SlideShare a Scribd company logo
1 of 31
Cyber Law & Crime
(Information Technology Act,2000)
(by Swant Anand)
INTRODUCTION
• The virtual world of internet is known as cyberspace.
• The laws governing this area are known as Cyber laws.
• All the netizens of this space come under the ambit of these laws as it carries a kind of
universal jurisdiction.
• Cyber law can also be described as that branch of law that deals with legal issues
related to use of inter-networked information technology.
• Basically, cyber law is the law governing computers and the internet.
• The growth of Electronic Commerce has propelled the need for vibrant and effective
regulatory mechanisms which would further strengthen the legal infrastructure, so
crucial to the success of Electronic Commerce.
• All these regulatory mechanisms and legal infrastructures come within the domain of
Cyber law.
Need for Cyber law
• In today’s techno-savvy environment, the world is becoming more and more digitally
sophisticated and so are the crimes.
• Internet was initially developed as a research and information sharing tool and was in
an unregulated manner.
• As the time passed by it became more transactional with e-business, e-commerce, e-
governance and e-procurement etc.
• All legal issues related to internet crime are dealt with through cyber laws.
• In today's highly digitalized world, almost everyone is affected by cyber law. For
example:
• Almost all transactions in shares are in demat form.
• Almost all companies extensively depend upon their computer networks and keep their
valuable data in electronic form.
• Government forms including income tax returns, company law forms etc. are now filled
in electronic form.
• Consumers are increasingly using credit cards for shopping.
• Most people are using email, cell phones and SMS messages for communication.
Need for Cyber law (Cont.)
• Even in "non-cyber crime" cases, important evidence is found in computers / cell
phones e.g. in cases of divorce, murder, kidnapping, tax evasion, organized crime,
terrorist operations, counterfeit currency etc.
• Cyber crime cases such as online banking frauds, online share trading fraud, source
code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks,
email hijacking, denial of service, hacking, pornography etc are becoming common.
• Digital signatures and e-contracts are fast replacing conventional methods of
transacting business.
• the requirements of cyberspace could hardly ever be anticipated.
• the coming of the Internet led to the emergence of numerous ticklish legal issues and
problems which necessitated the enactment of Cyber laws.
• none of the existing laws gave any legal validity or sanction to the activities in
Cyberspace.
• Internet requires an enabling and supportive legal infrastructure in tune with the times.
This legal infrastructure can only be given by the enactment of the relevant Cyber laws as
the traditional laws have failed to grant the same.
History of Cyber Law in India
• The information Technology Act is an outcome of the resolution dated 30th January
1997 of the General Assembly of the United Nations, which adopted the Model Law on
Electronic Commerce on International Trade Law.
• The Department of Electronics (DoE) in July 1998 drafted the bill.
• However, it could only be introduced in the House on December 16, 1999 (after a gap
of almost one and a half years) when the new IT Ministry was formed.
• It underwent substantial alteration, with the Commerce Ministry making suggestions
related to e-commerce and matters pertaining to World Trade Organization (WTO)
obligations.
• The Ministry of Law and Company Affairs then vetted this joint draft.
• After its introduction in the House, the bill was referred to the 42-member
Parliamentary Standing Committee following demands from the Members.
• The Standing Committee made several suggestions to be incorporated into the bill.
• Suggestions approve by the Ministry of IT were incorporated.
• Cyber café debate. Suggestion dropped in final draft.
History of Cyber Law in India (Cont.)
• The Union Cabinet approved the bill on May 13, 2000 and on May 17, 2000, by both
the houses.
• The Bill received the assent of the President on 9th June 2000.
• Came to be known as the Information Technology Act, 2000. The Act came into force
on 17th October 2000.
• as technology developed further and new methods of committing crime using Internet
& computers surfaced, the need was felt to amend the IT Act, 2000.
• to insert new kinds of cyber offences,
• plug in other loopholes that posed hurdles in the effective enforcement of the IT Act,
2000.
• Information Technology (Amendment) Act, 2008 came, which was made effective from
27 October 2009.
Information Technology Act, 2000
• It is India’s mother legislation regulating the use of computers, computer systems and
computer networks as also data and information in the electronic format.
• The Preamble to the Act states that it aims at providing legal recognition for
transactions carried out by means of electronic data interchange and other means of
electronic communication, commonly referred to as "electronic commerce", which
involve the use of alternatives to paper-based methods of communication and storage of
information and aims at facilitating electronic filing of documents with the Government
agencies.
• The IT Act of 2000 was developed:
• to promote the IT industry
• regulate e- commerce
• facilitate e-governance
• prevent cybercrime
• The IT Act, 2000 consists of 90 sections
• spread over 13 chapters [Sections 91, 92, 93 and 94 of the principal Act were omitted
by the Information Technology (Amendment) Act 2008
• has 2 schedules.[ Schedules III and IV were omitted by the Information Technology
(Amendment) Act 2008].
Salient Features
•The Act provides legal recognition to e-commerce, which facilitates commercial e-
transactions.
• It recognises records kept in electronic form like any other documentary record.
•The Act also provides legal recognition to digital signatures.
•Cyber Law Appellate tribunal has been set up to hear appeal against adjudicating
authorities.
• The provisions of the I.T. Act have no application to negotiable instruments, power of
attorney, trust, will and any contract for sale or conveyance of immovable property.
•The Act applies to any cyber offence or contravention committed outside India by a
person irrespective of his/her nationality.
•Consequent to the passing of this Act, the SEBI had announced that trading of securities
on the internet will be valid in India.
IT (Amendment) Act, 2008
•The term 'digital signature' has been replaced with 'electronic signature' to make the Act
more technology neutral.
•A new section has been inserted to define 'communication device' to mean cell phones,
personal digital assistance or combination of both or any other device used to
communicate, send or transmit any text video, audio or image.
• A new definition has been inserted for intermediary.
•A new section 10A has been inserted to the effect that contracts concluded
electronically shall not be deemed to be unenforceable solely on the ground that
electronic form or means was used.
•Sections 66A to 66F has been added to Section 66 prescribing punishment for offences
such as obscene electronic message transmissions, identity theft, cheating by
impersonation using computer resource, violation of privacy and cyber terrorism.
•Section 67 of the IT Act, 2000 has been amended:
•To reduce the term of imprisonment for publishing or transmitting obscene material in
electronic form to three years from five years and increase in fine from Rs. 100,000 to Rs.
500,000.
IT (Amendment) Act, 2008 (Cont.)
• Sections 67A to 67C have also been inserted.
•Section 67A and B deals with penal provisions in respect of offences of publishing or
transmitting of material containing sexually explicit act and child pornography in
electronic form.
•Section 67C deals with the obligation of an intermediary to preserve and retain such
information as may be specified for such duration and in such manner and format as the
central government may prescribe.
•Power to state:
•With the increasing threat of terrorism in the country,
the new amendments include an amended section 69,
giving power to the state to issue directions for interception or monitoring of decryption
of any information through any computer resource.
sections 69A and B, two new sections, grant power to the state to issue directions for
blocking for public access of any information through any computer resource and to
authorize to monitor and collect traffic data or information through any computer
resource for cyber security.
Rules notified under the IT Act, 2000
a) The Information Technology (Reasonable security practices and procedures and sensitive personal
data or information) Rules, 2011
b) The Information Technology (Electronic Service Delivery) Rules, 2011
c) The Information Technology (Intermediaries guidelines) Rules, 2011
d) The Information Technology (Guidelines for Cyber Cafe) Rules, 2011
e) The Cyber Appellate Tribunal (Salary, Allowances and other terms and conditions of service of
Chairperson and Members) Rules, 2009
f) The Cyber Appellate Tribunal (Procedure for investigation of Misbehaviour or Incapacity of
Chairperson and Members) Rules, 2009
g) The Information Technology (Procedure and Safeguards for Blocking for Access of Information by
Public), 2009
h) The Information Technology (Procedure and Safeguards for interception, monitoring and
decryption of information) Rules, 2009
i) The Information Technology (Procedure and Safeguard for Monitoring and Collecting Traffic Data
or Information) Rules, 2009
j) The Information Technology (Use of electronic records and digital signatures) Rules, 2004
k) The Information Technology (Security Procedure) Rules, 2004
l) The Information Technology (Other Standards) Rules, 2003
m) The Information Technology (Certifying Authority) Regulations, 2001
n) Information Technology (Certifying Authorities) Rules, 2000
Major Acts which got Amended
Indian Penal Code, 1860
•Amendments related to IPC were contained in Sec.91
•The Indian Penal Code was amended by inserting the word 'electronic' thereby treating
the electronic records and documents on a par with physical records and documents.
•The Sections dealing with false entry in a record or false document etc (e.g. 192, 204,
463, 464, 464, 468 to 470, 471, 474, 476 etc) have since been amended as 'electronic
record and electronic document' thereby bringing within the ambit of IPC.
Indian Evidence Act, 1872
•Prior to enactment of ITA, all evidences in a court were in the physical form only.
• After existence of ITA, the electronic records and documents were recognized.
• The definition part of Indian Evidence Act was amended as "all documents including
electronic records" were substituted.
•Other words e.g. 'digital signature', 'electronic form', 'secure electronic record'
'information' as used in the ITA, were also inserted to make them part of the evidentiary
importance under the Act.
•The important amendment was seen by recognition of admissibility of electronic records
as evidence as enshrined in Section 65B of the Act.
Cyber Crime (Definition)
Definition:
Cybercrime can be broken into two categories and defined thus:
a. Cybercrime in a narrow sense (computer crime): Any illegal behaviour directed by
means of electronic operations that targets the security of computer systems and the
data processed by them.
b. Cybercrime in a broader sense (computer-related crime): Any illegal behaviour
committed by means of, or in relation to, a computer system or network, including such
crimes as illegal possession [and] offering or distributing information by means of a
computer system or network.
Cyber Frauds in India
•According to Norton Cybercrime Report 2012, 66% of Indian online adults have been a
victim of cyber fraud in their lifetime.
•In the past 12 months, 56% of online adults in India have experienced cyber fraud.
•As per the report, at least 1,15,000 people fall prey to cyber fraud every day, while 80
per minute and more than one per second leading to a rise in the average direct financial
cost per victim to around Rs10,500.
• 25% don’t use complex passwords or change their passwords frequently and 38% do
not check for the padlock symbol in the browser before entering sensitive personal
information.
• 68% of adults do not know that malware can operate in a discreet fashion, making it
hard to know if a computer has been compromised, and one third (35%) are not certain
that their computer is currently clean and free of viruses.
• the number of cyber crimes in India is nearly around 149,254 and is likely to cross the
300,000 by 2015 growing at compounded annual growth rate (CAGR) of about 107
percent.
•According to the study, every month sees 12,456 cases registered in India.
Classification of Cyber Crime
Classification of cyber crime:
cyber crimes can be classified under different categories which are as follows:
1. Cyber Crimes against Persons:
• Harassment via E-Mails: Facebook, Twitter.
•Cyber-Stalking:
•Dissemination of Obscene Material:
•Defamation:
•Hacking:
•Cracking:
•E-Mail Spoofing:
•SMS Spoofing:
•Cheating & Fraud:
Classification of Cyber Crime (Cont.)
2. Crimes Against Persons Property:
•Intellectual Property Crimes: The common form of IPR violation may be said to be
software piracy, infringement of copyright, trademark, patents, designs and service mark
violation, theft of computer source code, etc.
•Cyber Squatting: two persons claim for the same Domain Name. Bharti Cellular Ltd.
Case.
•Yahoo vs. Akash Arora 1999 PTC 201 (Trademark Act, 1958)
•Satyam Infoway Ltd. v. Sifynet Solutions Pvt. Ltd. 2004(3)AWC 2366 SC ( domain names
may have all the features of trademarks. )
•Transmitting Virus:
•Cyber Trespass: access someone’s computer without the right authorization
•Internet Time Thefts: gets access to someone else’s ISP user ID and password, either by
hacking or by gaining access to it by illegal means
Classification of Cyber Crime (Cont.)
Cybercrimes Against Government:
•Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic as well as
global concern.
The U.S National Infrastructure Protection Center defined the term as
“A criminal act perpetrated by the use of computers and telecommunications capabilities,
resulting in violence, destruction and/ or disruption of services to create fear by causing
confusion and uncertainty within a given population, with the goal of influencing a
government or population to conform to particular political, social or ideological
agenda.”
Notable incidents of Cyber Terrorism:
In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day
over a two-week period. The messages read "We are the Internet Black Tigers and we're
doing this to disrupt your communications." Intelligence authorities characterized it as
the first known attack by terrorist against a country’s computer systems.
•Distribution of pirated software: It means distributing pirated software from one
computer to another intending to destroy the data and official records of the
government.
•Unauthorized Access: An active hackers’ group, led by one “Dr. Nuker”, who claims to be
the founder of Pakistan Hackerz Club, reportedly hacked the websites of the Indian
Parliament, Ahmedabad Telephone Exchange, Engineering Export Promotion Council, and
United Nations (India).
Classification of Cyber Crime (Cont.)
Cybercrimes Against Society at large:
Child Pornography: This would include pornographic websites; pornographic magazines
produced using computers (to publish and print the material) and the Internet (to
download and transmit pornographic pictures, photos, writings etc). (Delhi Public School
case)
Cyber Trafficking: (Drugs, human)
Online Gambling: There are millions of websites; all hosted on servers abroad, that offer
online gambling. In fact, it is believed that many of these websites are actually fronts for
money laundering.
Financial Crimes: Indian case about cyber lotto. (Kola Mohan case)
Salami attacks : The key here is to make the alteration so insignificant that in a single case
it would go completely unnoticed. Eg a bank employee inserts a program, into the bank’s
servers.
Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can
be forged using sophisticated computers, printers and scanners.
Who commits cyber crimes?
i. Insiders - Disgruntled employees and ex-employees, spouses, lovers
ii. Hackers - Crack into networks with malicious intent
iii. Virus Writers - Pose serious threats to networks and systems worldwide
iv. Foreign Intelligence - Use cyber tools as part of their Services for espionage activities
and can pose the biggest threat to the security of another country
v. Terrorists - Use to formulate plans, to raise funds, propaganda
Offences
Offences
Offences under other legislations
Case Laws
•State of Tamil Nadu Vs Suhas Katti (2004)
The case was related to the posting of obscene and defamatory messages about a
divorcee woman in a Yahoo messenger group. The accused, said to be a family friend of
the victim, wanted to marry her. But she ended up marrying someone else, much to his
dismay. After she got divorced, he tried to woo her again, only to be rebuffed. Incensed,
he started harassing her and posting her number on messenger groups, which led to
plenty of lewd and annoying phone calls to the victim. Finally, the victim decided to file a
complaint under the Information Technology Act.
Although the defence put a good case, the Additional Chief Metropolitan Magistrate, on
the basis of the available witnesses and the other relevant evidences held the accused
guilty under section 469 and 509 of Indian penal code and section 67 of the Information
Technology Act 2000. The accused was convicted and sentenced.
Impact: The impact of the case was far reaching. The internet had only started to emerge
hugely within the Indian context and the laws for it were hardly stringent. However, the
IT act and its implementation in this case helped both the courts and the public: it set a
benchmark for the courts, inspired people and gave them strength to lodge cases in case
they were harassed on the internet.
Case Laws
Syed Asifuddin and Ors. V. The State of AP. & Anr., 2005CriLJ4314
Tata Indicom employees were arrested for manipulation of the electronic 32-bit number
(ESN) programmed into cell phones that were exclusively franchised to Reliance
Infocomm.
The court held that such manipulation amounted to tampering with computer source
code as envisaged by section 65 of the Information Technology Act, 2000.
Case Laws
Ritu Kohli case
One Mrs. Ritu Kohli complained to the police against the a person who was using her
identity to chat over the Internet at the website www.mirc.com, mostly in the Delhi
channel for four consecutive days. Mrs. Kohli further complained that the person was
chatting on the Net, using her name and giving her address and was talking obscene
language. The same person was also deliberately giving her telephone number to other
chatters encouraging them to call Ritu Kohli at odd hours. Consequently, Mrs Kohli
received almost 40 calls in three days mostly at odd hours from as far away as Kuwait,
Cochin, Bombay and Ahmedabad. The said calls created havoc in the personal life and
mental peace of Ritu Kohli who decided to report the matter. The IP addresses were
traced and the police investigated the entire matter and ultimately arrested Manish
Kathuria on the said complaint. Manish apparently pleaded guilty and was arrested. A
case was registered under section 509, of the Indian Penal Code (IPC).
Case Laws
Avnish Bajaj Vs. State (N.C.T.) of Delhi (2005) 3 CompLJ 364 Del
Avnish Bajaj – CEO of Baazee.com, a customer-to-customer website, which facilitates the
online sale of property. Baazee.com receives commission from such sales and also
generates revenue from advertisements carried on its web pages. An obscene MMS
clipping was listed for sale on Baazee.com on 27th November, 2004 in the name of “DPS
Girl having fun”. Some copies of the clipping were sold through Baazee.com and the
seller received the money for the sale. Avnish Bajaj was arrested under section 67 of the
Information Technology Act, 2000.
The court held that since the Indian Penal Code does not recognize the concept of an
automatic criminal liability attaching to the director where the company is an accused,
the petitioner can be discharged under Sections 292 and 294 of IPC, but not the other
accused.
As regards S. 67, read with Section 85 of the IT Act, the Court however, observed that a
prima facie case was made out against the petitioner Avnish Bajaj, since the law
recognizes the deemed criminal liability of the directors even where the company is not
arraigned as an accused.
Case Laws
Section 66A
Section 66A reads: "Any person who sends by any means of a computer resource any
information that is grossly offensive or has a menacing character; or any information
which he knows to be false, but for the purpose of causing annoyance, inconvenience,
danger, obstruction, insult shall be punishable with imprisonment for a term which may
extend to three years and with fine.“
Shreya Singhal moved court for repeal of Section 66A
The court was moved by one Shreya Singhal in 2012 following the arrest of two girls,
Shaheen Dhada and Rinu Shrinivasan, for posting comments critical of the Mumbai
shutdown following the death of Shiv Sena supremo Bal Thackeray.
The apex court said that public's right to know is directly affected by Section 66A of
Information Technology Act and this was vague and "what may be offensive to a person,
may not be offensive to others".
The SC said Section 66A of the Information Technology Act was violative of Article
19(1)(a) of the Constitution guaranteeing freedom of speech and expression.
Information to be submitted (lodging complaint)
1) Victim of hacking
o Server Logs;
o Copy of defaced web page in soft copy as well as hard copy format, if website is
defaced;
o If data is compromised on your server or computer or any other network equipment,
soft copy of original data and soft copy of compromised data.
o Access control mechanism details i.e.- who had what kind of access to the
compromised system;
o List of suspects – if the victim is having any suspicion on anyone.
o All relevant information leading to answers to the following questions –
what ? (what is compromised)
who? (who might have compromised system)
when? (when the system was compromised)
why? (why the system might have been compromised)
where? (where is the impact of attack-identifying the target system from the network)
How many? (How many systems have been compromised by the attack)
Information to be submitted (lodging complaint)
2) Victim of e-mail abuse, vulgar e-mail etc.
o Extract the extended headers of offending e-mail.
o Bring soft copy as well hard copy of offending e-mail.
o Please do not delete the offending e-mail from your e-mail box.
o Please save the copy of offending e-mail on your computer’s hard drive.
Regulatory Authorities
1) Department of Electronics and Information Technology
2) Controller of Certifying Authorities (CCA)
The IT Act provides for the Controller of Certifying Authorities (CCA) to license and
regulate the working of Certifying Authorities. The Certifying Authorities (CAs) issue
digital signature certificates for electronic authentication of users.
3) Cyber Appellate Tribunal
The Cyber Appellate Tribunal has, for the purposes of discharging its functions
under the IT Act, the same powers as are vested in a civil court under the Code of
Civil Procedure, 1908.
4) Indian Computer Emergency Response Team (ICERT)
The purpose of the ICERT is, to become the nation's most trusted referral agency of
the Indian Community for responding to computer security incidents as and when
they occur
THANK YOU

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in indiaatuljaybhaye
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Bankers evidence act
Bankers evidence actBankers evidence act
Bankers evidence actSSbm1
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
E contracts
E contractsE contracts
E contracts
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Bankers evidence act
Bankers evidence actBankers evidence act
Bankers evidence act
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 

Similar to Cyber Law & Crime (Information Technology Act, 2000)

Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 

Similar to Cyber Law & Crime (Information Technology Act, 2000) (20)

IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 

Recently uploaded

BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 

Recently uploaded (20)

BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 

Cyber Law & Crime (Information Technology Act, 2000)

  • 1. Cyber Law & Crime (Information Technology Act,2000) (by Swant Anand)
  • 2. INTRODUCTION • The virtual world of internet is known as cyberspace. • The laws governing this area are known as Cyber laws. • All the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction. • Cyber law can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. • Basically, cyber law is the law governing computers and the internet. • The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. • All these regulatory mechanisms and legal infrastructures come within the domain of Cyber law.
  • 3. Need for Cyber law • In today’s techno-savvy environment, the world is becoming more and more digitally sophisticated and so are the crimes. • Internet was initially developed as a research and information sharing tool and was in an unregulated manner. • As the time passed by it became more transactional with e-business, e-commerce, e- governance and e-procurement etc. • All legal issues related to internet crime are dealt with through cyber laws. • In today's highly digitalized world, almost everyone is affected by cyber law. For example: • Almost all transactions in shares are in demat form. • Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. • Government forms including income tax returns, company law forms etc. are now filled in electronic form. • Consumers are increasingly using credit cards for shopping. • Most people are using email, cell phones and SMS messages for communication.
  • 4. Need for Cyber law (Cont.) • Even in "non-cyber crime" cases, important evidence is found in computers / cell phones e.g. in cases of divorce, murder, kidnapping, tax evasion, organized crime, terrorist operations, counterfeit currency etc. • Cyber crime cases such as online banking frauds, online share trading fraud, source code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial of service, hacking, pornography etc are becoming common. • Digital signatures and e-contracts are fast replacing conventional methods of transacting business. • the requirements of cyberspace could hardly ever be anticipated. • the coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyber laws. • none of the existing laws gave any legal validity or sanction to the activities in Cyberspace. • Internet requires an enabling and supportive legal infrastructure in tune with the times. This legal infrastructure can only be given by the enactment of the relevant Cyber laws as the traditional laws have failed to grant the same.
  • 5. History of Cyber Law in India • The information Technology Act is an outcome of the resolution dated 30th January 1997 of the General Assembly of the United Nations, which adopted the Model Law on Electronic Commerce on International Trade Law. • The Department of Electronics (DoE) in July 1998 drafted the bill. • However, it could only be introduced in the House on December 16, 1999 (after a gap of almost one and a half years) when the new IT Ministry was formed. • It underwent substantial alteration, with the Commerce Ministry making suggestions related to e-commerce and matters pertaining to World Trade Organization (WTO) obligations. • The Ministry of Law and Company Affairs then vetted this joint draft. • After its introduction in the House, the bill was referred to the 42-member Parliamentary Standing Committee following demands from the Members. • The Standing Committee made several suggestions to be incorporated into the bill. • Suggestions approve by the Ministry of IT were incorporated. • Cyber café debate. Suggestion dropped in final draft.
  • 6. History of Cyber Law in India (Cont.) • The Union Cabinet approved the bill on May 13, 2000 and on May 17, 2000, by both the houses. • The Bill received the assent of the President on 9th June 2000. • Came to be known as the Information Technology Act, 2000. The Act came into force on 17th October 2000. • as technology developed further and new methods of committing crime using Internet & computers surfaced, the need was felt to amend the IT Act, 2000. • to insert new kinds of cyber offences, • plug in other loopholes that posed hurdles in the effective enforcement of the IT Act, 2000. • Information Technology (Amendment) Act, 2008 came, which was made effective from 27 October 2009.
  • 7. Information Technology Act, 2000 • It is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. • The Preamble to the Act states that it aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information and aims at facilitating electronic filing of documents with the Government agencies. • The IT Act of 2000 was developed: • to promote the IT industry • regulate e- commerce • facilitate e-governance • prevent cybercrime • The IT Act, 2000 consists of 90 sections • spread over 13 chapters [Sections 91, 92, 93 and 94 of the principal Act were omitted by the Information Technology (Amendment) Act 2008 • has 2 schedules.[ Schedules III and IV were omitted by the Information Technology (Amendment) Act 2008].
  • 8. Salient Features •The Act provides legal recognition to e-commerce, which facilitates commercial e- transactions. • It recognises records kept in electronic form like any other documentary record. •The Act also provides legal recognition to digital signatures. •Cyber Law Appellate tribunal has been set up to hear appeal against adjudicating authorities. • The provisions of the I.T. Act have no application to negotiable instruments, power of attorney, trust, will and any contract for sale or conveyance of immovable property. •The Act applies to any cyber offence or contravention committed outside India by a person irrespective of his/her nationality. •Consequent to the passing of this Act, the SEBI had announced that trading of securities on the internet will be valid in India.
  • 9. IT (Amendment) Act, 2008 •The term 'digital signature' has been replaced with 'electronic signature' to make the Act more technology neutral. •A new section has been inserted to define 'communication device' to mean cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text video, audio or image. • A new definition has been inserted for intermediary. •A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used. •Sections 66A to 66F has been added to Section 66 prescribing punishment for offences such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism. •Section 67 of the IT Act, 2000 has been amended: •To reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and increase in fine from Rs. 100,000 to Rs. 500,000.
  • 10. IT (Amendment) Act, 2008 (Cont.) • Sections 67A to 67C have also been inserted. •Section 67A and B deals with penal provisions in respect of offences of publishing or transmitting of material containing sexually explicit act and child pornography in electronic form. •Section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe. •Power to state: •With the increasing threat of terrorism in the country, the new amendments include an amended section 69, giving power to the state to issue directions for interception or monitoring of decryption of any information through any computer resource. sections 69A and B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cyber security.
  • 11. Rules notified under the IT Act, 2000 a) The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 b) The Information Technology (Electronic Service Delivery) Rules, 2011 c) The Information Technology (Intermediaries guidelines) Rules, 2011 d) The Information Technology (Guidelines for Cyber Cafe) Rules, 2011 e) The Cyber Appellate Tribunal (Salary, Allowances and other terms and conditions of service of Chairperson and Members) Rules, 2009 f) The Cyber Appellate Tribunal (Procedure for investigation of Misbehaviour or Incapacity of Chairperson and Members) Rules, 2009 g) The Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public), 2009 h) The Information Technology (Procedure and Safeguards for interception, monitoring and decryption of information) Rules, 2009 i) The Information Technology (Procedure and Safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 j) The Information Technology (Use of electronic records and digital signatures) Rules, 2004 k) The Information Technology (Security Procedure) Rules, 2004 l) The Information Technology (Other Standards) Rules, 2003 m) The Information Technology (Certifying Authority) Regulations, 2001 n) Information Technology (Certifying Authorities) Rules, 2000
  • 12. Major Acts which got Amended Indian Penal Code, 1860 •Amendments related to IPC were contained in Sec.91 •The Indian Penal Code was amended by inserting the word 'electronic' thereby treating the electronic records and documents on a par with physical records and documents. •The Sections dealing with false entry in a record or false document etc (e.g. 192, 204, 463, 464, 464, 468 to 470, 471, 474, 476 etc) have since been amended as 'electronic record and electronic document' thereby bringing within the ambit of IPC. Indian Evidence Act, 1872 •Prior to enactment of ITA, all evidences in a court were in the physical form only. • After existence of ITA, the electronic records and documents were recognized. • The definition part of Indian Evidence Act was amended as "all documents including electronic records" were substituted. •Other words e.g. 'digital signature', 'electronic form', 'secure electronic record' 'information' as used in the ITA, were also inserted to make them part of the evidentiary importance under the Act. •The important amendment was seen by recognition of admissibility of electronic records as evidence as enshrined in Section 65B of the Act.
  • 13. Cyber Crime (Definition) Definition: Cybercrime can be broken into two categories and defined thus: a. Cybercrime in a narrow sense (computer crime): Any illegal behaviour directed by means of electronic operations that targets the security of computer systems and the data processed by them. b. Cybercrime in a broader sense (computer-related crime): Any illegal behaviour committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network.
  • 14. Cyber Frauds in India •According to Norton Cybercrime Report 2012, 66% of Indian online adults have been a victim of cyber fraud in their lifetime. •In the past 12 months, 56% of online adults in India have experienced cyber fraud. •As per the report, at least 1,15,000 people fall prey to cyber fraud every day, while 80 per minute and more than one per second leading to a rise in the average direct financial cost per victim to around Rs10,500. • 25% don’t use complex passwords or change their passwords frequently and 38% do not check for the padlock symbol in the browser before entering sensitive personal information. • 68% of adults do not know that malware can operate in a discreet fashion, making it hard to know if a computer has been compromised, and one third (35%) are not certain that their computer is currently clean and free of viruses. • the number of cyber crimes in India is nearly around 149,254 and is likely to cross the 300,000 by 2015 growing at compounded annual growth rate (CAGR) of about 107 percent. •According to the study, every month sees 12,456 cases registered in India.
  • 15. Classification of Cyber Crime Classification of cyber crime: cyber crimes can be classified under different categories which are as follows: 1. Cyber Crimes against Persons: • Harassment via E-Mails: Facebook, Twitter. •Cyber-Stalking: •Dissemination of Obscene Material: •Defamation: •Hacking: •Cracking: •E-Mail Spoofing: •SMS Spoofing: •Cheating & Fraud:
  • 16. Classification of Cyber Crime (Cont.) 2. Crimes Against Persons Property: •Intellectual Property Crimes: The common form of IPR violation may be said to be software piracy, infringement of copyright, trademark, patents, designs and service mark violation, theft of computer source code, etc. •Cyber Squatting: two persons claim for the same Domain Name. Bharti Cellular Ltd. Case. •Yahoo vs. Akash Arora 1999 PTC 201 (Trademark Act, 1958) •Satyam Infoway Ltd. v. Sifynet Solutions Pvt. Ltd. 2004(3)AWC 2366 SC ( domain names may have all the features of trademarks. ) •Transmitting Virus: •Cyber Trespass: access someone’s computer without the right authorization •Internet Time Thefts: gets access to someone else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means
  • 17. Classification of Cyber Crime (Cont.) Cybercrimes Against Government: •Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic as well as global concern. The U.S National Infrastructure Protection Center defined the term as “A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/ or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to particular political, social or ideological agenda.” Notable incidents of Cyber Terrorism: In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorist against a country’s computer systems. •Distribution of pirated software: It means distributing pirated software from one computer to another intending to destroy the data and official records of the government. •Unauthorized Access: An active hackers’ group, led by one “Dr. Nuker”, who claims to be the founder of Pakistan Hackerz Club, reportedly hacked the websites of the Indian Parliament, Ahmedabad Telephone Exchange, Engineering Export Promotion Council, and United Nations (India).
  • 18. Classification of Cyber Crime (Cont.) Cybercrimes Against Society at large: Child Pornography: This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). (Delhi Public School case) Cyber Trafficking: (Drugs, human) Online Gambling: There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. Financial Crimes: Indian case about cyber lotto. (Kola Mohan case) Salami attacks : The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. Eg a bank employee inserts a program, into the bank’s servers. Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.
  • 19. Who commits cyber crimes? i. Insiders - Disgruntled employees and ex-employees, spouses, lovers ii. Hackers - Crack into networks with malicious intent iii. Virus Writers - Pose serious threats to networks and systems worldwide iv. Foreign Intelligence - Use cyber tools as part of their Services for espionage activities and can pose the biggest threat to the security of another country v. Terrorists - Use to formulate plans, to raise funds, propaganda
  • 22. Offences under other legislations
  • 23. Case Laws •State of Tamil Nadu Vs Suhas Katti (2004) The case was related to the posting of obscene and defamatory messages about a divorcee woman in a Yahoo messenger group. The accused, said to be a family friend of the victim, wanted to marry her. But she ended up marrying someone else, much to his dismay. After she got divorced, he tried to woo her again, only to be rebuffed. Incensed, he started harassing her and posting her number on messenger groups, which led to plenty of lewd and annoying phone calls to the victim. Finally, the victim decided to file a complaint under the Information Technology Act. Although the defence put a good case, the Additional Chief Metropolitan Magistrate, on the basis of the available witnesses and the other relevant evidences held the accused guilty under section 469 and 509 of Indian penal code and section 67 of the Information Technology Act 2000. The accused was convicted and sentenced. Impact: The impact of the case was far reaching. The internet had only started to emerge hugely within the Indian context and the laws for it were hardly stringent. However, the IT act and its implementation in this case helped both the courts and the public: it set a benchmark for the courts, inspired people and gave them strength to lodge cases in case they were harassed on the internet.
  • 24. Case Laws Syed Asifuddin and Ors. V. The State of AP. & Anr., 2005CriLJ4314 Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000.
  • 25. Case Laws Ritu Kohli case One Mrs. Ritu Kohli complained to the police against the a person who was using her identity to chat over the Internet at the website www.mirc.com, mostly in the Delhi channel for four consecutive days. Mrs. Kohli further complained that the person was chatting on the Net, using her name and giving her address and was talking obscene language. The same person was also deliberately giving her telephone number to other chatters encouraging them to call Ritu Kohli at odd hours. Consequently, Mrs Kohli received almost 40 calls in three days mostly at odd hours from as far away as Kuwait, Cochin, Bombay and Ahmedabad. The said calls created havoc in the personal life and mental peace of Ritu Kohli who decided to report the matter. The IP addresses were traced and the police investigated the entire matter and ultimately arrested Manish Kathuria on the said complaint. Manish apparently pleaded guilty and was arrested. A case was registered under section 509, of the Indian Penal Code (IPC).
  • 26. Case Laws Avnish Bajaj Vs. State (N.C.T.) of Delhi (2005) 3 CompLJ 364 Del Avnish Bajaj – CEO of Baazee.com, a customer-to-customer website, which facilitates the online sale of property. Baazee.com receives commission from such sales and also generates revenue from advertisements carried on its web pages. An obscene MMS clipping was listed for sale on Baazee.com on 27th November, 2004 in the name of “DPS Girl having fun”. Some copies of the clipping were sold through Baazee.com and the seller received the money for the sale. Avnish Bajaj was arrested under section 67 of the Information Technology Act, 2000. The court held that since the Indian Penal Code does not recognize the concept of an automatic criminal liability attaching to the director where the company is an accused, the petitioner can be discharged under Sections 292 and 294 of IPC, but not the other accused. As regards S. 67, read with Section 85 of the IT Act, the Court however, observed that a prima facie case was made out against the petitioner Avnish Bajaj, since the law recognizes the deemed criminal liability of the directors even where the company is not arraigned as an accused.
  • 27. Case Laws Section 66A Section 66A reads: "Any person who sends by any means of a computer resource any information that is grossly offensive or has a menacing character; or any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult shall be punishable with imprisonment for a term which may extend to three years and with fine.“ Shreya Singhal moved court for repeal of Section 66A The court was moved by one Shreya Singhal in 2012 following the arrest of two girls, Shaheen Dhada and Rinu Shrinivasan, for posting comments critical of the Mumbai shutdown following the death of Shiv Sena supremo Bal Thackeray. The apex court said that public's right to know is directly affected by Section 66A of Information Technology Act and this was vague and "what may be offensive to a person, may not be offensive to others". The SC said Section 66A of the Information Technology Act was violative of Article 19(1)(a) of the Constitution guaranteeing freedom of speech and expression.
  • 28. Information to be submitted (lodging complaint) 1) Victim of hacking o Server Logs; o Copy of defaced web page in soft copy as well as hard copy format, if website is defaced; o If data is compromised on your server or computer or any other network equipment, soft copy of original data and soft copy of compromised data. o Access control mechanism details i.e.- who had what kind of access to the compromised system; o List of suspects – if the victim is having any suspicion on anyone. o All relevant information leading to answers to the following questions – what ? (what is compromised) who? (who might have compromised system) when? (when the system was compromised) why? (why the system might have been compromised) where? (where is the impact of attack-identifying the target system from the network) How many? (How many systems have been compromised by the attack)
  • 29. Information to be submitted (lodging complaint) 2) Victim of e-mail abuse, vulgar e-mail etc. o Extract the extended headers of offending e-mail. o Bring soft copy as well hard copy of offending e-mail. o Please do not delete the offending e-mail from your e-mail box. o Please save the copy of offending e-mail on your computer’s hard drive.
  • 30. Regulatory Authorities 1) Department of Electronics and Information Technology 2) Controller of Certifying Authorities (CCA) The IT Act provides for the Controller of Certifying Authorities (CCA) to license and regulate the working of Certifying Authorities. The Certifying Authorities (CAs) issue digital signature certificates for electronic authentication of users. 3) Cyber Appellate Tribunal The Cyber Appellate Tribunal has, for the purposes of discharging its functions under the IT Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908. 4) Indian Computer Emergency Response Team (ICERT) The purpose of the ICERT is, to become the nation's most trusted referral agency of the Indian Community for responding to computer security incidents as and when they occur