- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
This document summarizes several sections of India's Information Technology Act related to data protection and cybercrime. Section 43 discusses corporate liability for data breaches if reasonable security practices were not followed. Section 65 covers tampering with computer source documents. Section 66 discusses hacking computers and networks. Section 66A establishes punishment for sending offensive messages online. Section 66B covers penalties for dishonestly receiving stolen electronic devices. Case studies provide examples of cases tried under these sections, such as companies moving operations due to data theft, manipulation of cell phone identifiers, and a juvenile charged for a vulgar website.
This document provides an overview of cyber crimes and relevant cases in India. It defines cyber crimes as illegal acts conducted using electronic means, targeting computer security or data. Several cases are described that demonstrate the application of sections of the Indian Penal Code and Information Technology Act related to unauthorized access, data tampering, identity theft, offensive online messages, privacy violations, and cyber terrorism. Penalties for convicted individuals have included imprisonment and fines.
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
This ppt contains details about various cyber crime and how can you prevent yourself from the cyber crime. This also includes cyber law of India and its various section.
This document provides an overview of penalties and offenses outlined in the Information Technology Act 2000 in India. It discusses key sections of the Act related to cyber crimes and provides case studies. The Act aims to provide legal recognition for electronic transactions and commerce. It defines cyber crimes and outlines penalties for offenses involving unauthorized access to computers, identity theft, cyber terrorism, and transmitting obscene material online. The document also discusses the need for the 2008 amendment to the original Act and provides an overview of the Act's structure.
This document summarizes sections of the Indian Information Technology Act relating to data protection, hacking, and cyber crimes. It discusses sections that deal with compensation for corporate negligence that results in data loss, tampering with computer source code, hacking, sending offensive messages online, and dishonestly receiving stolen electronic devices. Case studies are provided for each section to illustrate how related legal cases have been handled. The document aims to explain the IT Act and associated punishments around these cyber issues.
The document discusses cyber law and the Information Technology Act 2000. It defines cyber crime as any offence committed using a computer. The Act was passed in 2000 to regulate e-commerce, digital signatures, and e-governance. It covers 13 chapters and 90 sections dealing with electronic documents, digital signatures, data privacy, information security, and additional cyber crimes like child pornography and cyber terrorism. The document also outlines reasonable security practices organizations should follow and some key aspects of the Information Technology Act.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This document discusses cyber crimes and relevant cases in India related to sections of the Information Technology Act 2000. It begins by explaining that cyber crime is not officially defined but refers to illegal behavior using electronic means that targets computer security or data. The document then presents several case studies corresponding to specific sections of the IT Act, including cases related to unauthorized access, tampering with source code, computer hacking, identity theft, cheating by impersonation, privacy violations, and cyber terrorism.
This document summarizes several sections of India's Information Technology Act related to data protection and cybercrime. Section 43 discusses corporate liability for data breaches if reasonable security practices were not followed. Section 65 covers tampering with computer source documents. Section 66 discusses hacking computers and networks. Section 66A establishes punishment for sending offensive messages online. Section 66B covers penalties for dishonestly receiving stolen electronic devices. Case studies provide examples of cases tried under these sections, such as companies moving operations due to data theft, manipulation of cell phone identifiers, and a juvenile charged for a vulgar website.
This document provides an overview of cyber crimes and relevant cases in India. It defines cyber crimes as illegal acts conducted using electronic means, targeting computer security or data. Several cases are described that demonstrate the application of sections of the Indian Penal Code and Information Technology Act related to unauthorized access, data tampering, identity theft, offensive online messages, privacy violations, and cyber terrorism. Penalties for convicted individuals have included imprisonment and fines.
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
This ppt contains details about various cyber crime and how can you prevent yourself from the cyber crime. This also includes cyber law of India and its various section.
This document provides an overview of penalties and offenses outlined in the Information Technology Act 2000 in India. It discusses key sections of the Act related to cyber crimes and provides case studies. The Act aims to provide legal recognition for electronic transactions and commerce. It defines cyber crimes and outlines penalties for offenses involving unauthorized access to computers, identity theft, cyber terrorism, and transmitting obscene material online. The document also discusses the need for the 2008 amendment to the original Act and provides an overview of the Act's structure.
This document summarizes sections of the Indian Information Technology Act relating to data protection, hacking, and cyber crimes. It discusses sections that deal with compensation for corporate negligence that results in data loss, tampering with computer source code, hacking, sending offensive messages online, and dishonestly receiving stolen electronic devices. Case studies are provided for each section to illustrate how related legal cases have been handled. The document aims to explain the IT Act and associated punishments around these cyber issues.
The document discusses cyber law and the Information Technology Act 2000. It defines cyber crime as any offence committed using a computer. The Act was passed in 2000 to regulate e-commerce, digital signatures, and e-governance. It covers 13 chapters and 90 sections dealing with electronic documents, digital signatures, data privacy, information security, and additional cyber crimes like child pornography and cyber terrorism. The document also outlines reasonable security practices organizations should follow and some key aspects of the Information Technology Act.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This document discusses cyber crimes and relevant cases in India related to sections of the Information Technology Act 2000. It begins by explaining that cyber crime is not officially defined but refers to illegal behavior using electronic means that targets computer security or data. The document then presents several case studies corresponding to specific sections of the IT Act, including cases related to unauthorized access, tampering with source code, computer hacking, identity theft, cheating by impersonation, privacy violations, and cyber terrorism.
Cybercrime involves any illegal activity carried out through computers or online. This document discusses several sections of the Indian Penal Code related to cybercrime and provides case studies to illustrate how the courts have applied each section. Several cases involved unauthorized access to steal financial information, creating fake online profiles, sending hoax emails about bombs, and circulating private videos without consent. The courts interpreted these acts as violating sections around unauthorized access, tampering with data, computer-related offenses, identity theft, privacy violations, and the new section related to cyber terrorism.
Cybercrime involves illegal activities conducted through electronic means. The document discusses several cases related to sections of the Indian Penal Code dealing with cybercrime. These include cases of identity theft, sending offensive messages, hacking, and tampering with computer systems or data. The cases illustrate how various cybercrimes have been prosecuted under the relevant sections of the Indian Penal Code.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
This document provides an overview of cyber law and cyber crimes in India. It begins by defining cyber crime and outlining the relevant sections of the Information Technology Act 2000. It then provides case studies to illustrate the application of sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69 of the IT Act. It concludes by summarizing common cyber crime scenarios and the applicable legal sections, such as hacking, credit card fraud, cyber terrorism, and online harassment.
This document discusses cyber law and cybercrime in India. It provides definitions of cybercrime from international organizations and Indian law. It notes that cybercrime spans national boundaries and discusses the need for international cooperation between law enforcement agencies. It also analyzes cybercrime statistics in India and discusses challenges in investigating and prosecuting cybercrimes like ensuring legally admissible digital evidence. It emphasizes the importance of training police and judiciary on technology issues to effectively address cybercrime.
Cyber Law of India : Introduction
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and explaining how it is not officially defined in legislation due to the evolving nature of such offenses. It then provides examples of common cyber crimes like hacking, phishing, and online harassment and discusses the relevant sections of the Information Technology Act 2000 and Indian Penal Code that could apply to each case. The document concludes by examining several real-world cases related to different cyber crimes and the legal provisions under which individuals were prosecuted.
This document discusses various cyber crimes and relevant cases in India. It defines cybercrime and outlines offenses covered under the Information Technology Act 2000. Several cases are described that relate to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, and 67 of the Act, dealing with issues like unauthorized access, data tampering, hacking, identity theft, impersonation, privacy violations, cyber terrorism, and transmitting obscene material. The document analyzes the relevant sections applied and verdicts reached in these cases.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and noting that it is not officially defined in Indian law. It then discusses various cyber crimes and the relevant sections of the Information Technology Act 2000 that apply to them, including illegal access, hacking, data theft, cyber terrorism, and more. Several case studies are provided as examples. In conclusion, it examines common cyber crime scenarios and the applicable legal sections for crimes like online harassment, hate communities, credit card fraud, and others.
This presentation summarizes key sections of the Indian Information Technology Act of 2000 related to cybercrimes. Section 66A makes it a punishable offense to send offensive messages online. It discusses related cases where individuals were prosecuted for creating a fake profile of the President and sending threatening emails. Section 66B concerns dishonestly receiving stolen computer resources, while Section 66C addresses identity theft. The presentation provides examples of cases prosecuted under these sections and explains punishments under the Act for various cybercrimes from hacking to privacy violations and cyberterrorism.
The document discusses cyber laws in Pakistan. It provides an overview of two key pieces of legislation: the Electronic Transaction Ordinance of 2002, which recognized electronic documentation and established rules around digital signatures; and the Electronic/Cyber Crime Bill of 2007, which defined 17 types of cyber crimes and assigned punishments including imprisonment and fines. It also presents some statistics on cyber crimes reported in Pakistan and globally.
Crime involves unlawful acts that can be prosecuted and punished. Cyber crime uses computers and the internet to steal identities, sell illegal items, stalk victims, or cause disruptions. Common cyber crimes include hacking, phishing, cyber squatting, and cyber stalking. India has experienced increasing cyber crime rates due to a growing internet user base and stands 11th globally for reported cyber crimes. While Indian laws address cyber crimes, enforcement remains a challenge due to evolving technologies and unreported cases. Improving cyber security measures and awareness can help reduce cyber crimes going forward.
Debasis Pandit, a student, was arrested for hacking into eBay India's website and stealing credit card information from over 700 users. Pandit used XSS scripting to access customers' payment details and purchase goods, which were delivered to an accomplice. Pandit and the accomplice were charged under sections of the Indian Penal Code and Information Technology Act for offenses including cheating, dishonestly inducing delivery of property, and sending information to harm a computer system. Cybercrime greatly impacts individuals, businesses, and national security. Increased public awareness, police training, cyber cells, and international cooperation are needed to effectively combat cybercrime.
Overview of Computer & Internet Crimes in Indiagsmonga
The document discusses computer and internet laws in India. It outlines various types of computer and internet crimes, such as hacking, data theft, cyber terrorism, and intellectual property theft. It then summarizes India's main laws regarding cyber crimes, including the Information Technology Act of 2000 and its 2008 amendment. The amendment expands the scope of cyber crimes and increases penalties for offenses involving identity theft, child pornography, and violation of privacy. The conclusion states that while Indian laws adequately address cyber crimes, enforcement agencies must keep up with changing technologies.
Cyber law governs all legal aspects of the internet and cybersecurity. As internet usage has increased globally for activities like business, banking, and social interaction, it has also been misused for criminal activities, necessitating cyber laws. If someone becomes a victim of a cybercrime, they should preserve electronic evidence and report the breach to authorities. However, victims still have a legal duty to exercise due diligence. Challenges include criminals operating across international borders where different laws apply. While no international cyber laws exist, some countries have bilateral agreements, and national laws vary in their scope and coverage of issues like privacy and infrastructure protection. Companies should inform customers of breaches and advise them on appropriate steps.
This document provides a case study on cyber crime. It begins with an introduction discussing the evolution of cyber crime and how the internet has provided opportunities for criminal activity. It then describes several categories of common cyber crimes like spam, fraud, and information theft. The document also discusses tools used in cyber crimes such as bots, keyloggers, and social engineering. It provides examples of real world cyber crime cases and current crime news. Statistics on cyber crime are presented and the document concludes with a discussion of how cyber crime has become a major issue.
Cyber crimes negatively impact businesses. They include hacking, phishing, and denial of service attacks. The National Bank of Pakistan experienced a major cyber attack where a criminal gang hacked ATMs and withdrew millions of rupees. The bank suspended its ATM service with other banks and is working with law enforcement to investigate the incident. While Pakistan has cyber crime laws, experts note that more awareness and stronger enforcement is still needed.
This document summarizes penalties and offenses under the IT Act 2000 in India with case studies. It discusses sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, and 69 of the Act and associated cases. One case study describes a credit card fraud where victims' computers were infected to make unauthorized online transactions. Another case found an individual guilty under sections 66 and 420 of tampering with broadband internet accounts and hacking sites across cities. The document concludes with an example of web defacement where a government site was altered on a symbolic day.
This document summarizes an assignment on cyber law submitted to a professor. It discusses the objectives and structure of the Information Technology Act 2000 and the need for the Information Technology Amendment Act 2008. It then provides case studies related to selected sections of the IT Act, including Section 43 on penalties for computer damage, Section 65 on tampering with computer source documents, Section 66 on computer-related offenses, and Section 66A on sending offensive messages.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key aspects and changes covered in the amended act of 2008, including a focus on data privacy, information security, cyber cafes, digital signatures, and including additional cyber crimes. The document also discusses the structure and applicability of the act, and provides case studies to illustrate specific sections of the act related to offenses such as tampering, cheating, identity theft, and publishing obscene material.
Cybercrime involves any illegal activity carried out through computers or online. This document discusses several sections of the Indian Penal Code related to cybercrime and provides case studies to illustrate how the courts have applied each section. Several cases involved unauthorized access to steal financial information, creating fake online profiles, sending hoax emails about bombs, and circulating private videos without consent. The courts interpreted these acts as violating sections around unauthorized access, tampering with data, computer-related offenses, identity theft, privacy violations, and the new section related to cyber terrorism.
Cybercrime involves illegal activities conducted through electronic means. The document discusses several cases related to sections of the Indian Penal Code dealing with cybercrime. These include cases of identity theft, sending offensive messages, hacking, and tampering with computer systems or data. The cases illustrate how various cybercrimes have been prosecuted under the relevant sections of the Indian Penal Code.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
This document provides an overview of cyber law and cyber crimes in India. It begins by defining cyber crime and outlining the relevant sections of the Information Technology Act 2000. It then provides case studies to illustrate the application of sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69 of the IT Act. It concludes by summarizing common cyber crime scenarios and the applicable legal sections, such as hacking, credit card fraud, cyber terrorism, and online harassment.
This document discusses cyber law and cybercrime in India. It provides definitions of cybercrime from international organizations and Indian law. It notes that cybercrime spans national boundaries and discusses the need for international cooperation between law enforcement agencies. It also analyzes cybercrime statistics in India and discusses challenges in investigating and prosecuting cybercrimes like ensuring legally admissible digital evidence. It emphasizes the importance of training police and judiciary on technology issues to effectively address cybercrime.
Cyber Law of India : Introduction
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and explaining how it is not officially defined in legislation due to the evolving nature of such offenses. It then provides examples of common cyber crimes like hacking, phishing, and online harassment and discusses the relevant sections of the Information Technology Act 2000 and Indian Penal Code that could apply to each case. The document concludes by examining several real-world cases related to different cyber crimes and the legal provisions under which individuals were prosecuted.
This document discusses various cyber crimes and relevant cases in India. It defines cybercrime and outlines offenses covered under the Information Technology Act 2000. Several cases are described that relate to sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, and 67 of the Act, dealing with issues like unauthorized access, data tampering, hacking, identity theft, impersonation, privacy violations, cyber terrorism, and transmitting obscene material. The document analyzes the relevant sections applied and verdicts reached in these cases.
This document discusses cyber law and cyber crimes in India. It begins by defining cyber crime and noting that it is not officially defined in Indian law. It then discusses various cyber crimes and the relevant sections of the Information Technology Act 2000 that apply to them, including illegal access, hacking, data theft, cyber terrorism, and more. Several case studies are provided as examples. In conclusion, it examines common cyber crime scenarios and the applicable legal sections for crimes like online harassment, hate communities, credit card fraud, and others.
This presentation summarizes key sections of the Indian Information Technology Act of 2000 related to cybercrimes. Section 66A makes it a punishable offense to send offensive messages online. It discusses related cases where individuals were prosecuted for creating a fake profile of the President and sending threatening emails. Section 66B concerns dishonestly receiving stolen computer resources, while Section 66C addresses identity theft. The presentation provides examples of cases prosecuted under these sections and explains punishments under the Act for various cybercrimes from hacking to privacy violations and cyberterrorism.
The document discusses cyber laws in Pakistan. It provides an overview of two key pieces of legislation: the Electronic Transaction Ordinance of 2002, which recognized electronic documentation and established rules around digital signatures; and the Electronic/Cyber Crime Bill of 2007, which defined 17 types of cyber crimes and assigned punishments including imprisonment and fines. It also presents some statistics on cyber crimes reported in Pakistan and globally.
Crime involves unlawful acts that can be prosecuted and punished. Cyber crime uses computers and the internet to steal identities, sell illegal items, stalk victims, or cause disruptions. Common cyber crimes include hacking, phishing, cyber squatting, and cyber stalking. India has experienced increasing cyber crime rates due to a growing internet user base and stands 11th globally for reported cyber crimes. While Indian laws address cyber crimes, enforcement remains a challenge due to evolving technologies and unreported cases. Improving cyber security measures and awareness can help reduce cyber crimes going forward.
Debasis Pandit, a student, was arrested for hacking into eBay India's website and stealing credit card information from over 700 users. Pandit used XSS scripting to access customers' payment details and purchase goods, which were delivered to an accomplice. Pandit and the accomplice were charged under sections of the Indian Penal Code and Information Technology Act for offenses including cheating, dishonestly inducing delivery of property, and sending information to harm a computer system. Cybercrime greatly impacts individuals, businesses, and national security. Increased public awareness, police training, cyber cells, and international cooperation are needed to effectively combat cybercrime.
Overview of Computer & Internet Crimes in Indiagsmonga
The document discusses computer and internet laws in India. It outlines various types of computer and internet crimes, such as hacking, data theft, cyber terrorism, and intellectual property theft. It then summarizes India's main laws regarding cyber crimes, including the Information Technology Act of 2000 and its 2008 amendment. The amendment expands the scope of cyber crimes and increases penalties for offenses involving identity theft, child pornography, and violation of privacy. The conclusion states that while Indian laws adequately address cyber crimes, enforcement agencies must keep up with changing technologies.
Cyber law governs all legal aspects of the internet and cybersecurity. As internet usage has increased globally for activities like business, banking, and social interaction, it has also been misused for criminal activities, necessitating cyber laws. If someone becomes a victim of a cybercrime, they should preserve electronic evidence and report the breach to authorities. However, victims still have a legal duty to exercise due diligence. Challenges include criminals operating across international borders where different laws apply. While no international cyber laws exist, some countries have bilateral agreements, and national laws vary in their scope and coverage of issues like privacy and infrastructure protection. Companies should inform customers of breaches and advise them on appropriate steps.
This document provides a case study on cyber crime. It begins with an introduction discussing the evolution of cyber crime and how the internet has provided opportunities for criminal activity. It then describes several categories of common cyber crimes like spam, fraud, and information theft. The document also discusses tools used in cyber crimes such as bots, keyloggers, and social engineering. It provides examples of real world cyber crime cases and current crime news. Statistics on cyber crime are presented and the document concludes with a discussion of how cyber crime has become a major issue.
Cyber crimes negatively impact businesses. They include hacking, phishing, and denial of service attacks. The National Bank of Pakistan experienced a major cyber attack where a criminal gang hacked ATMs and withdrew millions of rupees. The bank suspended its ATM service with other banks and is working with law enforcement to investigate the incident. While Pakistan has cyber crime laws, experts note that more awareness and stronger enforcement is still needed.
This document summarizes penalties and offenses under the IT Act 2000 in India with case studies. It discusses sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, and 69 of the Act and associated cases. One case study describes a credit card fraud where victims' computers were infected to make unauthorized online transactions. Another case found an individual guilty under sections 66 and 420 of tampering with broadband internet accounts and hacking sites across cities. The document concludes with an example of web defacement where a government site was altered on a symbolic day.
This document summarizes an assignment on cyber law submitted to a professor. It discusses the objectives and structure of the Information Technology Act 2000 and the need for the Information Technology Amendment Act 2008. It then provides case studies related to selected sections of the IT Act, including Section 43 on penalties for computer damage, Section 65 on tampering with computer source documents, Section 66 on computer-related offenses, and Section 66A on sending offensive messages.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key aspects and changes covered in the amended act of 2008, including a focus on data privacy, information security, cyber cafes, digital signatures, and including additional cyber crimes. The document also discusses the structure and applicability of the act, and provides case studies to illustrate specific sections of the act related to offenses such as tampering, cheating, identity theft, and publishing obscene material.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key sections and features added in the amendment, including a focus on data privacy, information security, and additional cyber crimes. Several case studies are presented related to specific sections of the act around offenses such as identity theft, computer tampering, and publishing obscene material. The structure and applicability of the act are also outlined.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address perceived issues and compare to other countries' laws.
- Notable features strengthened in the amended act like data privacy, information security, and defining additional cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of the act.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes some key sections of the acts related to cyber crimes and penalties. Several case studies are presented related to sections like tampering with computer data, identity theft, cyber terrorism, and publishing obscene content online. The document aims to explain the Indian legal framework around cyber crimes and cases that have been prosecuted under different sections of the acts.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address perceived issues and compare to other countries' laws.
- Notable features strengthened in the amended act like data privacy, information security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases investigated under different sections of the act.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address perceived issues and compare to other countries' laws.
- Notable features strengthened in the amended act like data privacy, information security, and defining additional cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to selected sections of the act.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key sections and features added in the amendment, including a focus on data privacy, information security, and additional cyber crimes. Several case studies are presented related to specific sections of the act around offenses such as identity theft, computer tampering, and publishing obscene material. The structure and applicability of the act are also outlined.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address perceived issues and compare to other countries' laws.
- Notable features strengthened in the amended act like data privacy, information security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases investigated under different sections of the act.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key sections and features added in the amendment, including a focus on data privacy, information security, and additional cyber crimes. Several case studies are presented related to specific sections of the act around offenses such as identity theft, computer tampering, and publishing obscene material. The structure and applicability of the act are also outlined.
This document provides an overview of the Information Technology Act 2000 and its amendment in 2008 in India. It discusses key aspects of the original act like its objectives to provide legal recognition to electronic records and digital signatures. It also summarizes some important definitions in the act. The amendment act of 2008 focused on issues like data privacy, information security, and defining additional cyber crimes. It recognized the role of intermediaries and made digital signature technology neutral. In summary, the document provides a high-level introduction to India's primary law governing information technology and cybercrime.
The document discusses penalties and offenses under the Information Technology Act 2000 and 2008 in India. It provides an overview of the objectives and structure of the IT Act, defines cybercrime, and discusses several case studies related to specific sections of the Act dealing with unauthorized access to computer systems (Section 43), tampering with computer source documents (Section 65), computer-related offenses (Section 66), and sending offensive messages (Section 66A). The cases studies involve instances of fraud, identity theft, hacking, and creating fake profiles of public officials online.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
This document discusses various sections of the Information Technology Act 2000 of India related to cyber crimes. It begins with providing context on the objectives and structure of the IT Act. It then defines cyber crimes and provides a brief overview of the IT Act of 2000. Next, it discusses some notable features and sections of the Act including Section 43 on penalties for unauthorized access, Section 65 on tampering with computer source documents, Section 66 on computer related offenses, and provides relevant case studies for each. The document is an assignment submitted to a professor providing an overview of key aspects of India's cyber law and the IT Act of 2000.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Leaders are often faced with ethical conundrums(a confusing and difficult problem or question). So how can they determine when they’re inching toward dangerous territory? There are three main psychological dynamics that lead to crossing moral lines.
There’s omnipotence: when someone feels so aggrandized and entitled that they believe the rules of decent behavior don’t apply to them.
Consider cultural numbness: when others play along and gradually begin to accept and embody deviant norms.
Finally, when people don’t speak up because they are thinking of more immediate rewards, we see justified neglect.
Generally most people mean well, but simply execute their job poorly sometimes and sometimes, there are BAD bosses. We must learn “to Work "on Bad Boss
According to dictionary.com, “to work” something or someone is to put them into effective operation, to operate that thing or person for productive purposes.
Put your Bad Boss into effective operation to get whatever you want in your job or career by learning your boss’s secret desire and secret fear
Two biggest issues of Bad Boss are:
They can negatively impact our work performance.
They can make life miserable
We often hear “being difficult.” about Bad Boss. It’s hard to know exactly where the difficulty lie. All we know is it is difficult to work successfully with this person.
An incompetent person is someone who is
Functionally inadequate or
Insufficient in Knowledge, Skills, Judgment, or Strength
Mindset is a mental attitude that determines how we interpret and respond to situations.
Dweck has found that it is your mindset that plays a significant role in determining achievement and success.
A mindset refers to whether you believe qualities such as intelligence and talent are fixed or changeable traits.
People with a fixed mindset believe that these qualities are inborn, fixed, and unchangeable.
Those with a growth mindset, on the other hand, believe that these abilities can be developed and strengthened by way of commitment and hard work.
Story of Katalin Karikó, a researcher who won the Nobel prize for medicine for her work on modifying the RNA molecule to avoid triggering a harmful immune response is a classical example of mindset.
Yet, her life was full of rejection and doubt.
Her achievement had much to do with her mindset.
A theory is a based upon a hypothesis and backed by evidence.
A theory presents a concept or idea that is testable.
In science, a theory is not merely a guess.
A theory is a fact-based framework for describing a phenomenon.
In psychology, theories are used to provide a model for understanding human thoughts, emotions, and behaviors.
Hence study of Psychology theory is essential for SSB and all types of Interviewas it helps us to understand our own developmental psychology.k
Personality theorists should study normal individuals
All behavior is interactive
The person must be studied in terms of interactions with their environment
The brain is the locus of personality
There is a biological basis to personality
Definition of Personality
1- Personality is an abstraction formulated by a theorist.
2- It refers to series of events that ideally span over life time from childhood to adulthood
3-It reflects novel, unique, recurrent and enduring patterns of behaviours – his education and training .
4- Personality is located in brain- imagination, perception
5.Personality comprises the person’s central organizing and governing processes, whose function is to
Resolve conflicts,
Satisfy needs, and
Plan for future goals.
There are three components to emotions: subjective experience, physiological response, and behavioral response. Regarding subjective experience, emotions can vary in intensity between individuals and be mixed. Physiological responses are regulated by the autonomic nervous system and brain areas like the amygdala. Behavioral responses involve facial expressions and body language, which can be interpreted and expressed differently across cultures. There are several theories of emotion, such as those proposed by Darwin, James-Lange, Cannon-Bard, and Schachter-Singer. Ekman identified six universal emotions - happiness, sadness, fear, disgust, anger, and surprise - while Plutchik developed a wheel to show how emotions can be combined. Emotions differ from
Anger is an intense emotion you feel when
Something has gone wrong or
Someone has wronged you.
It is typically characterized by feelings of
Stress,
Frustration, and
Irritation.
Anger is a perfectly normal response to frustrating or difficult situations.
Anger only becomes a problem when
It’s excessively displayed and
Begins to affect your daily functioning and the way you relate with people.
Anger can range in intensity, from a slight annoyance to rage.
It can sometimes be excessive or irrational.
In these cases, it can be hard to keep the emotion in check and could cause you to behave in ways you wouldn’t otherwise behave.
Cognitive distortions are negative or irrational patterns of thinking that reinforce negative self-perceptions. Common cognitive distortions include all-or-nothing thinking, overgeneralization, mental filters, discounting the positive, jumping to conclusions, magnification, emotional reasoning, 'should' statements, labeling, and personalization. These distortions can contribute to problems like anxiety, depression, and low self-esteem. To cope, people can recognize distortions, challenge irrational thoughts, seek therapy which uses techniques like cognitive behavioral therapy to change distorted thinking patterns. Addressing cognitive distortions can improve mental health and well-being.
Trauma Bonding is the attachment an abused person feels for their abuser, specifically in a relationship with a cyclical pattern of abuse.
Is created due to a cycle of abuse and positive reinforcement
After each circumstance of abuse, the abuser professes love, regret, and trying to make the relationship feel safe and needed for the abused person.
Hence Abused
Finds leaving an abusive situation confusing and overwhelming
Involves positive and/or loving feelings for an abuser
Also feel attached to and dependent on their abuser.
Emotional abuse involves controlling another person by using emotions to Criticize , Embarrass ,Shame ,Blame or
Manipulate .
To be abusive there must be a consistent pattern of abusive words and bullying behaviours that Wear down a person’s Self-esteem and Undermine Their mental health.
Most common in married relationships,
Mental or emotional abuse can occur in any relationship—including among
Friends
Family members and
Co-workers
Attachment-related patterns that differ between individuals are commonly called "attachment styles."
There seems to be an association between a person’s attachment characteristics early in life and in adulthood, but the correlations are far from perfect.
Many adults feel secure in their relationships and comfortable depending on others (echoing “secure” attachment in children).
Others tend to feel anxious about their connection with close others—or prefer to avoid getting close to them in the first place (echoing “insecure” attachment in children).
Borderline personality disorder, characterized by a longing for intimacy and a hypersensitivity to rejection, have shown a high prevalence and severity of insecure attachment.
Attachment styles in adulthood (similar to attachment patterns in children):
Secure
Anxious-preoccupied (high anxiety, low avoidance)
Dismissing-avoidant (low anxiety, high avoidance)
Fearful-avoidant (high anxiety, high avoidance)
Conduct disorder is an ongoing pattern of behaviour marked by emotional and behavioural problems.
Ways in which Children with conduct disorder behave are
Angry,
Aggressive,
Argumentative, and
Disruptive ways.
It is a diagnosable mental health condition that is characterized by patterns of violating
Societal norms and
Rights of others
It's estimated that around 3% of school-aged children have conduct disorder and require professional treatment .
It is more common in boys than in girls.
Oppositional defiant disorder (ODD) is a psychiatric disorder that typically emerges in childhood, between ages 6 and 8, and can last throughout adulthood.
ODD is more than just normal childhood tantrums
Frequency and severity of ODD causes difficulty at home and at school.
Children with ODD also struggle with learning problems related to their behavior.
Two types of oppositional defiant disorder:
Childhood-onset ODD:
Present from an early age
Requires early intervention and treatment to prevent it from progressing into a more serious conduct disorder
Adolescent-onset ODD:
Begins suddenly in the middle- and high-school years, causing conflict at home and in school
There have been at least 13 different types of intelligence that have been identified so far.
These different ways of being smart can help people perform in different areas from their personal life, business, to sports and relationships.
Attachment is an emotional bond with another person. John Bowlby described attachment as a "lasting psychological connectedness between human beings.“
Earliest bonds formed by children (with caregivers) have a tremendous impact that continues throughout life and Attachment so developed
Serves to keep the infant close to the mother, thus improving the child's chances of survival.
Are innate drive Children are born with and is a product of evolutionary processes
Emerges and are regulated through the process of natural selection,
Are characterized by clear behavioural and motivation patterns.
Nurturance and responsiveness were the primary determinants of attachment.
Children who maintained proximity to an attachment figure were more likely to
Receive comfort and protection, and
More likely to survive to adulthood.
This document discusses two defense mechanisms: splitting and projective identification. Splitting involves viewing oneself or others in an all-good or all-bad way without integrating both positive and negative qualities. It serves to minimize anxiety about how others may view one. Projective identification involves projecting one's own unacceptable feelings onto others and perceiving them as the source, while still being aware of the original feelings. It often induces the feelings in others that were initially projected. Both defenses allow avoidance of anxiety but maintain inflexible and distorted perceptions.
e-RUPI is a cashless and contactless digital payment solution launched by NPCI in partnership with several entities. It involves the generation of an e-voucher that is shared with beneficiaries via SMS or QR code to enable them to redeem the voucher value for a specific good or service without cards, apps or accounts. e-RUPI streamlines targeted delivery of benefits, reduces costs associated with physical voucher distribution, and maintains user privacy by avoiding the need for personal details during redemption at participating merchant locations.
The term ‘Moonlighting’ became popular in America when people started working a second job in addition to their regular 9-to-5 jobs. Since the rise of the work-from-home concept during the pandemic, employees got free time after work hours. While some took up their hobby in their free time, others started searching for part-time jobs. Especially in the IT industry, employees took up two jobs simultaneously and took advantage of the remote working model. This concept of working for two companies/organisations is referred to as moonlighting.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
1. AN INITIATIVE OF SHIVNANDANI INDUSTRIES PVT LTD AND JAGDAMB JANAKI NAWAL JANAKI
SOCIETY
Cyber law and Cyber crime in India
CompiledbyCol Mukteshwar Prasad(Retd), MTech,CE(I),FIE(I),FIETE,FISLE,FInstOD,AMCSI
Contact -9007224278, e-mail –muktesh_prasad@yahoo.co.in
for book ”DecodingServicesSelectionBoard” and SSB guidance and training at Shivnandani Edu and
Defence Academy
7/2/2015
2. An Overview Of Cyber Laws vs. Cyber Crimes: In Indian Perspective
Due to immense increase in the use of Internet and dependency of individuals in every field, a
number of new crimes related to Computer and other gadgets based on internet have evolved in
the society. Such crimes where use of computers coupled with the use of Internet is involved are
broadly termed as Cyber Crimes.
Governing Laws
There was no statute in India for governing Cyber Laws involving privacy issues, jurisdiction
issues, intellectual property rights issues and a number of other legal questions. With the
tendency of misusing of technology, there arisen a need of strict statutory laws to regulate the
criminal activities in the cyber world and to protect the true sense of technology
"INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] was enacted by Parliament of
India to protect the field of e-commerce, e-governance, e-banking as well as penalties and
punishments in the field of cyber crimes. The above Act was further amended in the form of IT
Amendment Act, 2008 [ITAA-2008].
The ITA-2000 defines 'Computer' means any electronic magnetic, optical or other high-speed
data processing device or system which performs logical, arithmetic, and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input, output,
processing, storage, computer software, or communication facilities which are connected or
related to the computer in a computer system or computer network. The word 'computer' and
'computer system' have been so widely defined and interpreted to mean any electronic device
with data processing capability, performing computer functions like logical, arithmetic and
memory functions with input, storage and output capabilities and therefore any high-end
programmable gadgets like even a washing machine or switches and routers used in a network
can all be brought under the definition.
Scope and applicability
The scope and applicability of ITA-2000 was increased by its amendment in 2008. The word
'communication devices' inserted having an inclusive definition, taking into its coverage cell
phones, personal digital assistance or such other devices used to transmit any text, video etc like
what was later being marketed as iPad or other similar devices on Wi-fi and cellular models.
Though ITA- 2000 defined 'digital signature', however said definition was incapable to cater
needs of hour and therefore the term 'Electronic signature' was introduced and defined in the
ITAA -2008 as a legally valid mode of executing signatures. This includes digital signatures as
one of the modes of signatures and is far broader in ambit covering biometrics and other new
forms of creating electronic signatures not confining the recognition to digital signature process
alone.
The new amendment has replaced Section 43 with Section 66. The Word "hacking" used in
Section 66 of earlier Act has been removed and named as "data theft" in this section and has
further been widened in the form of Sections 66A to 66F. The section covers the offences such as
the sending of offensive messages through communication service, misleading the recipient of
3. the origin of such messages, dishonestly receiving stolen computers or other communication
device, stealing electronic signature or identity such as using another persons' password or
electronic signature, cheating by personation through computer resource or a communication
device, publicly publishing the information about any person's location without prior permission
or consent, cyber terrorism, the acts of access to a commuter resource without authorization,
such acts which can lead to any injury to any person or result in damage or destruction of any
property, while trying to contaminate the computer through any virus like Trojan etc. The
offences covered under section 66 are cognizable and non-bailable. Whereas, the consequence of
Section 43 of earlier Act were Civil in nature having its remedy in the form of damages and
compensation only, but under Section 66 of the Amendment Act, if such act is done with
criminal intention that is mens rea, then it will attract criminal liability having remedy in
imprisonment or fine or both.
Adjudication
Adjudication powers and procedures have been dealt in Sections 46 and thereafter. As per the
Act, the Central Government may appoint any officer not below the rank of a director to the
Government of India or a state Government as the adjudicator. The I.T. Secretary in any state is
normally the nominated Adjudicator for all civil offences arising out of data thefts and resultant
losses in the particular state. Very few applications were received during first 10 years of
existence of the ITA, that too in the major metros only. However, the trend of receiving
complaint under ITA is rapidly growing. The first adjudication obtained under this provision was
in Chennai, Tamil Nadu, in a case involving ICICI Bank in which the bank was told to
compensate the applicant with the amount wrongfully debited in Internet Banking, along with
cost and damages. There is an appellate procedure under this process and the composition of
Cyber Appellate Tribunal at the national level, has also been described in the Act. Every
adjudicating officer has the powers of a civil court and the Cyber Appellate Tribunal has the
powers vested in a civil court under the Code of Civil Procedure.
The major Acts , which got amended after enactment of ITA
The Indian Penal Code, 1860
The Indian Penal Code was amended by inserting the word 'electronic' thereby treating the
electronic records and documents on a par with physical records and documents. The Sections
dealing with false entry in a record or false document etc (e.g. 192, 204, 463, 464, 464, 468 to
470, 471, 474, 476 etc) have since been amended as 'electronic record and electronic document'
thereby bringing within the ambit of IPC. Now, electronic record and electronic documents has
been treated just like physical records and documents during commission of acts of forgery or
falsification of physical records in a crime. After the above amendment, the investigating
agencies file the cases/ charge-sheet quoting the relevant sections from IPC under section
463,464, 468 and 469 read with the ITA/ITAA under Sections 43 and 66 in like offences to
ensure the evidence and/or punishment can be covered and proved under either of these or under
both legislation.
The Indian Evidence Act 1872
4. Prior to enactment of ITA, all evidences in a court were in the physical form only. After
existence of ITA, the electronic records and documents were recognized. The definition part of
Indian Evidence Act was amended as "all documents including electronic records" were
substituted. Other words e.g. 'digital signature', 'electronic form', 'secure electronic record'
'information' as used in the ITA, were also inserted to make them part of the evidentiary
importance under the Act. The important amendment was seen by recognition of admissibility of
electronic records as evidence as enshrined in Section 65B of the Act.
The Bankers' Books Evidence (BBE) Act 1891:
Before passing of ITA, a bank was supposed to produce the original ledger or other physical
register or document during evidence before a Court. After enactment of ITA, the definitions part
of the BBE Act stood amended as: "'bankers ' books' include ledgers, day-books, cashbooks,
account-books and all other books used in the ordinary business of a bank whether kept in the
written form or as printouts of data stored in a floppy, disc, tape or any other form of electro-
magnetic data storage device". When the books consist of printouts of data stored in a floppy,
disc, tape etc, a printout of such entry ...certified in accordance with the provisions ....to the
effect that it is a printout of such entry or a copy of such printout by the principal accountant or
branch manager; and (b) a certificate by a person in-charge of computer system containing a
brief description of the computer system and the particulars of the safeguards adopted by the
system to ensure that data is entered or any other operation performed only by authorized
persons; the safeguards adopted to prevent and detect unauthorized change of data ...to retrieve
data that is lost due to systemic failure or ....
The above amendment in the provisions in Bankers Books Evidence Act recognized the printout
from a computer system and other electronic document as a valid document during course of
evidence, provided, such print-out or electronic document is accompanied by a certificate in
terms as mentioned above.
Issues not covered under ITA
ITA and ITAA is though landmark first step and became mile-stone in the technological growth
of the nation; however the existing law is not sufficed. Many issues in Cyber crime and many
crimes are still left uncovered.
Territorial Jurisdiction is a major issue which is not satisfactorily addressed in the ITA or ITAA.
Jurisdiction has been mentioned in Sections 46, 48, 57 and 61 in the context of adjudication
process and the appellate procedure connected with and again in Section 80 and as part of the
police officers' powers to enter, search a public place for a cyber crime etc. Since cyber crimes
are basically computer based crimes and therefore if the mail of someone is hacked in one place
by accused sitting far in another state, determination of concerned P.S., who will take cognizance
is difficult. It is seen that the investigators generally try to avoid accepting such complaints on
the grounds of jurisdiction. Since the cyber crime is geography-agnostic, borderless, territory-
free and generally spread over territories of several jurisdiction; it is needed to proper training is
to be given to all concerned players in the field.
5. Preservation of evidence is also big issue. It is obvious that while filing cases under IT Act, very
often, chances to destroy the necessary easily as evidences may lie in some system like the
intermediaries' computers or sometimes in the opponent's computer system too.
However, most of the cyber crimes in the nation are still brought under the relevant sections of
IPC read with the comparative sections of ITA or the ITAA which gives a comfort factor to the
investigating agencies that even if the ITA part of the case is lost, the accused cannot escape
from the IPC part.
Conclusion
Society as on today is happening more and more dependent upon technology and crime based on
electronic offences are bound to increase. Endeavor of law making machinery of the nation
should be in accordance with mile compared to the fraudsters, to keep the crimes lowest. Hence,
it should be the persistent efforts of rulers and law makers to ensure that governing laws of
technology contains every aspect and issues of cyber crime and further grow in continuous and
healthy manner to keep constant vigil and check over the related crimes.
Cyber Law of India : Introduction
In Simple way we can say that cyber crime is unlawful acts wherein the computer is
either a tool or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as
theft, fraud, forgery, defamation and mischief, all of which are subject to the
Indian Penal Code. The abuse of computers has also given birth to a gamut of new
age crimes that are addressed by the Information Technology Act, 2000.
We can categorize Cyber crimes in two ways
1.The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
2.The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.
Technical Aspects
Technological advancements have created new possibilities for criminal activity, in
particular the criminal misuse of information technologies such as
6. a. Unauthorized access & Hacking:-
Access means gaining entry into, instructing or communicating with the logical,
arithmetical, or memory function resources of a computer, computer system or
computer network.
Unauthorized access would therefore mean any kind of access without the permission
of either the rightful owner or the person in charge of a computer, computer system
or computer network.
Every act committed towards breaking into a computer and/or network is hacking.
Hackers write or use ready-made computer programs to attack the target computer.
They possess the desire to destruct and they get the kick out of such destruction.
Some hackers hack for personal monetary gains, such as to stealing the credit card
information, transferring money from various bank accounts to their own account
followed by withdrawal of money.
By hacking web server taking control on another persons website called as web
hijacking
b. Trojan Attack:-
The program that act like something useful but do the things that are quiet damping.
The programs of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server part. When the victim
(unknowingly) runs the server on its machine, the attacker will then use the Client to
connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some
functions of the trojans use the UDP protocol as well.
c. Virus and Worm attack:-
A program that has capability to infect other programs and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are called
as worms.
d. E-mail & IRC related crimes:-
1. Email spoofing
7. Email spoofing refers to email that appears to have been originated from one source
when it was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users -
similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by
sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email
message to a particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbalâ; attacks, clone attacks, and flood
attacks.
e. Denial of Service attacks:-
Flooding a computer resource with more requests than it can handle. This causes the
resource to crash thereby denying access of service to authorized users.
Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to
a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
8. Distributed DOS
A distributed denial of service (DoS) attack is accomplished by using
the Internet to break into computers and using them to attack a network.
Hundreds or thousands of computer systems across the Internet can be
turned into “zombies” and used to attack another system or website.
Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like
NW bandwith, RAM, CPU time. Even power, cool air, or water can
affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components
e. Pornography:-
The literal mining of the term 'Pornography' is “describing or showing
sexual acts in order to cause sexual excitement through books, films,
etc.”
This would include pornographic websites; pornographic material
produced using computers and use of internet to download and transmit
pornographic videos, pictures, photos, writings etc.
Adult entertainment is largest industry on internet.There are more than
420 million individual pornographic webpages today.
Research shows that 50% of the web-sites containing potentially illegal
contents relating to child abuse were ‘Pay-Per-View’. This indicates
that abusive images of children over Internet have been highly
commercialized.
Pornography delivered over mobile phones is now a burgeoning
business, “driven by the increase in sophisticated services that deliver
video clips and streaming video, in addition to text and images.”
Effects of Pornography
Research has shown that pornography and its messages are involved in
shaping attitudes and encouraging behavior that can harm individual
9. users and their families.
Pornography is often viewed in secret, which creates deception within
marriages that can lead to divorce in some cases.
In addition, pornography promotes the allure of adultery, prostitution
and unreal expectations that can result in dangerous promiscuous
behavior.
Some of the common, but false messages sent by sexualized culture.
Sex with anyone, under any circumstances, any way it is desired, is
beneficial and does not have negative consequences.
Women have one value - to meet the sexual demands of men.
Marriage and children are obstacles to sexual fulfillment.
Everyone is involved in promiscuous sexual activity, infidelity and
premarital sex.
Pornography Addiction
Dr. Victor Cline, an expert on Sexual Addiction, found that there is a
four-step progression among many who consume pornography.
1.Addiction: Pornography provides a powerful sexual stimulant or
aphrodisiac effect, followed by sexual release, most often through
masturbation.
2.Escalation: Over time addicts require more explicit and deviant
material to meet their sexual "needs."
3.Desensitization: What was first perceived as gross, shocking and
disturbing, in time becomes common and acceptable.
4.Acting out sexually: There is an increasing tendency to act out
behaviors viewed in pornography.
g. Forgery:-
Counterfeit currency notes, postage and revenue stamps, mark sheets
etc can be forged using sophisticated computers, printers and scanners.
10. Also impersonate another person is considered forgery.
h. IPR Violations:-
These include software piracy, copyright infringement, trademarks
violations, theft of computer source code, patent violations. etc.
Cyber Squatting- Domain names are also trademarks and protected by
ICANN’s domain dispute resolution policy and also under trademark
laws.
Cyber Squatters registers domain name identical to popular service
provider’s domain so as to attract their users and get benefit from it.
i. Cyber Terrorism:-
Targeted attacks on military installations, power plants, air traffic
control, banks, trail traffic control, telecommunication networks are the
most likely targets. Others like police, medical, fire and rescue systems
etc.
Cyberterrorism is an attractive option for modern terrorists for several
reasons.
1.It is cheaper than traditional terrorist methods.
2.Cyberterrorism is more anonymous than traditional terrorist methods.
3.The variety and number of targets are enormous.
4.Cyberterrorism can be conducted remotely, a feature that isespecially
appealing to terrorists.
5.Cyberterrorism has the potential to affect directly a larger number of
people.
j. Banking/Credit card Related crimes:-
In the corporate world, Internet hackers are continually looking for
opportunities to compromise a company’s security in order to gain
access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small
amount of money from all customer accounts and adding it to own
11. account also called as salami.
k. E-commerce/ Investment Frauds:-
Sales and Investment frauds. An offering that uses false or fraudulent
claims to solicit investments or loans, or that provides for the purchase,
use, or trade of forged or counterfeit securities.
Merchandise or services that were purchased or contracted by
individuals online are never delivered.
The fraud attributable to the misrepresentation of a product advertised
for sale through an Internet auction site or the non-delivery of products
purchased through an Internet auction site.
Investors are enticed to invest in this fraudulent scheme by the promises
of abnormally high profits.
l. Sale of illegal articles:-
This would include trade of narcotics, weapons and wildlife etc., by
posting information on websites, auction websites, and bulletin boards
or simply by using email communication.
Research shows that number of people employed in this criminal area.
Daily peoples receiving so many emails with offer of banned or illegal
products for sale.
m. Online gambling:-
There are millions of websites hosted on servers abroad, that offer
online gambling. In fact, it is believed that many of these websites are
actually fronts for money laundering.
n. Defamation: -
Defamation can be understood as the intentional infringement of
another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of
computers and / or the Internet. E.g. someone publishes defamatory
matter about someone on a website or sends e-mails containing
defamatory information to all of that person's friends. Information
posted to a bulletin board can be accessed by anyone. This means that
anyone can place
12. Cyber defamation is also called as Cyber smearing.
Cyber Stacking:-
Cyber stalking involves following a persons movements across the
Internet by posting messages (sometimes threatening) on the bulletin
boards frequented by the victim, entering the chat-rooms frequented by
the victim, constantly bombarding the victim with emails etc.
In general, the harasser intends to cause emotional distress and has no
legitimate purpose to his communications.
p. Pedophiles:-
Also there are persons who intentionally prey upon children. Specially
with a teen they will let the teen know that fully understand the feelings
towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or
indecent acts.
Pedophiles lure the children by distributing pornographic material, then
they try to meet them for sex or to take their nude photographs
including their engagement in sexual positions.
q. Identity Theft :-
Identity theft is the fastest growing crime in countries like America.
Identity theft occurs when someone appropriates another's personal
information without their knowledge to commit theft or fraud.
Identity theft is a vehicle for perpetrating other types of fraud schemes.
r. Data diddling:-
Data diddling involves changing data prior or during input into a
computer.
In other words, information is changed from the way it should be
entered by a person typing in the data, a virus that changes data, the
programmer of the database or application, or anyone else involved in
the process of having information stored in a computer file.
It also include automatic changing the financial information for some
13. time before processing and then restoring original information.
s. Theft of Internet Hours:-
Unauthorized use of Internet hours paid for by another person.
By gaining access to an organisation's telephone switchboard (PBX)
individuals or criminal organizations can obtain access to dial-in/dial-
out circuits and then make their own calls or sell call time to third
parties.
Additional forms of service theft include capturing 'calling card' details
and on-selling calls charged to the calling card account, and
counterfeiting or illicit reprogramming of stored value telephone cards.
t. Theft of computer system(Hardware):-
This type of offence involves the theft of a computer, some part(s) of a
computer or a peripheral attached to the computer.
u. Physically damaging a computer system:-
Physically damaging a computer or its peripheralseither by shock, fire
or excess electric supply etc.
v. Breach of Privacy and Confidentiality
Privacy
Privacy refers to the right of an individual/s to determine when, how
and to what extent his or her personal data will be shared with others.
Breach of privacy means unauthorized use or distribution or disclosure
of personal information like medical records, sexual preferences,
financial status etc.
Confidentiality
It means non disclosure of information to unauthorized or unwanted
persons.
In addition to Personal information some other type of information
which useful for business and leakage of such information to other
persons may cause damage to business or person, such information
should be protected.
14. Generally for protecting secrecy of such information, parties while
sharing information forms an agreement about he procedure of handling
of information and to not to disclose such information to third parties or
use it in such a way that it will be disclosed to third parties.
Many times party or their employees leak such valuable information for
monitory gains and causes breach of contract of confidentiality.
Special techniques such as Social Engineering are commonly used to
obtain confidential information.