This document provides an overview of online financial fraud, cyber laws in India, and how to file a cybercrime complaint. It discusses common types of online financial fraud like phishing and lottery scams. It also summarizes key aspects of cyber laws in India like the Information Technology Act and sections of the Indian Penal Code related to cybercrimes. Regarding filing complaints, it outlines steps to register complaints with local police or online through the National Cybercrime Reporting Portal and types of information and documents required.
Entry of E-commerce in the business scenario has changed the rules of the game and it has affected the economic relations between and within different countries and companies.
Hence, it becomes very important to create a policy and regulatory environment that favors the development of e-commerce and harmonizes national approaches in diverse areas such as telecommunications, trade, intellectual property, privacy etc.
So, here weâll discuss about legal and policy issues which are associated with e-commerce along with the laws and environments effective to deal with them, with special reference to the laws applicable in India.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
Â
In this power point I clearly explain about the information technology act, uses of information technology, what is digital signature and how the information technology act going to punish the cybercriminals? And the different kinds of punishment also explain under the power point. And I hope it will every helpful to you people to learn about information technology.
Even tho Pi network is not listed on any exchange yet.
Buying/Selling or investing in pi network coins is highly possible through the help of vendors. You can buy from vendors[ buy directly from the pi network miners and resell it]. I will leave the telegram contact of my personal vendor.
@Pi_vendor_247
Entry of E-commerce in the business scenario has changed the rules of the game and it has affected the economic relations between and within different countries and companies.
Hence, it becomes very important to create a policy and regulatory environment that favors the development of e-commerce and harmonizes national approaches in diverse areas such as telecommunications, trade, intellectual property, privacy etc.
So, here weâll discuss about legal and policy issues which are associated with e-commerce along with the laws and environments effective to deal with them, with special reference to the laws applicable in India.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
Â
In this power point I clearly explain about the information technology act, uses of information technology, what is digital signature and how the information technology act going to punish the cybercriminals? And the different kinds of punishment also explain under the power point. And I hope it will every helpful to you people to learn about information technology.
Even tho Pi network is not listed on any exchange yet.
Buying/Selling or investing in pi network coins is highly possible through the help of vendors. You can buy from vendors[ buy directly from the pi network miners and resell it]. I will leave the telegram contact of my personal vendor.
@Pi_vendor_247
how can I sell pi coins after successfully completing KYCDOT TECH
Â
Pi coins is not launched yet in any exchange đą this means it's not swappable, the current pi displaying on coin market cap is the iou version of pi. And you can learn all about that on my previous post.
RIGHT NOW THE ONLY WAYÂ you can sell pi coins is through verified pi merchants. A pi merchant is someone who buys pi coins and resell them to exchanges and crypto whales. Looking forward to hold massive quantities of pi coins before the mainnet launch.
This is because pi network is not doing any pre-sale or ico offerings, the only way to get my coins is from buying from miners. So a merchant facilitates the transactions between the miners and these exchanges holding pi.
I and my friends has sold more than 6000 pi coins successfully with this method. I will be happy to share the contact of my personal pi merchant. The one i trade with, if you have your own merchant you can trade with them. For those who are new.
Message: @Pi_vendor_247 on telegram.
I wouldn't advise you selling all percentage of the pi coins. Leave at least a before so its a win win during open mainnet. Have a nice day pioneers âĽď¸
#kyc #mainnet #picoins #pi #sellpi #piwallet
#pinetwork
how to swap pi coins to foreign currency withdrawable.DOT TECH
Â
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
when will pi network coin be available on crypto exchange.DOT TECH
Â
There is no set date for when Pi coins will enter the market.
However, the developers are working hard to get them released as soon as possible.
Once they are available, users will be able to exchange other cryptocurrencies for Pi coins on designated exchanges.
But for now the only way to sell your pi coins is through verified pi vendor.
Here is the telegram contact of my personal pi vendor
@Pi_vendor_247
Exploring Abhay Bhutadaâs Views After Poonawalla Fincorpâs Collaboration With...beulahfernandes8
Â
The financial landscape in India has witnessed a significant development with the recent collaboration between Poonawalla Fincorp and IndusInd Bank.
The launch of the co-branded credit card, the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card, marks a major milestone for both entities.
This strategic move aims to redefine and elevate the banking experience for customers.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
how to sell pi coins at high rate quickly.DOT TECH
Â
Where can I sell my pi coins at a high rate.
Pi is not launched yet on any exchange. But one can easily sell his or her pi coins to investors who want to hold pi till mainnet launch.
This means crypto whales want to hold pi. And you can get a good rate for selling pi to them. I will leave the telegram contact of my personal pi vendor below.
A vendor is someone who buys from a miner and resell it to a holder or crypto whale.
Here is the telegram contact of my vendor:
@Pi_vendor_247
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfpchutichetpong
Â
The U.S. economy is continuing its impressive recovery from the COVID-19 pandemic and not slowing down despite re-occurring bumps. The U.S. savings rate reached its highest ever recorded level at 34% in April 2020 and Americans seem ready to spend. The sectors that had been hurt the most by the pandemic specifically reduced consumer spending, like retail, leisure, hospitality, and travel, are now experiencing massive growth in revenue and job openings.
Could this growth lead to a âRoaring Twentiesâ? As quickly as the U.S. economy contracted, experiencing a 9.1% drop in economic output relative to the business cycle in Q2 2020, the largest in recorded history, it has rebounded beyond expectations. This surprising growth seems to be fueled by the U.S. governmentâs aggressive fiscal and monetary policies, and an increase in consumer spending as mobility restrictions are lifted. Unemployment rates between June 2020 and June 2021 decreased by 5.2%, while the demand for labor is increasing, coupled with increasing wages to incentivize Americans to rejoin the labor force. Schools and businesses are expected to fully reopen soon. In parallel, vaccination rates across the country and the world continue to rise, with full vaccination rates of 50% and 14.8% respectively.
However, it is not completely smooth sailing from here. According to M Capital Group, the main risks that threaten the continued growth of the U.S. economy are inflation, unsettled trade relations, and another wave of Covid-19 mutations that could shut down the world again. Have we learned from the past year of COVID-19 and adapted our economy accordingly?
âIn order for the U.S. economy to continue growing, whether there is another wave or not, the U.S. needs to focus on diversifying supply chains, supporting business investment, and maintaining consumer spending,â says Grace Feeley, a research analyst at M Capital Group.
While the economic indicators are positive, the risks are coming closer to manifesting and threatening such growth. The new variants spreading throughout the world, Delta, Lambda, and Gamma, are vaccine-resistant and muddy the predictions made about the economy and health of the country. These variants bring back the feeling of uncertainty that has wreaked havoc not only on the stock market but the mindset of people around the world. MCG provides unique insight on how to mitigate these risks to possibly ensure a bright economic future.
how to sell pi coins in South Korea profitably.DOT TECH
Â
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the telegram id of my personal pi merchant who i trade pi with.
Tele gram: @Pi_vendor_247
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
USDA Loans in California: A Comprehensive Overview.pptxmarketing367770
Â
USDA Loans in California: A Comprehensive Overview
If you're dreaming of owning a home in California's rural or suburban areas, a USDA loan might be the perfect solution. The U.S. Department of Agriculture (USDA) offers these loans to help low-to-moderate-income individuals and families achieve homeownership.
Key Features of USDA Loans:
Zero Down Payment: USDA loans require no down payment, making homeownership more accessible.
Competitive Interest Rates: These loans often come with lower interest rates compared to conventional loans.
Flexible Credit Requirements: USDA loans have more lenient credit score requirements, helping those with less-than-perfect credit.
Guaranteed Loan Program: The USDA guarantees a portion of the loan, reducing risk for lenders and expanding borrowing options.
Eligibility Criteria:
Location: The property must be located in a USDA-designated rural or suburban area. Many areas in California qualify.
Income Limits: Applicants must meet income guidelines, which vary by region and household size.
Primary Residence: The home must be used as the borrower's primary residence.
Application Process:
Find a USDA-Approved Lender: Not all lenders offer USDA loans, so it's essential to choose one approved by the USDA.
Pre-Qualification: Determine your eligibility and the amount you can borrow.
Property Search: Look for properties in eligible rural or suburban areas.
Loan Application: Submit your application, including financial and personal information.
Processing and Approval: The lender and USDA will review your application. If approved, you can proceed to closing.
USDA loans are an excellent option for those looking to buy a home in California's rural and suburban areas. With no down payment and flexible requirements, these loans make homeownership more attainable for many families. Explore your eligibility today and take the first step toward owning your dream home.
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Cardnickysharmasucks
Â
The unveiling of the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card marks a notable milestone in the Indian financial landscape, showcasing a successful partnership between two leading institutions, Poonawalla Fincorp and IndusInd Bank. This co-branded credit card not only offers users a plethora of benefits but also reflects a commitment to innovation and adaptation. With a focus on providing value-driven and customer-centric solutions, this launch represents more than just a new productâit signifies a step towards redefining the banking experience for millions. Promising convenience, rewards, and a touch of luxury in everyday financial transactions, this collaboration aims to cater to the evolving needs of customers and set new standards in the industry.
The secret way to sell pi coins effortlessly.DOT TECH
Â
Well as we all know pi isn't launched yet. But you can still sell your pi coins effortlessly because some whales in China are interested in holding massive pi coins. And they are willing to pay good money for it. If you are interested in selling I will leave a contact for you. Just telegram this number below. I sold about 3000 pi coins to him and he paid me immediately.
Telegram: @Pi_vendor_247
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...Quotidiano Piemontese
Â
Turin Startup Ecosystem 2024
Una ricerca de il Club degli Investitori, in collaborazione con ToTeM Torino Tech Map e con il supporto della ESCP Business School e di Growth Capital
how can i use my minded pi coins I need some funds.DOT TECH
Â
If you are interested in selling your pi coins, i have a verified pi merchant, who buys pi coins and resell them to exchanges looking forward to hold till mainnet launch.
Because the core team has announced that pi network will not be doing any pre-sale. The only way exchanges like huobi, bitmart and hotbit can get pi is by buying from miners.
Now a merchant stands in between these exchanges and the miners. As a link to make transactions smooth. Because right now in the enclosed mainnet you can't sell pi coins your self. You need the help of a merchant,
i will leave the telegram contact of my personal pi merchant below. đ I and my friends has traded more than 3000pi coins with him successfully.
@Pi_vendor_247
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Â
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the worldâs largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
2. ⢠Fraud:
Fraud essentially involves using deception to make a personal gain dishonestly for oneself
and/or create a loss for another.
Fraud would also mean unlawful acts wherein the equipment transforming the information be
it a computer or a mobile is either a tool or a target or both.
As per Section 17 of the Indian Contract Act, 1872, âFraudâ means and includes any of the
following acts committed by a party to a contract, or with his connivance, or by his agent,
with intent to deceive another party thereto or his agent, or to induce him to enter into the
contract:
⢠the suggestion, as a fact, of that which is not true, by one who does not believe it to be
true;
⢠the active concealment of a fact by one having knowledge or belief of the fact;
⢠a promise made without any intention of performing it;
⢠any other act fitted to deceive;
⢠any such act or omission as the law specially declares to be fraudulent.
3. ď Types of online financial fraud:
⢠Assured approval of a credit card loan: email scams that tell you to pay an upfront fee and that assures to give you a loan or
credit card.
⢠Employment opportunities: they promise to give you an employment offer letter if you agree to pay a certain fee.
⢠Lottery scams: the email will say that you have won a lottery and you have to pay a processing fee.
⢠Phishing: the meaning of phishing is to get access to your confidential information like date of birth, credit card number,
passwords, etc. through email, SMS or calls.
⢠Free vacation: you may get an email saying that you have received a free vacation to an exotic location with a hotel room
booking. You will then be asked for payment later.
⢠Many other kinds of financial fraud: these days they hack your phone and transfer money
ď Need for cyberlaws in India:
⢠Almost all Indian companies have electronic records. A company may need this law to prevent the misuse of such data
⢠All the transactions associated with stocks are now executed in demat format, anyone who is involved with these transactions is
protected by cyber law in the event of any fraudulent transactions
⢠Various government forms are being filled out electronically, such as income tax returns and service tax returns
⢠Misuse of credit/debit cards
⢠Misuse of digital signatures and electronic contracts can be easily accomplished by anyone involved with them.
4. ⢠SYNOPSIS OF INFORMATION TECHNOLOGY ACT, 2000 (âIT Actâ)
⢠The Indian cyber law is governed by the IT Act. The principal impetus of this
Act is to offer reliable legal inclusiveness to eCommerce, facilitating registration
of real-time records with the Government.
The object of the IT Act is to provide legal recognition for transactions carried
out by means of electronic data interchange and other means of electronic
communication, commonly referred to as electronic methods of communication
and storage of information, to facilitate electronic filing of documents with the
Government agencies and further to amend the Indian Penal Code, the Indian
Evidence Act, 1872, the Bankerâs Book Evidence Act, 1891 and the Reserve
Bank of India Act, 1934 and for matters connected therewith or incidental
thereto.
⢠IT Act highlights the grievous penalties and sanctions that have been enacted
by the Parliament of India as a means to protect the e-governance, e-banking,
and e-commerce sectors. It is important to note that the IT Actâs scope has now
been broadened to include all the latest communication devices.
5. Provisions of IT Act
⢠The IT Act guides the entire Indian legislation to govern cyber crimes
rigorously:
⢠Section 43 - Applicable to people who damage the computer systems
without permission from the owner. The owner can fully claim
compensation for the entire damage in such cases.
⢠Section 66 - Applicable in case a person is found to dishonestly or
fraudulently commit any act referred to in section 43. The imprisonment
term in such instances can mount up to three years or a fine of up to Rs. 5
lakh.
⢠Section 66B - Incorporates the punishments for fraudulently receiving
stolen communication devices or computers, which confirms a probable
three years imprisonment. This term can also be topped by a Rs. 1 lakh
fine, depending upon the severity.
⢠Section 66C - This section scrutinizes the identity thefts related to
imposter digital signatures, hacking passwords, or other distinctive
identification features. If proven guilty, imprisonment of three years
might also be backed by a Rs.1 lakh fine.
⢠Section 66 D - This section was inserted on-demand, focusing on
punishing cheaters doing impersonation using computer resources.
6. ⢠Information Technology (The Indian Computer Emergency Response Team
and Manner of Performing Functions and Duties) Rules, 2013 (the CERT-In
Rules):
⢠There are several ways in which the CERT-In rules provide for the working of
CERT-In. In accordance with Rule 12 of the CERT-In rules, a 24-hour Incident
response helpdesk must be operational at all times. Individuals, organisations and
companies can report cybersecurity incidents to Cert-In if they are experiencing a
cybersecurity incident. The Rules provide an Annexure listing certain incidents that
must be reported to Cert-In immediately.
⢠Another requirement under Rule 12 is that service providers, intermediaries, data
centres, and corporate bodies inform CERT-In within a reasonable timeframe of
cybersecurity incidents. As a result of the Cert-In website, Cybersecurity Incidents
can be reported in various formats and methods, as well as information on
vulnerability reporting, and incident response procedures. In addition to reporting
cybersecurity incidents to CERT-In in accordance with its rules, Rule 3(1)(I) of the
Information Technology (Guidelines for Intermediaries and Digital Media Ethics
Code) Rules, 2021 also requires that all intermediaries shall disclose information
about cybersecurity incidents to CERT-In.
7. ⢠INDIAN PENAL CODE, 1860
⢠Section 420: This section talks about cheating and dishonestly inducing
delivery of property. Seven-year imprisonment in addition to a fine is
imposed under this section on cybercriminals doing crimes like creating fake
websites and cyber frauds. In this section of the IPC, crimes related to
password theft for fraud or the creation of fraudulent websites are involved.
⢠Section 463: This section involves falsifying documents or records
electronically. Spoofing emails is punishable by up to 7 years in prison
and/or a fine under this section.
⢠Section 465: This provision typically deals with the punishment for
forgery. Under this section, offences such as the spoofing of email and the
preparation of false documents in cyberspace are dealt with and punished
with imprisonment ranging up to two years, or both.
⢠Section 468: Fraud committed with the intention of cheating may result in
a seven-year prison sentence and a fine. This section also punishes email
spoofing.
8. ď RBI on consumer awareness of cyber threats and frauds
⢠RBI regularly publishes notifications urging the members of public to practice safe digital banking by taking all due
precautions, while carrying out any digital (online / mobile) banking / payment transactions.
⢠RBI has published a booklet for Banks & NBFCs to create awareness about the modus operandi adopted by fraudsters to
defraud public and mislead them. The booklet also lists down the precautions to be taken while carrying out financial transactions.
⢠The booklet lists modus operandi of various online frauds like phishing, frauds using online sales platforms or unknown mobile
apps, ATM card skimming, SIM cloning, scam through QR Code, fake advertisement extending loans, OTP based frauds, etc.
ď General precautions suggested by RBI
⢠Be aware of suspicious looking pop ups
⢠Always check for a secure payment gateway (https:// - URL with a pad lock symbol) before making online payments /
transactions
⢠Avoid saving card details on websites / devices / public laptop / desktops
⢠Turn on two-factor authentication where such facility is available
⢠Never open / respond to emails from unknown sources as these may contain suspicious attachment or phishing links
⢠Do not share copies of chequebook, KYC documents with strangers
9. RBI has also
suggested the
following actions to
be taken after
occurrence of a fraud:
Block not only the debit card / credit card but also freeze the debit in the bank account
linked to the card by visiting your branch or calling the official customer care number
available on the bankâs website. Also, check and ensure the safety of other banking
channels such as Net banking, Mobile banking etc., to prevent perpetuation of the fraud
once the debit/ credit cards, etc., are blocked following a fraud.
Dial helpline number 155260 or 1930 or report the incident on National Cybercrime
Reporting Portal (www.cybercrime.gov.in). Reset Mobile: Use (Setting-Reset-Factory
Data) to reset mobile if a fraud has occurred due to a data leak from mobile
10. ď Cyber crime & Security:
Cybersecurity can be defined as the collection of technologies, processes, and practices that are intended to prevent networks, devices,
programs, and data from being attacked, damaged or accessed by unauthorized persons. Alternatively, cyber security may also be referred to as
information technology security.
The following must be included in cybersecurity strategies:
⢠Ecosystem:
The ecosystem of an organisation needs to be strong in order to prevent cyber crime. By developing a safe and strong system, the organisation
would be likely to protect these components and could not be attacked by malware, attrition, hacks, insider attacks, and equipment thefts.
⢠Framework:
A framework for compliance with security standards is an assurity that can help to ensure that these standards are adhered to.
⢠IT Mechanisms:
End-to-end protection measures, association-based protection, link-based protection, and data encryption are a few of the measures.
⢠Infrastructure:
As part of cybersecurity, protecting the infrastructure is one of the most crucial steps. Cyber crime is often perpetrated against outdated
infrastructure.
11. Data Breach
1. Air India data breach highlights third-party risk
⢠Date: May 2021
⢠Impact: personal data of 4.5 million passengers worldwide
2. CAT applicantâs data leaked
⢠Date: May 2021
⢠Impact: 190,000 CAT applicantsâ personal details
3. BigBasket user data for sale online
⢠Date: October 2020
⢠Impact: 20 million user accounts
4. Unacademy data breach
⢠Date: May 2020
⢠Impact: 22 million user accounts
5. SBI data breach
⢠Date: January 2019
⢠Impact: three million text messages sent to customers divulged
12. Case studies:
1. Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr.
⢠The subscriber purchased a Reliance handset and Reliance mobile services. The subscriber was attracted by better tariff plans
of other service providers and hence wanted to shift to other service providers.
⢠The petitioners (staff members of TATA Indicom) hacked the Electronic Serial Number (âESNâ). The Mobile Identification
Number (MIN) of Reliance handsets were irreversibly integrated with ESN, the reprogramming of ESN made the device would
be validated by Petitionerâs service provider and not by Reliance Infocom.
Questions before the Court:
⢠i) Whether a telephone handset is a âComputerâ under Section 2(1)(i) of the IT Act?
⢠ii) Whether manipulation of ESN programmed into a mobile handset amounts to an alteration of source code under Section 65
of the IT Act?
⢠Decision: Section 2(1)(i) of the IT Act provides that a âcomputerâ means any electronic, magnetic, optical, or other high-speed
data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic,
magnetic, or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities
which are connected or related to the computer in a computer system or computer network. Hence, a telephone handset is covered
under the ambit of âcomputerâ as defined under Section 2(1)(i) of the IT Act.
⢠Alteration of ESN makes exclusively used handsets usable by other service providers like TATA Indicomm. Therefore,
alteration of ESN is an offence under Section 65 of the IT Act
13. 2. CBI v. Arif Azim (Sony Sambandh case)
⢠In May 2002, someone logged into the website www.sony-sambandh.com under the name of Barbara Campa and ordered
a Sony Colour TV set along with a cordless telephone for one Arif Azim in Noida. She paid through her credit card and the
said order was delivered to Arif Azim. However, the credit card agency informed the company that it was an unauthorized
payment as the real owner denied any such purchase.
⢠A complaint was therefore lodged with CBI and further, a case under Sections 418, 419, and 420 of the IPC was registered.
The investigations concluded that Arif Azim while working at a call center in Noida, got access to the credit card details of
Barbara Campa which he misused.
⢠The Court convicted Arif Azim but being a young boy and a first-time convict, the Courtâs approach was lenient towards
him. The Court released the convicted person on probation for 1 year.
⢠This was one among the landmark cases of Cyber Law because it displayed that the Indian Penal Code, 1860 can be an
effective legislation to rely on when the IT Act is not exhaustive.
14. 3. Pune Citibank Mphasis Call Center Fraud
⢠In 2005, US $ 3,50,000 were dishonestly transferred from the Citibank accounts of four US customers through the internet to
few bogus accounts. The employees gained the confidence of the customer and obtained their PINs under the impression that they
would be a helping hand to those customers to deal with difficult situations. They were not decoding encrypted software or
breathing through firewalls, instead, they identified loopholes in the MphasiS system
⢠The Court observed that the accused in this case are the ex-employees of the MphasiS call center. Therefore, it is clear that the
employees must have memorized the numbers. The service that was used to transfer the funds was SWIFT i.e. society for
worldwide interbank financial telecommunication. The crime was committed using unauthorized access to the electronic accounts
of the customers.
⢠The IT Act is broad enough to accommodate these aspects of crimes and any offense under the IPC with the use of electronic
documents can be put at the same level as the crimes with written documents.
⢠The court held that section 43(a) of the IT Act, 2000 is applicable because of the presence of the nature of unauthorized access
that is involved to commit transactions. The accused were also charged under section 66 of the IT Act, 2000 and section 420 i.e.
cheating, 465,467 and 471 of The Indian Penal Code, 1860.
15. ⢠Plea in Supreme Court seeking guidelines to curb online banking frauds:
⢠A writ petition in the SC has been filed seeking directions to the government to frame a legislative policy ensuring better
investigation of online banking frauds and constituting a special investigation team to deal with such matters.
⢠The petition seeks directions to the centre, RBI and other banks.
⢠The plea was filed by two petitioners, residents of UP and Delhi who became victims of online fraud while making online
payments for second-hand mobile phones advertised on OLX.
16. ⢠Register a complaint with the local police or cyber crime authorities. Both online and
offline
⢠In case the victim does not have access to any of the cybercrime cells, he or she can
lodge the FIR at the local police station under Section 154 of Code of Criminal
Procedure.
⢠If the police officer refuses to file the complaint of the victim, the victim can make the
written complaint to the Judicial Magistrate of his/her district who in turn can direct the
police officer to commence the investigation.
⢠inform the bank immediately.
ď Procedure for filing:
The written complaint shall be addressed to the Head of the Cybercrime Cell and shall be
accompanied with the following information of the victim or person registering the
complaint:
⢠Name,
⢠Contact details, and
⢠Mailing address.
⢠Other documents which are required to be attached with the complaint depends upon the
type of cybercrime committed against the victim. It is necessary to attach these
documents with the offline as well as with the online complaint.
How to file a cybercrime
complaint:
17. ď Filing complaint on the portal:
⢠The cybercrime complaints can be registered on National Cyber Crime
Reporting Portal which is the initiative of the Government of India to
facilitate the nation-wide cybercrime complaints.
⢠Visit www.cybercrime.gov.in/ to file a complaint
⢠After registering on the portal, details of the incident are to be provided.
⢠The portal is so effective that it provides the different categories of
complaint which includes Online and social media related crime,
Hacking, Online Cyber Trafficking, Online Gambling, Ransomware,
Cryptocurrency crime, Cyber Terrorism, and any other related crime.
⢠Once all the details are provided along with any evidence or proof of the
suspect or the crime committed by him, the complaint is registered and
you receive the tracking ID of the reported crime.