Governance : Privacy and Freedom Issues in the Cyber World, E-Governance, Cyber Crimes and Cyber Laws
Information Technology Act 2000 : Information Technology Act-2000-1 (Sec 1 to 13), Information Technology Act-2000-2 (Sec 14 to 42 and Certifying authority Rules), Information Technology Act-2000-3 (Sec 43 to 45 and Sec 65 to 78), Information Technology Act-2000-4(Sec 46 to Sec 64 and CRAT Rules), Information Technology Act-2000-5 (Sec 79 to 90), Information Technology Act-2000-6 ( Sec 91-94) Amendments in 2008.
Cyber law is needed to regulate criminal and immoral behavior in cyberspace. Existing laws were developed before the internet and do not adequately address modern issues. A supportive legal infrastructure with relevant cyber laws is required to enable e-commerce and regulate new types of cyber crimes that have emerged with technology. Cyber law is important because it impacts almost all digital transactions and online activities in today's highly connected world.
This document provides an outline for a project report on an unnamed project. It includes sections for an introduction, system study and analysis, system development, program list, table list, report list, system testing and conclusion, data entry forms, coding conventions, source code, screen layouts, report layouts, and references. It also lists several annexures that will provide additional details like the organization background, data dictionary, list of abbreviations, and soft copy of the project. The document gives the overall structure and expected contents for a complete project report to fulfill degree requirements.
This document discusses cyber crime and cyber law. It defines cybercrime as any illegal act committed using a computer network, and provides examples such as child pornography, threatening emails, identity theft, and software piracy. The document classifies cybercrimes as offenses against data/systems, content-related offenses, and copyright offenses. It also discusses the need for cyber law to address challenges in applying traditional law to computer-related crimes and technologies.
This document outlines the requirements and design of a minor project for a Bachelor of Engineering degree. It describes the objectives of developing a mobile application to provide internet access. It provides details on the project overview, requirements analysis, application design, implementation, testing, and future work. Appendices include references, project outputs, and code listings. The document follows formatting guidelines for the report.
Cyber law In India: its need & importanceAditya Shukla
Cyber Law in India
The document discusses the need for cyber law in India. It notes that as internet usage has increased, so have cyber crimes. The Information Technology Act of 2000 and its 2008 amendment were introduced to address issues around electronic transactions, cyber crimes, and data protection. Some key points covered include definitions of cyber crimes like hacking and transmitting obscene content, penalties listed in the IT Acts, and the importance of having cyber laws as digital activities continue growing.
This document provides an overview of the role of financial institutions in India. It discusses the evolution of financial institutions from their foundation phase to the current reforms phase. It describes the various types of financial institutions in India including development banks, specialized institutions, state-level institutions, investment institutions, and non-banking financial companies. The document also outlines some of the key roles of financial institutions like providing services, mobilizing savings, and facilitating development. It discusses recent reports that aim to improve the financial services sector by 2020 with a focus on customer needs, inclusion, and tapping new market segments.
This document discusses cyber crimes and relevant sections of the Indian Penal Code and Information Technology Act 2000. It provides definitions of cybercrime and outlines some key sections of the acts related to offenses such as unauthorized access, data tampering, identity theft, and transmitting obscene material. Several case studies are presented to illustrate how the courts have applied these sections to cybercrime cases involving issues like fraud, hacking, impersonation, and privacy violations.
This document provides case studies for selected sections of the Indian Information Technology Act 2000. It discusses 14 cases related to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69, and common cybercrime scenarios and the applicable legal sections. The cases cover issues like unauthorized access, tampering with source code, computer-related offenses, offensive online messages, identity theft, cheating by impersonation, privacy violations, cyberterrorism, and transmitting obscene material. The document aims to provide clarity on penalties and offenses in the IT Act through real examples.
The document discusses the Information Technology Act of 2000 and its objectives of promoting e-commerce, facilitating e-governance, and preventing cybercrime. It provides 6 key objectives of the act, which include giving legal recognition to electronic transactions and digital signatures, and authorizing electronic document filing and storage of records. The act has 13 chapters and 90 sections dealing with amendments to related acts and authentication of electronic records. Common cybercrime scenarios are also discussed along with the applicable sections of the IT Act or other laws.
This presentation summarizes key sections of the Indian Information Technology Act of 2000 related to cybercrimes. Section 66A makes it a punishable offense to send offensive messages online. It discusses related cases where individuals were prosecuted for creating a fake profile of the President and sending threatening emails. Section 66B concerns dishonestly receiving stolen computer resources, while Section 66C addresses identity theft. The presentation provides examples of cases prosecuted under these sections and explains punishments under the Act for various cybercrimes from hacking to privacy violations and cyberterrorism.
Kandarp Shah has over 10 years of experience in information security consulting. The presentation aims to educate students about technology, internet, and cyber crimes as well as preventative measures. Cyber crime refers to criminal acts using computers and the internet. Motivations for cyber crimes include money, curiosity, revenge, and praise. Cyber crimes are increasing due to greater internet and smartphone use. Common cyber crimes discussed include cyber pornography, identity theft, email spoofing, intellectual property crimes, and cyber defamation.
The document discusses cyber crimes and the legal system in India. It defines cyber crimes as unlawful acts using computers as tools or targets. The Information Technology Act of 2000 is the primary law covering cyber crimes in India. It established offenses related to illegal access, data tampering, privacy violations, and more. The Indian Penal Code was also amended to address new cyber offenses. Key cases that helped establish legal precedents for cyber crimes are discussed. The IT Act created regulatory bodies for digital infrastructure and established penalties for various cyber offenses.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
The document provides an overview of the IT Act in India through discussing key topics like the objectives of the Act, cyber crimes and provisions under the Act. It notes that the Act aims to provide legal recognition to electronic transactions and storage of data. It also describes various cyber crimes like hacking, data theft and publishing obscene content, as well as amendments made in 2008 to address issues like data protection. Case studies are presented on crimes such as blackmailing, bank fraud, and hacking into websites to illustrate how the IT Act handles such offenses.
This document discusses various types of cyber crimes such as phishing, hacking, cyber stalking, child pornography, and credit card fraud. It provides examples of cases related to these crimes and discusses relevant sections of the Information Technology Act that pertain to computer-related offenses, identity theft, cheating by personation, violation of privacy, and penalties for damaging computer systems. The document also covers topics like e-governance initiatives in India, emerging trends in cyber law, and the use of digital signatures.
This document provides an overview of the Information Technology Act 2000 of India. It discusses the objectives of the act which are to provide legal recognition to electronic transactions, facilitate electronic filing and storage of documents. It also covers cyber crimes like hacking, data theft, and publishing obscene material online. The act was amended in 2008 to establish stronger data protection and address new cyber crimes. Several case studies of cyber crimes investigated under the IT Act are also presented.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
This document summarizes key sections of India's Cyber Law, including Sections 43, 65, 66, and 67.
Section 43 deals with penalties for unauthorized access to computers or damaging computer resources. Section 65 addresses tampering with computer source documents and protects intellectual property in source codes. Section 66 defines hacking offenses and penalties of up to 3 years in prison or fines. Section 67 criminalizes publishing obscene materials electronically with penalties of up to 10 years in prison and fines for repeat offenses. The document also provides case studies related to each section.
This document discusses legal aspects and their impact on digital forensics. It begins with defining digital forensics and noting that legal search authority is required. It outlines requirements for collecting digital evidence, such as satisfying rules of evidence. Dimensions of privacy like personal, territorial, and information privacy are covered. Real-time examples from India are provided, such as a case of hosting obscene profiles in Tamil Nadu where digital evidence led investigators to identify a suspect. The document stresses the importance of proper evidence handling and how digital forensics can support legal proceedings.
This document provides an overview of cyber crime laws and cases in India. It defines cyber crime as crimes directly related to computers and the internet. The Information Technology Act of 2000 is discussed as the primary law governing cyber crimes in India. Three key cyber crime cases in India are summarized: 1) the 2004 case of State of Tamil Nadu vs Suhas Katti, the first conviction under Section 67 of the IT Act for posting obscene messages online; 2) the 2002 Sony India fraud case, showing the IPC can apply to some cyber crimes; and 3) the 2005 Pune Citibank call center fraud case involving unauthorized access of customer accounts. The conclusion emphasizes the importance of cyber laws and protecting networks and data from abuse
Cyber crime is a broad term used to define criminal activity where computers or networks are used as tools or targets for illegal acts. The Information Technology Act of 2000 was enacted in India to address crimes related to the internet. Some common cyber crimes include hacking, phishing, credit card fraud, and child pornography. Cyber crimes can be against people, property, or government. The number of reported cyber crime cases in India increased 300% from 2011 to 2014, with over 11,000 cases reported in 2015 alone.
This presentation provides an overview of cyber laws in India. It begins with definitions of cyber crime and classifications of different types of cyber crimes such as those against persons, property, and government. It then discusses the need for cyber laws in India given its growing internet user base. The key cyber laws discussed are the Information Technology Act of 2000 and its 2008 amendment, which created offenses related to hacking, identity theft, cheating, and privacy violations. Statistics on reported cyber crimes in India are also presented. Countermeasures to cyber crimes and the future threats are briefly outlined before a case study is described.
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
The Future of Criminal Defense Lawyer in India.pdfveteranlegal
https://veteranlegal.in/defense-lawyer-in-india/ | Criminal defense Lawyer in India has always been a vital aspect of the country's legal system. As defenders of justice, criminal Defense Lawyer play a critical role in ensuring that individuals accused of crimes receive a fair trial and that their constitutional rights are protected. As India evolves socially, economically, and technologically, the role and future of criminal Defense Lawyer are also undergoing significant changes. This comprehensive blog explores the current landscape, challenges, technological advancements, and prospects for criminal Defense Lawyer in India.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
From Promise to Practice. Implementing AI in Legal Environments
Cyber law cases and sections
1. GLOBAL BUSINESS SCHOOL
HUBLI
CYBER LAW ASSIGNMENT
ASSIGNMENT SUBMITTED BY
Vijay Jituri
MBA 3rd SEM
MBA13007112
Submitted To :-
Dr.Bhargav.Revankar
GBS HUBLI
Submitted
3. WHAT IS CYBER CRIME?
Cyber Crime is not defined officially in IT Act or in any other legislation. In
fact, it cannot be too. Offence or crime has been dealt with elaborately listing
various acts and the punishments for each, under the Indian Penal Code, 1860 and
related legislations. Hence, the concept of cyber crime is just a "combination of
crime and computer".
Cybercrime in a narrow sense (computer crime):
Any illegal behavior directed by means of electronic operations that targets
the security of computer systems and the data processed by them.
Cybercrime in a broader sense (computer-related crime):
Any illegal behavior committed by means of, or in relation to, a computer
system or network, including such crimes as illegal possession and offering or
distributing information by means of a computer system or network. Any contract
for the sale or conveyance of immovable property or any interest in such property;
any such class of documents or transactions as may be notified by the Central
Government
IT Act 2000: Penalties, Offences with Case Studies
Network Intelligence (India) Pvt. Ltd. Page 7 of 24
4. CASES STUDY
Section 43 - Penalty and Compensation for damage to
computer, computer system, etc
Related Case: Mphasis BPO Fraud: 2005 In December 2004, four call centre
employees, working at an outsourcing facility operated by MphasiS in India,
obtained PIN codes from four customers of MphasiS’ client, Citi Group. These
employees were not authorized to obtain the PINs. In association with others, the
call centre employees opened new accounts at Indian banks using false identities.
Within two months, they used the PINs and account information gleaned during
their employment at MphasiS to transfer money from the bank accounts of
CitiGroup customers to the new accounts at Indian banks.
By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and
quickly identified the individuals involved in the scam. Arrests were made when
those individuals attempted to withdraw cash from the falsified accounts, $426,000
was stolen; the amount recovered was $230,000.
Verdict: Court held that Section 43
(a) was applicable here due to the nature of unauthorized access involved to
commit transactions.
( b) Section 65 - Tampering with Computer Source Documents
Related Case: Syed Asifuddin and Ors. Vs. The State of Andhra Pradesh In this
case, Tata Indicom employees were arrested for manipulation of the electronic 32-
5. bit number (ESN) programmed into cell phones theft were exclusively franchised
to Reliance Infocomm.
Verdict: Court held that tampering with source code invokes Section 65 of the
Information Technology Act.
(c) Section 66 - Computer Related Offences Related Case:
Kumar v/s Whiteley In this case the accused gained unauthorized access
to the Joint Academic Network (JANET) and deleted, added files and changed the
passwords to deny access to the authorized users. Investigations had revealed that
Kumar was logging on to the BSNL broadband Internet connection as if he was the
authorized genuine user and ‘made alteration in the computer database pertaining
to broadband Internet user accounts’ of the subscribers. The CBI had registered a
cyber crime case against Kumar and carried out investigations on the basis of a
complaint by the Press Information Bureau, Chennai, which detected.
IT Act 2000: Penalties, Offences with Case Studies
Network Intelligence (India) Pvt. Ltd. Page 8 of 24 the unauthorized use of
broadband Internet. The complaint also stated that the subscribers had incurred a
loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from
Bangalore, Chennai and other cities too, they said.
Verdict: The Additional Chief Metropolitan Magistrate, Egmore, Chennai,
sentenced N G Arun Kumar, the techie from Bangalore to undergo a rigorous
imprisonment for one year with a fine of Rs 5,000 under section 420 IPC
(cheating) and Section 66 of IT Act (Computer related Offence).
(d) Section 66A - Punishment for sending offensive messages through
communication service Relevant
Case 1: Fake profile of President posted by imposter On September 9, 2010, the
imposter made a fake profile in the name of the Hon’ble President Pratibha Devi
Patil. A complaint was made from Additional Controller, President Household,
6. President Secretariat regarding the four fake profiles created in the name of
Hon’ble President on social networking website, Facebook.
The said complaint stated that president house has nothing to do with the facebook
and the fake profile is misleading the general public. The First Information Report
Under Sections 469 IPC and 66A Information Technology Act, 2000 was
registered based on the said complaint at the police station, Economic Offences
Wing, the elite wing of Delhi Police which specializes in investigating economic
crimes including cyber offences.
(e) Section 66C - Punishment for identity theft Relevant Cases: The CEO of an
identity theft protection company, Lifelock, Todd Davis's social security number
was exposed by Matt Lauer on NBC’s Today Show. Davis’ identity was used to
obtain a $500 cash advance loan. Li Ming, a graduate student at West Chester
University of Pennsylvania faked his own death, complete with a forged obituary
in his local paper. Nine months later, Li attempted to obtain a new driver’s license
with the intention of applying for new credit cards eventually.
(f) Section 66D - Punishment for cheating by impersonation by using
computer resource
Relevant Case: Sandeep Vaghese v/s State of Kerala A complaint filed by the
representative of a Company, which was engaged in the business of trading and
distribution of petrochemicals in India and overseas, a crime was registered against
nine persons, alleging offences under Sections 65, 66, 66A, C and D of the
Information Technology Act along with Sections 419 and 420 of the Indian Penal
Code.
The company has a web-site in the name and and style `www.jaypolychem.com'
but, another web site `www.jayplychem.org' was set up in the internet by first
accused Samdeep Varghese @ Sam, (who was dismissed from the company) in
conspiracy with other accused, including Preeti and Charanjeet Singh, who are the
sister and brother-in- law of `Sam'
Defamatory and malicious matters about the company and its directors were made
available in that website. The accused sister and brother-in-law were based in
Cochin and they had been acting in collusion known and unknown persons, who
7. have collectively cheated the company and committed acts of forgery,
impersonation etc.
Two of the accused, Amardeep Singh and Rahul had visited Delhi and Cochin.
The first accused and others sent e-mails from fake e-mail accounts of many of the
customers, suppliers, Bank etc. to malign the name and image of the Company and
its Directors. The defamation campaign run by all the said persons named above
has caused immense damage to the name and reputation of the Company. The
Company suffered losses of several crores of Rupees from producers, suppliers and
customers and were unable to do business.
(g) Section 66E - Punishment for violation of privacy
Relevant Cases: 1) Jawaharlal Nehru University MMS scandal In a severe
shock to the prestigious and renowned institute - Jawaharlal Nehru University, a
pornographic MMS clip was apparently made in the campus and transmitted
outside the university.
Some media reports claimed that the two accused students initially tried to extort
money from the girl in the video but when they failed the culprits put the video out
on mobile phones, on the internet and even sold it as a CD in the blue film market.
(h) Section-66F Cyber Terrorism
Relevant Case: The Mumbai police have registered a case of ‘cyber terrorism’—
the first in the state since an amendment to the Information Technology Act—
where a threat email was sent to the BSE and NSE on Monday. The MRA Marg
police and the Cyber Crime Investigation Cell are jointly probing the case. The
suspect has been detained in this case.
The police said an email challenging the security agencies to prevent a terror attack
was sent by one Shahab Md with an ID sh.itaiyeb125@yahoo.in to BSE’s
administrative email ID corp.relations@bseindia.com at around 10.44 am on
Monday.
The IP address of the sender has been traced to Patna in Bihar. The ISP is Sify. The
email ID was created just four minutes before the email was sent. “The sender had,
while creating the new ID, given two mobile numbers in the personal details
8. column. Both the numbers belong to a photo frame-maker in Patna,’’ said an
officer. Status: The MRA Marg police have registered forgery for purpose of
cheating, criminal intimidation cases under the IPC and a cyber-terrorism case
under the IT Act.
Section 67 - Punishment for publishing or transmitting obscene material in
electronic
Relevant Case: This case is about posting obscene, defamatory and annoying
message about a divorcee woman in the Yahoo message group. E-mails were
forwarded to the victim for information by the accused through a false e- mail
account opened by him in the name of the victim. These postings resulted in
annoying phone calls to the lady. Based on the lady’s complaint, the police nabbed
the accused.
Investigation revealed that he was a known family friend of the victim and was
interested in marrying her. She was married to another person, but that marriage
ended in divorce and the accused started contacting her once again. On her
reluctance to marry him he started harassing her through internet.
Verdict: The accused was found guilty of offences under section 469, 509 IPC and
67 of IT Act 2000. He is convicted and sentenced for the offence as follows: As
per 469 of IPC he has to undergo rigorous imprisonment for 2 years and to pay
fine of Rs.500/- As per 509 of IPC he is to undergo to undergo 1 year Simple
imprisonment and to pay Rs 500/- As per Section 67 of IT Act 2000, he has to
undergo for 2 years and to pay fine of Rs.4000/- All sentences were to run
concurrently. The accused paid fine amount and he was lodged at Central Prison,
Chennai. This is considered the first case convicted under section 67 of
Information Technology Act 2000 in India.
J) Section 67B. Punishment for publishing or transmitting of material
depicting children in sexually explicit act, etc. in electronic form
9. Relevant Case: Janhit Manch & Ors. v. The Union of India 10.03.2010 Public
Interest Litigation: The petition sought a blanket ban on pornographic websites.
The NGO had argued that websites displaying sexually explicit content had an
adverse influence, leading youth on a delinquent path. k. Section 69 - Powers to
issue directions for interception or monitoring or decryption of any information
through any computer resource Relevant Case: In August 2007, Lakshmana
Kailash K., a techie from Bangalore was arrested on the suspicion of having posted
insulting images of Chhatrapati Shivaji, a major historical figure in the state of
Maharashtra, on the social-networking site Orkut.
The police identified him based on IP address details obtained from Google and
Airtel - Lakshmana’s ISP. He was brought to Pune and detained for 50 days before
it was discovered that the IP address provided by Airtel was erroneous. The
mistake was evidently due to the fact that while requesting information from
Airtel, the police had not properly specified whether the suspect had posted the
content at 1:15 p.m.
Verdict: Taking cognizance of his plight from newspaper accounts, the State
Human Rights Commission subsequently ordered the company to pay Rs 2 lakh to
Lakshmana as damages.
The incident highlights how minor privacy violations by ISPs and intermediaries
could have impacts that gravely undermine other basic human rights.
5. COMMON CYBER-CRIME SCENARIOS AND APPLICABILITY OF
LEGAL SECTIONS
Let us look into some common cyber-crime scenarios which can attract
prosecution as per the penalties and offences prescribed in IT Act 2000 (amended
via 2008) Act.
a. Harassment via fake public profile on social networking site A fake profile of a
person is created on a social networking site with the correct address, residential
information or contact details but he/she is labelled as ‘prostitute’ or a person of
‘loose character’. This leads to harassment of the victim. Provisions Applicable:-
Sections 66A, 67 of IT Act and Section 509 of the Indian Penal Code.
10. b. Online Hate Community Online hate community is created inciting a religious
group to act or pass objectionable remarks against a country, national figures etc.
Provisions Applicable: Section 66A of IT Act and 153A & 153B of the Indian
Penal Code.
c. Email Account Hacking If victim’s email account is hacked and obscene emails
are sent to people in victim’s address book. Provisions Applicable:- Sections 43,
66, 66A, 66C, 67, 67A and 67B of IT Act.
d. Credit Card Fraud Unsuspecting victims would use infected computers to make
online transactions. Provisions Applicable:- Sections 43, 66, 66C, 66D of IT Act
and section 420 of the IPC.
e. Web Defacement The homepage of a website is replaced with a pornographic or
defamatory page. Government sites generally face the wrath of hackers on
symbolic days. Provisions Applicable:- Sections 43 and 66 of IT Act and Sections
66F, 67 and 70 of IT Act also apply in some cases.
f. Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs All of the
above are some sort of malicious programs which are used to destroy or gain
access to some electronic information. Provisions Applicable:- Sections 43, 66,
66A of IT Act and Section 426 of Indian Penal Code.
g. Cyber Terrorism Many terrorists are use virtual(GDrive, FTP sites) and physical
storage media(USB’s, hard drives) for hiding information and records of their
illicit business.
Provisions Applicable: Conventional terrorism laws may apply along with
Section 69 of IT Act.
h. Online sale of illegal Articles Where sale of narcotics, drugs weapons and
wildlife is facilitated by the Internet Provisions Applicable:- Generally
conventional laws apply in these cases.
i. Cyber Pornography Among the largest businesses on Internet. Pornography may
not be illegal in many countries, but child pornography is. Provisions Applicable:-
Sections 67, 67A and 67B of the IT Act.
11. j. Phishing and Email Scams Phishing involves fraudulently acquiring sensitive
information through masquerading a site as a trusted entity. (E.g. Passwords, credit
card information) Provisions Applicable:- Section 66, 66A and 66D of IT Act and
Section 420 of IPC
k. Theft of Confidential Information Many business organizations store their
confidential information in computer systems. This information is targeted by
rivals, criminals and disgruntled employees. Provisions Applicable:- Sections 43,
66, 66B of IT Act and Section 426 of Indian Penal Code.
l. Source Code Theft A Source code generally is the most coveted and important
"crown jewel" asset of a company. Provisions applicable:- Sections 43, 66, 66B of
IT Act and Section 63 of Copyright Act.
m. Tax Evasion and Money Laundering Money launderers and people doing
illegal business activities hide their information in virtual as well as physical
activities. Provisions Applicable: Income Tax Act and Prevention of Money
Laundering Act. IT Act may apply case-wise.
n. Online Share Trading Fraud It has become mandatory for investors to have their
demat accounts linked with their online banking accounts which are generally
accessed unauthorized, thereby leading to share trading frauds. Provisions
Applicable: Sections 43, 66, 66C, 66D of IT Act and Section 420 of IPC
12. APPENDIX
1. Penalties, Compensation and Adjudication sections Section 43 - Penalty and
Compensation for damage to computer, computer system If any person without
permission of the owner or any other person who is in-charge of a computer,
computer system or computer network –
(a) accesses or secures access to such computer, computer system or computer
network or computer resource
(b) downloads, copies or extracts any data, computer data, computer database or
information from such computer, computer system or computer network including
information or data held or stored in any removable storage medium;
(c) introduces or causes to be introduced any computer contaminant or computer
virus into any computer, computer system or computer network-
(d) damages or causes to be damaged any computer, computer system or computer
network, data, computer database, or any other programmes residing in such
computer, computer system or computer network-
(e) disrupts or causes disruption of any computer, computer system, or computer
network;
(f) denies or causes the denial of access to any person authorised to access any
computer, computer system or computer network by any means
(h) charges the services availed of by a person to the account of another person by
tampering with or manipulating any computer of a computer, computer system or
computer network-
13. (g) provides any assistance to any person to facilitate access to a computer,
computer system or computer network in contravention of the provisions of this
Act, rules or regulations made there under,
(h) charges the services availed of by a person to the account of another person by
tampering with or manipulating any computer, computer system, or computer
network,
(i) destroys, deletes or alters any information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means,
(j) Steals, conceals, destroys or alters or causes any person to steal, conceal,
destroy or alter any computer source code used for a computer resource with an
intention to cause damage,
he shall be liable to pay damages by way of compensation to the person so
affected.
Section 43A - Compensation for failure to protect data Where a body corporate,
possessing, dealing or handling any sensitive personal data or information in a
computer resource which it owns, controls or operates, is negligent in
implementing and maintaining reasonable security practices and procedures and
thereby causes wrongful loss or wrongful gain to any person, such body corporate
shall be liable to pay damages by way of compensation, not exceeding five crore
rupees, to the person so affected.
Section 44 - Penalty for failure to furnish information or return, etc. If any
person who is required under this Act or any rules or regulations made there under
to –
(a) furnish any document, return or report to the Controller or the Certifying
Authority, fails to furnish the same, he shall be liable to a penalty not exceeding
one lakh and fifty thousand rupees for each such failure;
(b) file any return or furnish any information, books or other documents within the
time specified therefore in the regulations, fails to file return or furnish the same
14. within the time specified therefore in the regulations, he shall be liable to a penalty
not exceeding five thousand rupees for every day during which such failure
continues:
(c) Maintain books of account or records, fails to maintain the same, he shall be
liable to a penalty not exceeding ten thousand rupees for every day during which
the failure continues.
Section 45 – Residuary Penalty Whoever contravenes any rules or regulations
made under this Act, for the contravention of which no penalty has been separately
provided,
shall be liable to pay a compensation not exceeding twenty-five thousand rupees to
the person affected by such contravention or a penalty not exceeding twenty-five
thousand rupees.
Section 47 - Factors to be taken into account by the adjudicating officer Section
47 lays down that while adjudging the quantum of compensation under this Act, an
adjudicating officer shall have due regard to the following factors, namely :-
(a) The amount of gain of unfair advantage, wherever quantifiable, made as a result
of the default;
(b) The amount of loss caused to the person as a result of the default,
(c) The repetitive nature of the default.
2. Offences sections Section 65 - Tampering with Computer Source
Documents If any person knowingly or intentionally conceals, destroys code or
alters or causes another to conceal, destroy code or alter any computer, computer
programme, computer system, or computer network,
he shall be punishable with imprisonment up to three years, or with fine up to two
lakh rupees, or with both.
Section - 66 Computer Related Offences If any person, dishonestly, or
fraudulently, does any act referred to in section 43, he shall be punishable with
15. imprisonment for a term which may extend to two three years or with fine which
may extend to five lakh rupees or with both.
Section 66A - Punishment for sending offensive messages through
communication service Any person who sends, by means of a computer resource
or a communication device,
(a) any information that is grossly offensive or has menacing character;
(b) any information which he knows to be false, but for the purpose of causing
annoyance, inconvenience, danger, obstruction, insult, injury, criminal
intimidation, enmity, hatred, or ill will, persistently makes by making use of such
computer resource or a communication device,
(c) any electronic mail or electronic mail message for the purpose of causing
annoyance or inconvenience or to deceive or to mislead the addressee or recipient
about the origin of such messages
shall be punishable with imprisonment for a term which may extend to three years
and with fine.
Section 66B - Punishment for dishonestly receiving stolen computer
resource or communication device.
Whoever dishonestly receives or retains any stolen computer resource or
communication device knowing or having reason to believe the same to be stolen
computer resource or communication device,
shall be punished with imprisonment of either description for a term which may
extend to three years or with fine which may extend to rupees one lakh or with
both.
Section 66C - Punishment for identity theft whoever, fraudulently or dishonestly
make use of the electronic signature, password or any other unique identification
feature of any other person,
16. shall be punished with imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to rupees
one lakh.
Section 66D - Punishment for cheating by presentation by using computer
resource whoever, by means of any communication device or computer resource
cheats by personating;
shall be punished with imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to one lakh
rupees.
Section 66E - Punishment for violation of privacy Whoever, intentionally or
knowingly captures, publishes or transmits the image of a private area of any
person without his or her consent, under circumstances violating the privacy of that
person,
Explanation - For the purposes of this section:
(a) “transmit” means to electronically send a visual image with the intent that it be
viewed by a person or persons; (b) “capture”, with respect to an image, means to
videotape, photograph, film or record by any means; (c) “private area” means the
naked or undergarment clad genitals, pubic area, buttocks or female breast; (d)
“publishes” means reproduction in the printed or electronic form and making it
available for public; (e) “under circumstances violating privacy” means
circumstances in which a person can have a reasonable expectation that-- (i) he or
she could disrobe in privacy, without being concerned that an image of his private
area was being captured; or (ii) any part of his or her private area would not be
visible to the public, regardless of whether that person is in a public or private
place.
shall be punished with imprisonment which may extend to three years or with fine
not exceeding two lakh rupees, or with both.
17. Section-66F Cyber Terrorism (1) Whoever,- (A) with intent to threaten the
unity, integrity, security or sovereignty of India or to strike terror in the people or
any section of the people by – (i) denying or cause the denial of access to any
person authorized to access computer resource; or (ii) attempting to penetrate or
access a computer resource without authorisation or exceeding authorized access;
or (iii) introducing or causing to introduce any Computer Contaminant and by
means of such conduct causes or is likely to cause death or injuries to persons or
damage to or destruction of property or disrupts or knowing that it is likely to
cause damage or disruption of supplies or services essential to the life of the
community or adversely affect the critical information infrastructure specified
under section 70, or
(B) knowingly or intentionally penetrates or accesses a computer resource without
authorization or exceeding authorized access, and by means of such conduct
obtains access to information, data or computer database that is restricted for
reasons of the security of the State or foreign relations; or any restricted
information, data or computer database, with reasons to believe that such
information, data or computer database so obtained may be used to cause or likely
to cause injury to the interests of the sovereignty and integrity of India, the security
of the State, friendly relations with foreign States, public order, decency or
morality, or in relation to contempt of court, defamation or incitement to an
offence, or to the advantage of any foreign nation, group of individuals or
otherwise, commits the offence of cyber terrorism.
(2) Whoever commits or conspires to commit cyber terrorism shall be punishable
with imprisonment which may extend to imprisonment for life.
Section 67 - Punishment for publishing or transmitting obscene material in
electronic form Whoever publishes or transmits or causes to be published in the
electronic form, any material which is lascivious or appeals to the prurient interest
or if its effect is such as to tend to deprave and corrupt persons who are likely,
having regard to all relevant circumstances, to read, see or hear the matter
contained or embodied in it, shall be punished on first conviction with
18. imprisonment of either description for a term which may extend to two three years
and with fine which may extend to five lakh rupees and in the event of a second or
subsequent conviction with imprisonment of either description for a term which
may extend to five years and also with fine which may extend to ten lakh rupees.
Section 67A - Punishment for publishing or transmitting of material containing
sexually explicit act, etc. in electronic form Whoever publishes or transmits or
causes to be published or transmitted in the electronic form any material which
contains sexually explicit act or conduct
shall be punished on first conviction with imprisonment of either description for a
term which may extend to five years and with fine which may extend to ten lakh
rupees and
in the event of second or subsequent conviction with imprisonment of either
description for a term which may extend to seven years and also with fine which
may extend to ten lakh rupees.
Section 67B. Punishment for publishing or transmitting of material depicting
children in sexually explicit act, etc. in electronic form
Whoever:- (a) publishes or transmits or causes to be published or transmitted
material in any electronic form which depicts children engaged in sexually explicit
act or conduct or (b) creates text or digital images, collects, seeks, browses,
downloads, advertises, promotes, exchanges or distributes material in any
electronic form depicting children in obscene or indecent or sexually explicit
manner or (c) cultivates, entices or induces children to online relationship with one
or more children for and on sexually explicit act or in a manner that may offend a
reasonable adult on the computer resource or (d) facilitates abusing children online
or (e) records in any electronic form own abuse or that of others pertaining to
sexually explicit act with children,
19. shall be punished on first conviction with imprisonment of either description for a
term which may extend to five years and with a fine which may extend to ten lakh
rupees
and in the event of second or subsequent conviction with imprisonment of either
description for a term which may extend to seven years and also with fine which
may extend to ten lakh rupees:
Provided that the provisions of section 67, section 67A and this section does not
extend to any book, pamphlet, paper, writing, drawing, painting, representation or
figure in electronic form
Section 69 - Powers to issue directions for interception or monitoring or
decryption of any information through any computer resource.-
(1) Where the central Government or a State Government or any of its officer
specially authorized by the Central Government or the State Government, as the
case may be, in this behalf may, if is satisfied that it is necessary or expedient to do
in the interest of the sovereignty or integrity of India, defence of India, security of
the State, friendly relations with foreign States or public order or for preventing
incitement to the commission of any cognizable offence relating to above or for
investigation of any offence, it may, subject to the provisions of sub-section (2),
for reasons to be recorded in writing, by order, direct any agency of the appropriate
Government to intercept, monitor or decrypt or cause to be intercepted or
monitored or decrypted any information transmitted received or stored through any
computer resource.
(2) The Procedure and safeguards subject to which such interception or monitoring
or decryption may be carried out, shall be such as may be prescribed.
(3) The subscriber or intermediary or any person in charge of the computer
resource shall, when called upon by any agency which has been directed under sub
section (1), extend all facilities and technical assistance to - (a) provide access to or
secure access to the computer resource generating, transmitting, receiving or
storing such information; or (b) intercept or monitor or decrypt the information, as
the case may be; or (c) provide information stored in computer resource. (4) The
20. subscriber or intermediary or any person who fails to assist the agency referred to
in sub-section (3) shall be punished with an imprisonment for a term which may
extend to seven years and shall also be liable to fine.
Section 69A - Power to issue directions for blocking for public access of any
information through any computer resource (1) Where the Central Government or
any of its officer specially authorized by it in this behalf is satisfied that it is
necessary or expedient so to do in the interest of sovereignty and integrity of India,
defense of India, security of the State, friendly relations with foreign states or
public order or for preventing incitement to the commission of any cognizable
offence relating to above, it may subject to the provisions of sub-sections (2) for
reasons to be recorded in writing, by order direct any agency of the Government or
intermediary to block access by the public or cause to be blocked for access by
public any information generated, transmitted, received, stored or hosted in any
computer resource.
(2) The procedure and safeguards subject to which such blocking for access by the
public may be carried out shall be such as may be prescribed.
(3) The intermediary who fails to comply with the direction issued under sub-section
(1) shall be punished with an imprisonment for a term which may extend to
seven years and also be liable to fine.
Section 69B. Power to authorize to monitor and collect traffic data or
information through any computer resource for Cyber Security
(1) The Central Government may, to enhance Cyber Security and for
identification, analysis and prevention of any intrusion or spread of computer
contaminant in the country, by notification in the official Gazette, authorize any
agency of the Government to monitor and collect traffic data or information
generated, transmitted, received or stored in any computer resource.
(2) The Intermediary or any person in-charge of the Computer resource shall when
called upon by the agency which has been authorized under sub-section (1),
provide technical assistance and extend all facilities to such agency to enable
21. online access or to secure and provide online access to the computer resource
generating, transmitting, receiving or storing such traffic data or information.
(3) The procedure and safeguards for monitoring and collecting traffic data or
information, shall be such as may be prescribed.
(4) Any intermediary who intentionally or knowingly contravenes the provisions of
subsection (2) shall be punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.
Section 71. Penalty for misrepresentation Whoever makes any misrepresentation
to, or suppresses any material fact from, the Controller or the Certifying Authority
for obtaining any license or Electronic Signature Certificate, as the case may be,
shall be punished with imprisonment for a term which may extend to two years, or
with fine which may extend to one lakh rupees, or with both.
Section 72 - Breach of confidentiality and privacy Any person who, in pursuant
of any of the powers conferred under this Act, rules or regulations made there
under, has secured access to any electronic record, book, register, correspondence,
information, document or other material without the consent of the person
concerned discloses such electronic record, book, register, correspondence,
information, document or other material to any other person
shall be punished with imprisonment for a term which may extend to two years, or
with fine which may extend to one lakh rupees, or with both.
Section 72A - Punishment for Disclosure of information in breach of lawful
contract Any person including an intermediary who, while providing services
under the terms of lawful contract, has secured access to any material containing
personal information about another person, with the intent to cause or knowing that
he is likely to cause wrongful loss or wrongful gain discloses, without the consent
of the person concerned, or in breach of a lawful contract, such material to any
other person shall be punished with imprisonment for a term which may extend to
three years, or with a fine which may extend to five lakh rupees, or with both.
22. 73. Penalty for publishing electronic Signature Certificate false in
certain particulars.
(1) No person shall publish a Electronic Signature Certificate or otherwise make it
available to any other person with the knowledge that (a) the Certifying Authority
listed in the certificate has not issued it; or (b) the subscriber listed in the certificate
has not accepted it; or (c) the certificate has been revoked or suspended, unless
such publication is for the purpose of verifying a digital signature created prior to
such suspension or revocation
(2) Any person who contravenes the provisions of sub-section (1)
shall be punished with imprisonment for a term which may extend to two years, or
with fine which may extend to one lakh rupees, or with both.
Section 74 - Publication for fraudulent purpose: Whoever knowingly creates,
publishes or otherwise makes available a Electronic Signature Certificate for any
fraudulent or unlawful purpose
shall be punished with imprisonment for a term which may extend to two years, or
with fine which may extend to one lakh rupees, or with both.
Section 75 - Act to apply for offence or contraventions committed outside India (1)
Subject to the provisions of sub-section (2), the provisions of this Act shall apply
also to any offence or contravention committed outside India by any person
irrespective of his nationality.
(2) For the purposes of sub-section (1), this Act shall apply to an offence or
contravention committed outside India by any person if the act or conduct
constituting the offence or contravention involves a computer, computer system or
computer network located in India.
Section 77A - Compounding of Offences. (1) A Court of competent jurisdiction
may compound offences other than offences for which the punishment for life or
imprisonment for a term exceeding three years has been provided under this Act.
23. Provided further that the Court shall not compound any offence where such
offence affects the socio-economic conditions of the country or has been
committed against a child below the age of 18 years or a woman.
(2) The person accused of an offence under this act may file an application for
compounding in the court in which offence is pending for trial and the provisions
of section 265 B and 265C of Code of Criminal Procedures, 1973 shall apply.
Section 77B - Offences with three years imprisonment to be cognizable Not with
standing anything contained in Criminal Procedure Code 1973, the offence
punishable with imprisonment of three years and above shall be cognizable and the
offence punishable with imprisonment of three years shall be bailable. Section 78
- Power to investigate offences not with standing anything contained in the Code of
Criminal Procedure, 1973, a police officer not below the rank of Inspector shall
investigate any offence under this Act.