Standard ethical procedures for data recovery include identifying incidents, preparing an investigation by selecting tools and authorization, collecting evidence in a well-defined manner that minimizes system impact, and presenting evidence ethically in court. Cyber crimes include hacking, cracking, software piracy, mail bombs, and bug exploits that damage systems. The Information Technology Act of 2000 defines key terms and aims to regulate electronic transactions and cyber crimes, establishing India's cyber law regime.