16
A Study on Cyber Crime in India: With Reference to it Act 2000 1 B. Mughundhan and 2 M. Kannappan 1 Saveetha School of Law, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai. 2 Saveetha School of Law, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai. [email protected] Abstract Cybercrime is evolving at an astounding pace, following the same dynamic as the inevitable penetration of computer technology and communication into all walks of life. Whilst society is inventing and evolving, at the same time, criminals are deploying a remarkable adaptability in order to derive the greatest benefit from it. To avoid giving cybercriminals the initiative, it is important for those involved in the fight against cybercrime to try to anticipate qualitative and quantitative changes in its underlying elements so that they can adjust their methods appropriately. This paper highlights the importance of computer in human life. It elaborates the concept of cyber crime. It discusses the provisions of information technology act, 2000 along with the sweeping changes brought in by the amendment act f 2008. An attempt is been made to discuss the salient features of the amendment act of 2008. In this paper the important provisions of information technology act are discussed. Key Words:Cyber crime, computer, information technology act, digital signature, electronic signature. International Journal of Pure and Applied Mathematics Volume 119 No. 17 2018, 1233-1248 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ 1233

A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

A Study on Cyber Crime in India: With Reference to

it Act 2000 1B. Mughundhan and

2M. Kannappan

1Saveetha School of Law,

Saveetha Institute of Medical and Technical Sciences,

Saveetha University,

Chennai. 2Saveetha School of Law,

Saveetha Institute of Medical and Technical Sciences,

Saveetha University,

Chennai.

[email protected]

Abstract Cybercrime is evolving at an astounding pace, following the same

dynamic as the inevitable penetration of computer technology and

communication into all walks of life. Whilst society is inventing and

evolving, at the same time, criminals are deploying a remarkable

adaptability in order to derive the greatest benefit from it. To avoid giving

cybercriminals the initiative, it is important for those involved in the fight

against cybercrime to try to anticipate qualitative and quantitative changes

in its underlying elements so that they can adjust their methods

appropriately. This paper highlights the importance of computer in human

life. It elaborates the concept of cyber crime. It discusses the provisions of

information technology act, 2000 along with the sweeping changes brought

in by the amendment act f 2008. An attempt is been made to discuss the

salient features of the amendment act of 2008. In this paper the important

provisions of information technology act are discussed.

Key Words:Cyber crime, computer, information technology act, digital

signature, electronic signature.

International Journal of Pure and Applied MathematicsVolume 119 No. 17 2018, 1233-1248ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/

1233

Page 2: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

1. Introduction

Cybercrime" consolidates the expression "wrongdoing" with the root "digital"

from "computerized", from the Greek, "kubernân", which intends to lead or

oversee. The "digital" condition incorporates all types of computerized

exercises, paying little respect to whether they are led through systems and

without outskirts. This broadens the past term "PC wrongdoing" to incorporate

violations carried out utilizing the Internet, every single advanced wrongdoing,

and wrongdoings including broadcast communications systems. This later

phrasing covers a wide assortment of aspects, prompting distinctive

methodologies, contingent upon the prevailing society of the specialists,

influencing it to show up either lessened or extended, in various measurements,

managing developing issues that additionally mirror its decent variety.

Wrongdoing is a social and financial marvel and is as old as the human culture.

Wrongdoing is a lawful idea and has the authorize of the law. Wrongdoing or an

offense is "a legitimate wrong that can be trailed by criminal procedures which

may come about into discipline." The sign of guiltiness is that, it is rupture of

the criminal law. Per Lord Atkin "the criminal nature of a demonstration can't

be found by reference to any standard however one: is the demonstration

disallowed with corrective consequences".1 A wrongdoing might be said to be

any lead joined by act or exclusion disallowed by law and noteworthy rupture of

which is gone by reformatory results. The growing range of PCs and the web

has made it less demanding for individuals to stay in contact crosswise over

long separations and work together for purposes identified with business,

training and culture among others. Notwithstanding, the implies that empower

the free stream of data crosswise over outskirts likewise offer ascent to a

worryingly high frequency of reckless conduct. Any innovation is equipped for

useful uses and abuse. It is the activity of the legitimate framework and

administrative offices to keep pace with the same and guarantee that more

current advances don't progress toward becoming instruments of abuse and

badgering. Notwithstanding, generous lawful inquiries have emerged in

numerous specific circumstances. The World Wide Web enables clients to

course content as content, pictures, recordings and sounds. Sites are made and

refreshed for some, valuable purposes, however they can likewise be utilized to

circle hostile substance, for example, explicit entertainment, abhor discourse

and defamatory materials. Much of the time, the licensed innovation privileges

of creators and specialists are damaged through the unapproved dissemination

of their works. There has likewise been an upsurge in occasions of money

related extortion and bamboozling in connection to business exchanges directed

online.2

1 Wall, David.s, “catching cyber criminals”. Testimony before the special oversight panel

of terrorism committee on armed services, US House of Representatives, 23 May 2000. 2 Ghosh, Sumit, “The Nature of cyber attacks in the future : A position paper, “information

systems security (2004): 18-33 Academic search premier 19 jan 2011.

International Journal of Pure and Applied Mathematics Special Issue

1234

Page 3: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

The computerized medium gives the helpful shield of secrecy and phony

personalities. Errant people turn out to be more encouraged in their hostile

conduct on the off chance that they believe that they won't confront any results.

Lately, there have been various reports of web clients getting spontaneous

messages which regularly contains foul dialect and sums to provocation. The

individuals who post individual data about themselves on employment and

marriage to sites or informal communication sites are regularly at the less than

desirable end of 'digital stalking'. Ladies and minors who post their contact

points of interest turn out to be particularly defenseless.

The aim of the research is to study about cyber crime in india and to identify

the effects after the amendment of IT act.

2. Materials and Methods

This research has been carried out in an doctrinal method. Sources are

secondary sources mainly books and e-sources.

Hypothesis

ALTERNATIVE: The IT act achieved its purpose by curbing cyber crime in

india.

NULL: The IT act has been ineffective in controlling cyber crime in india.

3. Review of Literature

The cyber terrorism are occurred in 3 angles they are: The truth about cyber

terrorism, could laws regulate this issue? and address the issues of cyber

crime.(P.Madhava-2011). In this paper the author tied to discuss about the

phenomenon of cyber terrorism and its growing impact in the current scenario.

This paper concluded that the existing laws in various countries are not efficient

to restrain the cyber crime (Prashanth vats-2016). The aim of the author(Alvin

toffler) is to study cyber terrorism as another dimension of asymmetric warfare.

And to suggest measures to overcome this threat. This author (pavan Duggar-

2002)presents the meaning and definition of cyber crime, the legislation in India

dealing with offences relating to the use of computer or other electronic

gadgets. This author(Nikhil, A.gupta-2014) highlights the importance of

computers in human life. In particular this article discusses about the provisions

of IT act 2000 and concluded with some quotes according to the provisions of

cyber crime. The books categories the infrastructure that requires protection.

The issues associate with each, and the responsibilities of the public and private

sector in securing the infrastructure(Jody.R-2004). In this book you will learn

about the technological and logistic framework of cyber crime, as well as the

social and legal backgrounds of its prosecution and investigation.(Babak-2014).

This book tackles the fast growing topic of cyber crime and covers a wide range

of topics from electronic fraud, cyber stalking, online theft and intellectual

property to more involved topics like malicious ( Mathew Richards-2014).

International Journal of Pure and Applied Mathematics Special Issue

1235

Page 4: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

4. Cyber Crime in India

Innovative Aspect of Cybercrime

From an innovative measurement, different specialists bring up the requirement

for a far reaching term, for example, "electronic wrongdoing" or "e-

wrongdoing", because of the joining of ICT, including versatile innovation,

communication, memory, 14 observation frameworks, and different advances,

including nanotechnology and mechanical technology, which must be

considered starting now and into the foreseeable future. These electronic media

will be focused on progressively more regularly and will likewise be utilized to

disguise, carry out, or bolster wrongdoings and offenses. Just the positive

activities for which at least one means were utilized to submit one of the

components of the offense can be included.3

Anthropological Aspect of Cybercrime

From an anthropological viewpoint, cybercrime starts from different populaces

and displays socio educational, financial, and techno-ideological elements and

their appearances, including obsessive articulations like compulsion. The

maladjustment of the instruction framework may add to the advancement of

new types of cybercrime or freak practices and conduct with different levels of

seriousness, including bamboozling and reputational harm, which can be

identified with dissatisfactions and the redefinition of material and national

qualities, conflicting with what is normal when drawing closer and driving a

grown-up life. Troublesome financial conditions additionally incorporate the

Internet as a place for communicating mental issues with financial starting

points, including burglary, youngster smut, and calls for uprisings, viciousness,

and disdain. With respect to techno ideological factors, one must consider

locales and systems went for purposeful publicity, destabilization, and

individual and mass mental control utilizing techniques that include the

advanced handling of pictures, recordings, and audio.4

Key Aspect of Cybercrime

From a key viewpoint, cybercrime is viewed as an offense to digital security, to

be specific assaults to computerized systems to seize control, incapacitating

them, or notwithstanding annihilating frameworks that are crucial to

governments and divisions of imperative significance

5. Effect of Cyber Crime

This area displays the outcomes concerning the effect of mechanical change and

leaps forward of predominance – or rather, of the expansion – of cybercrime

amid the 2010 to 2020 decade

3 Virus glossary (2006), virus discrimination, Available at www. Virtualpune.com.

4 Shanthosh Raut (2008), Network interferences, Available at www. Santodhraut. Com

International Journal of Pure and Applied Mathematics Special Issue

1236

Page 5: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

Impression of the Impact of Cybercrime

The effect of cybercrime is difficult to recognize. However, there is an

expansion in the advancement of data innovation and the abuse of

vulnerabilities among cybercriminals, a hole amongst legitimate and degenerate

nations, and a Catch 22 identified with mechanical improvements and

achievements. It is constantly advantageous to recall that innovation itself is

neutral.(Baba-2014). Be that as it may, its utilization can be portrayed as

negative or positive. This is particularly valid in cryptography, utilized for

securing exchanges and information trade and also to secure interchanges

covering unlawful exercises and the foundation of proof. History demonstrates

that new advancements, once in a while controlled and not completely total, are

both utilized for good and bad. The next ten years will be set apart by

portability, with the requirement for accessibility, ongoing correspondence,

availability, and a reliance on computerized character hardware and hazard.

This decade will likewise incorporate checking automata frameworks and

progressively new dangers

Negative Developments concerning Cybercrime

Expected advancements, which may negatively affect cybercrime, render little

refinement between work life and private life, utilizing for instance the trouble

of finding data for an organization and Web applications with distributed

computing, directed stealth malware, and all the more by and large, the gigantic

utilization of new advances, including versatile and remote innovations, and a

thoughtless introduction to social building, informal communities, and portable

downloads did less safely than before. We should stress the unstable idea of

discovering information as confirmation and the trouble of announcing offenses

to the sources, with no lawful means, in light of the fact that cybercriminals are

adjusting close by new advances

Positive Developments as to Cybercrime

Safety efforts in view of these same advancements could have a positive effect.

Security is fundamental to the issue and should be founded on approaches and

be entirely upheld. It will be a noteworthy test with distributed computing,

because of the intricacy of where information is put away and the various wards

included, real dangers related with administration and territoriality. The

successful level of value security will be a key factor in the acknowledgment of

these new administrations

6. Cyber Crimes and the Nature of Evidence

The idea of proof in reality and the virtual world is unique. This uniqueness is

prominent in every one of the phases of proof location, social affair, stockpiling

and display under the watchful eye of the court. The basic part is that all the

examination experts that are capable ideal from the phase of accumulation of

the confirmation to the introduction of the proof under the steady gaze of the

court must comprehend the recognizing qualities of the proof with the goal that

International Journal of Pure and Applied Mathematics Special Issue

1237

Page 6: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

they can save the proof gathered by them. In such manner the part of the legal

likewise winds up crucial as the legal should likewise be in the situation to

value the PC confirm displayed before them. In spite of this present reality

wrongdoings where any substantial proof as fingerprints, weapon of

wrongdoing, blood recolor marks and so forth can be followed, in the virtual

world such follows turn out to be extremely hard to discover. The art of PC

criminology is picking up centrality in the examination offices, corporate world,

government divisions and so on. Give us a chance to see a portion of the

difficulties that are engaged with the procedure of digital confirmation

discovery, social affair, stockpiling and show under the steady gaze of the court.

It is viewed as hard to cancel the data from the PC framework than what is for

the most part considered. This should be possible with the assistance of PC

crime scene investigation who can assemble prove or considerably recuperate

data which may have been erased deliberately. It is crucial that the casualty

report the law requirement organizations about the wrongdoing as right on time

as could be expected under the circumstances. The procedure of protection of

digital wrongdoing proof exists in the comprehension of a proficient and

educated PC crime scene investigation master in light of the fact that any lack of

regard in the process can prompt little estimation of the confirmation. The

frequently confronted obstacle is that the victim– organizations are more

worried about rebuilding of their frameworks to full operational status instead

of permitting legitimate proof accumulation. Along these lines the auspicious

help of the PC legal sciences master can help gather prove from the framework

inside most brief time conceivable.

Digital proof is of physical or coherent nature. It is the physical confirmation

that can be followed effectively as the agent simply needs to visit the scene of

wrongdoing and scan for and take into his guardianship PC equipment, which

may constitute primary casing PCs to take estimated individual associates,

floppy diskettes, electronic chips and so forth. The features of the sensible part

of the digital proof are of various nature. This involves a procedure portrayed as

Information Discovery' wherein the agent examines through the log documents,

and tries to rescue the information from a PC framework which has been

influenced. Once the required proof is recognized, at that point the examiner

must guarantee that the same is gathered by holding fast to the legitimate

prerequisites, for example, prove is gathered simply after the essential warrant

for it is issued or if the data has all the earmarks of being outside the extent of

the warrant then extra warrant be issued. The confirmation gathered winds up

substantial in the official courtrooms just if the proof is gathered by legitimate.

Right now just officers not beneath the rank of a Deputy Superintendent of

Police and officers deputed by the focal government can be approved to enter

open places and gathers confirmation and complete inquiry tasks and arrest17.

This specialist has been given to higher review officers right now keeping in see

the abuse of this power viz. appropriate to protection and guaranteeing the

legitimacy of the digital proof As of now in India the idea of 'Sensible desire for

International Journal of Pure and Applied Mathematics Special Issue

1238

Page 7: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

Privacy' has not be produced. The issues engaged with this are whether a

'person's manner reflects subjective desire for protection' or 'the person's

subjective desire for security is to such an extent that the general public is

prepared to remember it as reasonable.5

Another quarter which should be tried under digital confirmation and which is

unavoidable is the valuation for the PC created prove by every one of the

experts related with the procedure of organization of equity. In this way the

judiciary19 as well as the prosecutors, the resistance legal advisors must get

comfortable with the details, this is so in light of the fact that till now these

experts were managing proof in the substantial shape yet the idea of

confirmation experiences finish change under the virtual medium, they should

modify themselves to value the proof in intelligent organization.

7. Effects of it Act

1. The ramifications of these arrangements for the corporate segment

would be that email will now be a substantial and authoritative

document of correspondence in our nation, which can be properly

delivered and affirmed in an official courtroom. The corporates today

flourish with email, not just as the type of correspondence with

substances exterior the organization yet in addition email is utilized as a

crucial devices for intra organization correspondence. Till now it has

been seen that the corporates in their intra organization correspondences

on email have not been exceptionally watchful in utilizing the dialect in

such messages. Corporates should comprehend that they might should

be more watchful while composing messages, regardless of whether

outside the organization or inside as the same with whatever dialect

could be demonstrated in the official courtroom, once in a while much to

the hindrance of the organization. Indeed, even intra organization notes

and updates, till now utilized just for official purposes, should likewise

be coming surprisingly close to the IT Act and will be acceptable as

confirmation in a courtroom. A conceivable outcome of the same for a

run of the mill wired organization would be that any representative,

despondent with a specific email correspondence, regardless of whether

in individual or got in an official or individual limit, may make the said

email as the establishment for propelling a suit in a courtroom. Further,

when an organization official sends an email to another official in the

organization with some defamatory or other related material and

duplicates the same to others, there are conceivable outcomes that he

may arrive in a case in a court of law.6

2. Companies might now have the capacity to complete electronic business

utilizing the lawful foundation gave by the Act. Till now, the

5 Jessica stanicon (2009), Available at www. Dynamicbusiness.com

6 Prasun sonwalkar(2009), India emerging as centre for cyber crime: UK study, Available at

www. Livemint.com

International Journal of Pure and Applied Mathematics Special Issue

1239

Page 8: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

development of Electronic business was obstructed in our nation

essentially in light of the fact that there was no lawful foundation to

manage business exchanges on the web.

3. Corporates will now have the capacity to utilize advanced marks to do

their exchanges on the web. These computerized marks have been given

legitimate legitimacy and endorse in the Act.

4. The Act likewise tosses open the entryways for the section of corporates

in the matter of being of being Certifying Authorities for issuing Digital

Signatures Certificates. The Act does not make any refinement between

any legitimate substance for being delegated as a Certifying Authority

insofar as the standards stipulated by the administration have been

followed.7

5. The Act additionally empowers the organizations to record any frame,

application or some other archive with any office, expert, body or office

possessed or controlled by the proper Government in the electronic

shape by methods for such electronic shape as might be recommended

by the suitable Government. India is quickly pushing forward in the field

of electronic administration and it won't be well before governments

begin taking applications or issuing permit, allow, authorize or

endorsements ,by whatever name called, online . This arrangement

should be an extraordinary leveler as this will empower a wide range of

organizations to complete a ton of their connection with various

government offices on the web, along these lines sparing costs, time and

wastage of valuable manpower.8

6. Corporates are commanded by various laws of the nation to keep and

hold significant and corporate data. The IT Act empowers organizations

legitimately to hold the said data in the electronic shape.

7. If the data contained in that remaining parts open to be usable for an

ensuing reference;

8. The electronic record is held in the arrangement in which it was initially

created, sent or got or in an organization which can be shown to speak to

precisely the data initially produced, sent or got;

9. The points of interest which will encourage the distinguishing proof of

the inception, goal, date and time of dispatch or receipt of such

electronic record are accessible in the electronic record:

10. The It Act likewise addresses the essential issues of Security which are

so basic to the accomplishment of electronic exchanges. The Act has

additionally given a legitimate definition to the idea of secure

computerized marks which would be required to have been gone through

an arrangement of a security strategy, as stipulated by the administration

at a later date. In the circumstances to come, secure advanced marks

7 India emerging as cyber crime centre (2009), Available at www. Wegathernews.com

8 Casey, E. Digital evidence and computer crime, forensic science, computers and internet,

Londonacademic press 2011: pp.5-19.

International Journal of Pure and Applied Mathematics Special Issue

1240

Page 9: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

should assume a major part in the New Economy especially from the

point of view of the corporate division as it will empower a more secure

exchange online.9

In the present situation, data is incomparable. Data is put away on their

individual PC frameworks by the organizations separated from keeping up a go

down. Under the IT Act,2000, it might now be workable for corporates to have

a statutory cure on the off chance that in the event that anybody breaks into their

PC frameworks or system and causes harms or duplicates information. The cure

gave by the Act is as fiscal harms not surpassing Rs.100,00,000. This

punishment of harms apply to any individual who, without consent of the

proprietor or whatever other individual who is responsible for a PC, PC

framework or PC organize,- 10

1. Gets to or secures access to such PC, PC framework or PC organize.

2. Downloads, duplicates or concentrates any information, PC information

base or data from such PC, PC framework or PC organize including data

or information held or put away in any removable stockpiling medium;

3. Acquaints or causes with be presented any PC contaminant or PC

infection into any PC, PC framework or PC organize;

4. Harms or causes to be harmed any PC, PC framework or PC arrange,

information, PC information base or some other projects dwelling in

such PC, PC framework or PC organize;

5. Disturbs or causes interruption of any PC, PC framework or PC

organize;

6. Denies or makes the refusal of access any individual approved to get to

any PC, PC framework or PC organize using any and all means;

7. (g) Gives any help to any individual to encourage access to a PC, PC

framework or PC arrange in repudiation of the arrangements of this Act,

guidelines or controls made the reunder,

8. Charges the administrations profited of by a man to the record of

someone else by messing with or controlling any PC, PC framework, or

PC network.11

9. Corporates in India would now be able to take a murmur of alleviation

as the IT Act has characterized different digital violations and has

announced them corrective offenses culpable with detainment and fine.

These incorporate hacking and harm to PC source code. Regularly

corporates confront hacking into their frameworks and data. Till date,

the corporates were in a powerless condition as there was no lawful

review to such issues.But the IT Act changes the scene through and

through.

9 Farmer, Dan and Charles, mann c. Surveillance nation, Technology review, vol 106, No.4,

2003, pp.46. 10

Harrison, A. Privacy group critical of release of carnivore data, computer world, vol.34,

No.42,2006, pp.4 11

Hoffer.J.A, and D.W.straub 1989, the 9 to 5 underground: Are you policing computer

crimes, Sloan management Review (summer 1989), 35-43.

International Journal of Pure and Applied Mathematics Special Issue

1241

Page 10: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

In any case, regardless of the staggering positive highlights of the IT Act,2000

for the corporate segment, there are two or three issues that worry the corporates

in the said Act:-

1) The said step has come somewhat late. With the marvel development of

Internet which duplicates roughly every 100 days, the said Act ought to

have been breathed easy back.

2) It might be related to specify that the said Act implies to be material to

the entire of India as well as to any offense or contradiction there under

submitted outside of India by any individual. This arrangements in area

1(2) isn't obviously and joyfully drafted. It isn't clear in the matter of

how and in what specific way, the said Act should apply to any offense

or negation there under submitted outside of India by any individual.

The implementation part of the IT Act is a territory of grave concern.

Various troubles are probably going to emerge in the authorization of

the said Act as the medium of Internet has contracted the span of the

world and gradually, national limits should stop to have much

importance in Cyberspace.

3) It is additionally peculiar that area 1(4) of the said Act avoids various

things from the pertinence of the IT Act. The Act does not have any

significant bearing to (an) a debatable instrument as characterized in

area 13 of the Negotiable Instruments Act, 1881; (b) an energy of lawyer

as characterized in segment 1 An of the Powers-of-Attorney Act, 1882;

(c) a trust as characterized in segment 3 of the Indian Trusts Act, 1882;

(d) a will as characterized in statement (h) of segment 2 of the Indian

Succession Act, 1925 including some other testamentary demeanor by

whatever name called; (e) any agreement for the deal or movement of

undaunted property or any enthusiasm for such property. The said IT

Act as of now bars various essential things. The Act discusses advancing

electronic trade and it starts by barring relentless property from the

ambit of electronic business a thinking which makes no sense!

4) The IT Act, 2000 does not contact at all the issues identifying with

Domain Names. Indeed, even Domain Names have not been

characterized and the rights and liabilities of Domain Name proprietors

don't discover any specify in the said law. It might be presented that

Electronic Commerce depends on the arrangement of Domain Names

and barring such critical issues from the ambit of India's First Cyberlaw

does not speak to rationale.

5) The IT Act, 2000 does not likewise bargain at all with the Intellectual

Property Rights of Domain Name proprietors. Combative yet vital issues

concerning Copyright, Trademark and Patent have been left immaculate

in the said law consequently leaving numerous escape clauses in the said

law.

6) The IT Act discusses the utilization of electronic records and

computerized marks in government offices. However, unusually it

additionally says in area 9, this does not present any privilege upon any

individual to demand that the report in inquiries ought to be

International Journal of Pure and Applied Mathematics Special Issue

1242

Page 11: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

acknowledged in electronic frame. The control of the Government is

evident, as the Controller of Certifying Authorities needs to release his

capacities subject to the general control and course of Central

Government. The Internet and the marvel of electronic business require

that base obstacles and snags should be placed in their direction. The

Act tries to bureaucratize the whole procedure of controlling electronic

business. This is probably going to come about into outcomes of

deferrals and other related issues.

7) As Cyberlaw is developing, so are the new structures and signs of digital

wrongdoings. The offenses characterizes in the IT Act are in no way,

shape or form comprehensive. Be that as it may, the drafting of the

significant arrangements of the IT Act influence it to show up as though

the offenses itemized in the said IT Act are the main Cyber offenses

conceivable and existing. For instance, digital offenses like cybertheft,

cybers talking, digital badgering and digital maligning are not secured

under the Act.

8) The IT Act discusses Adjudicating Officers who should arbitrate

whether any individual has conferred a repudiation of any arrangements

of this Act of any tenets, controls, bearings or request made there under.

How these Adjudicating Officers will settle the contradiction of the Act

has not been clarified or very much characterized. Further, it has

additionally not been indicated with reference to how the said

Adjudicating Officers should decide if any contradiction of the Act or

any offense has been conferred by any individual outside India. Further,

what specialist would these Adjudicating Officers have viz-a-viz people

outside India who have conferred any digital offenses have not been

characterized. No complete strategy for arbitration by Adjudicating

Officers has been comprehensively spelt out by the IT Act. Encourage

the regional purview of the said Adjudicating Officers and furthermore

the Cyber Regulations Appellate Tribunal has not been characterized.

9) Section 55 of the IT Act expresses that no request of the Central

Government delegating any individual as the Presiding Officer of a

Cyber Appellate Tribunal might be brought being referred to in any way

and no Act or continuing before a Cyber Appellate Tribunal should be

brought being referred to in any way on the ground simply of any

deformity in the constitution of a Cyber Appellate Tribunal. The said

arrangements is violative of the Fundamental Rights of the nationals as

are cherished in Chapter III of the Constitution of India and the said

arrangement isn't practical and is probably going to be struck around the

courts. The Central Government can't assert resistance in arrangements

to Cyber Appellate Tribunal, as the same is in opposition to the soul of

the Constitution of India. Further, it might be presented that if there is a

deformity in the constitution of a Cyber Appellate Tribunal, that goes to

the foundation of the issue and renders all procedures and

demonstrations of the said Cyber Appellate Tribunal invalid and void

abinitio.

International Journal of Pure and Applied Mathematics Special Issue

1243

Page 12: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

10) Further the said IT Act discusses any organization of the legislature

capturing any data transmitted through any PC asset if the same is

important in light of a legitimate concern for the power or uprightness of

India, the security of the State, well disposed relations with outside

States or open request or for anticipating induction to the commission of

any cognizable offense. This is one arrangement which is probably

going to be abused by future governments to suit their political thought

processes as additionally with the end goal of exploitation. No

benchmarks or arrangements have been set around the IT Act, which

characterize any conditions definite above. The supporters of the reason

for singular security and flexibility see this arrangements as a gross

infringement of individual opportunity and that previously mentioned

conditions are outlandish limitations, which are not admissible with

regards to the quick development of Internet.

11) Further, the said IT Act is probably going to cause a contention of ward.

12) Another noteworthy hazy area is that the draconian forces given to a cop

not beneath rank of the Deputy Superintendent of Police under Section

80 of the Act have been left immaculate. No place on the planet do be

locate a parallel such a wide an unlimited energy to given to any officer

to investigate and keeping the commission of a digital wrongdoing. All

things considered, the power given by the IT Act to the said DSP

incorporates the ability to " enter any open place and hunt and capture

without warrant any individual discovered in that who is sensibly

associated or having conferred or with submitting or of being going to

submit any offense under this Act." The said control has been given with

no limitations of any sort at all. It is particularly conceivable that the

same is probably going to be abused and mishandled with regards to

Corporate India as organizations have open workplaces which would

come extremely close to "open place" under Section 80 and

organizations won't have the capacity to escape potential provocation

from the hands of the DSP . This region of the IT Act can be one of the

best worries for the administration, the industry and the general

population at large.12

13) The greatest worry about the new Indian Cyberlaw identifies with its

execution. The said Act does not set down parameters for its execution.

Additionally when Internet infiltration in India is amazingly low and

government and police authorities, by and large are not in the slightest

degree, PC astute, the new Indian Cyberlaw brings up a larger number of

issues than it answers them. It appears that the Parliament would be

required to revise the IT Act, 2000 to evacuate the hazy areas specified

previously.

All said and done, The Information Technology Act,2000 is an incredible

12

Sprecher. R, and M.pertl, 1988, intro industry effects of the MGM grand fire, quarterly

journal of business and economics, 96-16.

International Journal of Pure and Applied Mathematics Special Issue

1244

Page 13: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

accomplishment and an amazing advance ahead the correct way. The IT Act is

an initial step taken by the Government of India towards advancing the

development of electronic trade with the goal that Electronic Commerce in

India can jump frog to progress. Notwithstanding the entirety of its failings, it is

a first verifiable advance. (Khosrow-2014).

8. Suggestions

In order to prevent cybercrime IT Act has come up with 8 tips to avoid

cybercrime:

Constantly update passwords and login details: By changing your login details,

at least once or twice a month, you can cut down your chances of being a target

of cybercrime.

A secure computer will deter cyber criminals: Always be sure to activate your

firewall settings. Furthermore, installing anti-virus and anti-spyware software

will protect your computer from various forms of malware, viruses, Trojan

horses and other malicious software used to obtain your personal details.13

Be social media savy: Make sure your social networking profiles (e.g.

Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security

settings. Be careful what information you post online. Once it is on the Internet,

it is extremely difficult to remove.14

Secure mobile details :More often than not, we leave our mobile devices

unattended. By activating the built-in security features you can avoid any access

to personal details. Never store passwords, pin numbers and even your own

address on any mobile device.15

Protect your data: Use encryption for your most sensitive files such as tax

returns or financial records, make regular back-ups of all your important data,

and store it in a different location. Be aware of what you do while using WI-fi

hotspots: While these access points are convenient, they are far from secure.

Avoid conducting financial or corporate transactions on these networks.16

Protect your e-identity : Be cautious when giving out personal information such

as your name, address, phone number or financial information on the Internet.

Make sure that websites are secure (e.g. when making online purchases) or that

you’ve enabled privacy settings (e.g. when accessing/using social networking

sites).

13

Baskerville. R, 1991, risk analysis: An interpretive feasibility tool in justifying information

systems security European Journal of information systems, 121-139. 14

LymanJ. 2002, In search of the worlds costliest computer virus, www. Newsfactor.com 15

Cyber trust and crime prevention, midtime review, November 2005- January 2009. 16

Professionals p, The IT act, 2000, professional book, publisher 2011.

International Journal of Pure and Applied Mathematics Special Issue

1245

Page 14: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

Avoid being scammed: Always think before you click on a link or file of

unknown origin. Don’t feel pressured by any emails. Check the source of the

message. When in doubt, verify the source. Never reply to emails that ask you

to verify your information or confirm your user ID or password.

9. Conclusion

The information technology act is the sole savior to combat cyber crime in

nature. Though offences where computer is either tool or target also falls under

the Indian penal code and other legislation of the nation, but this act is a special

act to tackle the problem of cyber crime. The act was sharpened by the

amendment act of 2008, yet the act is still in it budding stage. There is grave

underreporting of cyber crimes in the nation. Cyber crime is commited every

now and then, but is hardly reported. The cases of cyber crime that reaches to

the court of law are therefore very few. There are practical difficulties in

collecting, storing and appreciating digital evidence. Thus the act has miles to

go and promises to keep of the victim of cyber crimes. To conclude i would

quote the words of noted cyber law expert in the nation and supreme court

advocate Mr.Pavan Duggal, 17

“While the lawmakers have to be complemented

for their admirable work removing various deficiencies in the Indian cyber law

and making it technologically neutral, yet it appers that there has been a major

mismatch between the expectation of the nation and the resultant effect of the

amended legislation. The most bizarre and startling aspect of the new

amendments is that these amendments seek to make the idnian cyber law a

cyber crime friendly legislation a legislation that goes extremely soft on cyber

criminals, with a soft heart, a legislation that chooses to encourage cyber

criminals by lessening the quantum of punishment accorded to them under the

existing law......a legislation which makes a majority of cyber crimes stipulated

under the act as bailable offences, a legislation that is likely to pave way for

india to become the potential cyber crime capital of the world......”18

References

[1] Wall, David.s. “Catching cyber criminals”. Testimony before the special oversight panel of terrorism committee on armed services, US House of Representatives, 23 May 2000.

[2] Ghosh, Sumit. “The Nature Of cyber attacks in the future: A position paper. “Information systems security (2004):18-33 Academic search premier 19 jan 2011.

[3] Virus glossary (2006), virus Dissemination, Available at www. Virtualpune.com.

17

Rona’s Nagpal,cyber crime and digital evidence- Indian perspective, Asian school of

cyber law, 2009. 18

Rohas Nagpal, fundamentals of cyber law, Asian school of cyber law, 2009.

International Journal of Pure and Applied Mathematics Special Issue

1246

Page 15: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

[4] Shantosh Raut (2008),Network interferences, Available at http//www.santodhraut.com.

[5] Jessica stanicon (2009), Available at http//www.dynamicbusiness.com.

[6] Prasun sonwalkar (2009), India emerging as centre for cybercrime: UK study, Available at http//www.livemint.com.

[7] India emerging as major cyber crime centre (2009), Available at http//we gather news.com.

[8] Casey, E.Digital evidence and computer crime, forensic science, computers and internet, London,academic press 2011: pp.5-19

[9] Farmer, Dan and Charles, Mann c. Surveillance nation, Technology review, vol.106,No.4, 2003: pp.46

[10] Harrison, A.privacy group critical of release of carnivore data, computer world, vol.34, No.41,2006:pp.4

[11] Hoffer , J.A, and D.W. Straub, 1989, the 9 to 5 underground: Are you policing computer crimes,Sloan management Review (summer 1989), 35-43.

[12] Sprecher, R. and M.pertl, 1988, intro industry effects of the MGM grand fire, quarterly journal of business and economics, 96-16.

[13] Baskerville R, 1991, risk analysis: An interpretive feasibility tool in justifying information systems security, European journal of information systems, 121-130.

[14] Lyman J, 2002, In search of the worlds costliest computer virus, http//www.newsfactor.com

[15] D’Amico A, 2000, what does a computer security breach really cost? The sans institute.

[16] Hancock.B, 2002, security crisis management- The basics, computers and security, 397-401.

[17] Cyber trust and crime prevention, mid term review, November 2005- January 2009.

[18] Professionals p, The IT act, 2000, professional book publisher 2011.

[19] Rohas Nagpal, fundamentals of cyber law, Asian school of cyber law, 2009.

[20] Rona’s Nagpal, cyber crime and digital evidence- Indian perspective, Asian school of cyber law, 2009.

International Journal of Pure and Applied Mathematics Special Issue

1247

Page 16: A Study on Cyber Crime in India: With Reference to it Act 2000A Study on Cyber Crime in India: With Reference to it Act 2000 1B. Mughundhan and 2M. Kannappan 1Saveetha School of Law,

1248