Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
A Study on Cyber Crime in India: With Reference to
it Act 2000 1B. Mughundhan and
2M. Kannappan
1Saveetha School of Law,
Saveetha Institute of Medical and Technical Sciences,
Saveetha University,
Chennai. 2Saveetha School of Law,
Saveetha Institute of Medical and Technical Sciences,
Saveetha University,
Chennai.
Abstract Cybercrime is evolving at an astounding pace, following the same
dynamic as the inevitable penetration of computer technology and
communication into all walks of life. Whilst society is inventing and
evolving, at the same time, criminals are deploying a remarkable
adaptability in order to derive the greatest benefit from it. To avoid giving
cybercriminals the initiative, it is important for those involved in the fight
against cybercrime to try to anticipate qualitative and quantitative changes
in its underlying elements so that they can adjust their methods
appropriately. This paper highlights the importance of computer in human
life. It elaborates the concept of cyber crime. It discusses the provisions of
information technology act, 2000 along with the sweeping changes brought
in by the amendment act f 2008. An attempt is been made to discuss the
salient features of the amendment act of 2008. In this paper the important
provisions of information technology act are discussed.
Key Words:Cyber crime, computer, information technology act, digital
signature, electronic signature.
International Journal of Pure and Applied MathematicsVolume 119 No. 17 2018, 1233-1248ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/
1233
1. Introduction
Cybercrime" consolidates the expression "wrongdoing" with the root "digital"
from "computerized", from the Greek, "kubernân", which intends to lead or
oversee. The "digital" condition incorporates all types of computerized
exercises, paying little respect to whether they are led through systems and
without outskirts. This broadens the past term "PC wrongdoing" to incorporate
violations carried out utilizing the Internet, every single advanced wrongdoing,
and wrongdoings including broadcast communications systems. This later
phrasing covers a wide assortment of aspects, prompting distinctive
methodologies, contingent upon the prevailing society of the specialists,
influencing it to show up either lessened or extended, in various measurements,
managing developing issues that additionally mirror its decent variety.
Wrongdoing is a social and financial marvel and is as old as the human culture.
Wrongdoing is a lawful idea and has the authorize of the law. Wrongdoing or an
offense is "a legitimate wrong that can be trailed by criminal procedures which
may come about into discipline." The sign of guiltiness is that, it is rupture of
the criminal law. Per Lord Atkin "the criminal nature of a demonstration can't
be found by reference to any standard however one: is the demonstration
disallowed with corrective consequences".1 A wrongdoing might be said to be
any lead joined by act or exclusion disallowed by law and noteworthy rupture of
which is gone by reformatory results. The growing range of PCs and the web
has made it less demanding for individuals to stay in contact crosswise over
long separations and work together for purposes identified with business,
training and culture among others. Notwithstanding, the implies that empower
the free stream of data crosswise over outskirts likewise offer ascent to a
worryingly high frequency of reckless conduct. Any innovation is equipped for
useful uses and abuse. It is the activity of the legitimate framework and
administrative offices to keep pace with the same and guarantee that more
current advances don't progress toward becoming instruments of abuse and
badgering. Notwithstanding, generous lawful inquiries have emerged in
numerous specific circumstances. The World Wide Web enables clients to
course content as content, pictures, recordings and sounds. Sites are made and
refreshed for some, valuable purposes, however they can likewise be utilized to
circle hostile substance, for example, explicit entertainment, abhor discourse
and defamatory materials. Much of the time, the licensed innovation privileges
of creators and specialists are damaged through the unapproved dissemination
of their works. There has likewise been an upsurge in occasions of money
related extortion and bamboozling in connection to business exchanges directed
online.2
1 Wall, David.s, “catching cyber criminals”. Testimony before the special oversight panel
of terrorism committee on armed services, US House of Representatives, 23 May 2000. 2 Ghosh, Sumit, “The Nature of cyber attacks in the future : A position paper, “information
systems security (2004): 18-33 Academic search premier 19 jan 2011.
International Journal of Pure and Applied Mathematics Special Issue
1234
The computerized medium gives the helpful shield of secrecy and phony
personalities. Errant people turn out to be more encouraged in their hostile
conduct on the off chance that they believe that they won't confront any results.
Lately, there have been various reports of web clients getting spontaneous
messages which regularly contains foul dialect and sums to provocation. The
individuals who post individual data about themselves on employment and
marriage to sites or informal communication sites are regularly at the less than
desirable end of 'digital stalking'. Ladies and minors who post their contact
points of interest turn out to be particularly defenseless.
The aim of the research is to study about cyber crime in india and to identify
the effects after the amendment of IT act.
2. Materials and Methods
This research has been carried out in an doctrinal method. Sources are
secondary sources mainly books and e-sources.
Hypothesis
ALTERNATIVE: The IT act achieved its purpose by curbing cyber crime in
india.
NULL: The IT act has been ineffective in controlling cyber crime in india.
3. Review of Literature
The cyber terrorism are occurred in 3 angles they are: The truth about cyber
terrorism, could laws regulate this issue? and address the issues of cyber
crime.(P.Madhava-2011). In this paper the author tied to discuss about the
phenomenon of cyber terrorism and its growing impact in the current scenario.
This paper concluded that the existing laws in various countries are not efficient
to restrain the cyber crime (Prashanth vats-2016). The aim of the author(Alvin
toffler) is to study cyber terrorism as another dimension of asymmetric warfare.
And to suggest measures to overcome this threat. This author (pavan Duggar-
2002)presents the meaning and definition of cyber crime, the legislation in India
dealing with offences relating to the use of computer or other electronic
gadgets. This author(Nikhil, A.gupta-2014) highlights the importance of
computers in human life. In particular this article discusses about the provisions
of IT act 2000 and concluded with some quotes according to the provisions of
cyber crime. The books categories the infrastructure that requires protection.
The issues associate with each, and the responsibilities of the public and private
sector in securing the infrastructure(Jody.R-2004). In this book you will learn
about the technological and logistic framework of cyber crime, as well as the
social and legal backgrounds of its prosecution and investigation.(Babak-2014).
This book tackles the fast growing topic of cyber crime and covers a wide range
of topics from electronic fraud, cyber stalking, online theft and intellectual
property to more involved topics like malicious ( Mathew Richards-2014).
International Journal of Pure and Applied Mathematics Special Issue
1235
4. Cyber Crime in India
Innovative Aspect of Cybercrime
From an innovative measurement, different specialists bring up the requirement
for a far reaching term, for example, "electronic wrongdoing" or "e-
wrongdoing", because of the joining of ICT, including versatile innovation,
communication, memory, 14 observation frameworks, and different advances,
including nanotechnology and mechanical technology, which must be
considered starting now and into the foreseeable future. These electronic media
will be focused on progressively more regularly and will likewise be utilized to
disguise, carry out, or bolster wrongdoings and offenses. Just the positive
activities for which at least one means were utilized to submit one of the
components of the offense can be included.3
Anthropological Aspect of Cybercrime
From an anthropological viewpoint, cybercrime starts from different populaces
and displays socio educational, financial, and techno-ideological elements and
their appearances, including obsessive articulations like compulsion. The
maladjustment of the instruction framework may add to the advancement of
new types of cybercrime or freak practices and conduct with different levels of
seriousness, including bamboozling and reputational harm, which can be
identified with dissatisfactions and the redefinition of material and national
qualities, conflicting with what is normal when drawing closer and driving a
grown-up life. Troublesome financial conditions additionally incorporate the
Internet as a place for communicating mental issues with financial starting
points, including burglary, youngster smut, and calls for uprisings, viciousness,
and disdain. With respect to techno ideological factors, one must consider
locales and systems went for purposeful publicity, destabilization, and
individual and mass mental control utilizing techniques that include the
advanced handling of pictures, recordings, and audio.4
Key Aspect of Cybercrime
From a key viewpoint, cybercrime is viewed as an offense to digital security, to
be specific assaults to computerized systems to seize control, incapacitating
them, or notwithstanding annihilating frameworks that are crucial to
governments and divisions of imperative significance
5. Effect of Cyber Crime
This area displays the outcomes concerning the effect of mechanical change and
leaps forward of predominance – or rather, of the expansion – of cybercrime
amid the 2010 to 2020 decade
3 Virus glossary (2006), virus discrimination, Available at www. Virtualpune.com.
4 Shanthosh Raut (2008), Network interferences, Available at www. Santodhraut. Com
International Journal of Pure and Applied Mathematics Special Issue
1236
Impression of the Impact of Cybercrime
The effect of cybercrime is difficult to recognize. However, there is an
expansion in the advancement of data innovation and the abuse of
vulnerabilities among cybercriminals, a hole amongst legitimate and degenerate
nations, and a Catch 22 identified with mechanical improvements and
achievements. It is constantly advantageous to recall that innovation itself is
neutral.(Baba-2014). Be that as it may, its utilization can be portrayed as
negative or positive. This is particularly valid in cryptography, utilized for
securing exchanges and information trade and also to secure interchanges
covering unlawful exercises and the foundation of proof. History demonstrates
that new advancements, once in a while controlled and not completely total, are
both utilized for good and bad. The next ten years will be set apart by
portability, with the requirement for accessibility, ongoing correspondence,
availability, and a reliance on computerized character hardware and hazard.
This decade will likewise incorporate checking automata frameworks and
progressively new dangers
Negative Developments concerning Cybercrime
Expected advancements, which may negatively affect cybercrime, render little
refinement between work life and private life, utilizing for instance the trouble
of finding data for an organization and Web applications with distributed
computing, directed stealth malware, and all the more by and large, the gigantic
utilization of new advances, including versatile and remote innovations, and a
thoughtless introduction to social building, informal communities, and portable
downloads did less safely than before. We should stress the unstable idea of
discovering information as confirmation and the trouble of announcing offenses
to the sources, with no lawful means, in light of the fact that cybercriminals are
adjusting close by new advances
Positive Developments as to Cybercrime
Safety efforts in view of these same advancements could have a positive effect.
Security is fundamental to the issue and should be founded on approaches and
be entirely upheld. It will be a noteworthy test with distributed computing,
because of the intricacy of where information is put away and the various wards
included, real dangers related with administration and territoriality. The
successful level of value security will be a key factor in the acknowledgment of
these new administrations
6. Cyber Crimes and the Nature of Evidence
The idea of proof in reality and the virtual world is unique. This uniqueness is
prominent in every one of the phases of proof location, social affair, stockpiling
and display under the watchful eye of the court. The basic part is that all the
examination experts that are capable ideal from the phase of accumulation of
the confirmation to the introduction of the proof under the steady gaze of the
court must comprehend the recognizing qualities of the proof with the goal that
International Journal of Pure and Applied Mathematics Special Issue
1237
they can save the proof gathered by them. In such manner the part of the legal
likewise winds up crucial as the legal should likewise be in the situation to
value the PC confirm displayed before them. In spite of this present reality
wrongdoings where any substantial proof as fingerprints, weapon of
wrongdoing, blood recolor marks and so forth can be followed, in the virtual
world such follows turn out to be extremely hard to discover. The art of PC
criminology is picking up centrality in the examination offices, corporate world,
government divisions and so on. Give us a chance to see a portion of the
difficulties that are engaged with the procedure of digital confirmation
discovery, social affair, stockpiling and show under the steady gaze of the court.
It is viewed as hard to cancel the data from the PC framework than what is for
the most part considered. This should be possible with the assistance of PC
crime scene investigation who can assemble prove or considerably recuperate
data which may have been erased deliberately. It is crucial that the casualty
report the law requirement organizations about the wrongdoing as right on time
as could be expected under the circumstances. The procedure of protection of
digital wrongdoing proof exists in the comprehension of a proficient and
educated PC crime scene investigation master in light of the fact that any lack of
regard in the process can prompt little estimation of the confirmation. The
frequently confronted obstacle is that the victim– organizations are more
worried about rebuilding of their frameworks to full operational status instead
of permitting legitimate proof accumulation. Along these lines the auspicious
help of the PC legal sciences master can help gather prove from the framework
inside most brief time conceivable.
Digital proof is of physical or coherent nature. It is the physical confirmation
that can be followed effectively as the agent simply needs to visit the scene of
wrongdoing and scan for and take into his guardianship PC equipment, which
may constitute primary casing PCs to take estimated individual associates,
floppy diskettes, electronic chips and so forth. The features of the sensible part
of the digital proof are of various nature. This involves a procedure portrayed as
Information Discovery' wherein the agent examines through the log documents,
and tries to rescue the information from a PC framework which has been
influenced. Once the required proof is recognized, at that point the examiner
must guarantee that the same is gathered by holding fast to the legitimate
prerequisites, for example, prove is gathered simply after the essential warrant
for it is issued or if the data has all the earmarks of being outside the extent of
the warrant then extra warrant be issued. The confirmation gathered winds up
substantial in the official courtrooms just if the proof is gathered by legitimate.
Right now just officers not beneath the rank of a Deputy Superintendent of
Police and officers deputed by the focal government can be approved to enter
open places and gathers confirmation and complete inquiry tasks and arrest17.
This specialist has been given to higher review officers right now keeping in see
the abuse of this power viz. appropriate to protection and guaranteeing the
legitimacy of the digital proof As of now in India the idea of 'Sensible desire for
International Journal of Pure and Applied Mathematics Special Issue
1238
Privacy' has not be produced. The issues engaged with this are whether a
'person's manner reflects subjective desire for protection' or 'the person's
subjective desire for security is to such an extent that the general public is
prepared to remember it as reasonable.5
Another quarter which should be tried under digital confirmation and which is
unavoidable is the valuation for the PC created prove by every one of the
experts related with the procedure of organization of equity. In this way the
judiciary19 as well as the prosecutors, the resistance legal advisors must get
comfortable with the details, this is so in light of the fact that till now these
experts were managing proof in the substantial shape yet the idea of
confirmation experiences finish change under the virtual medium, they should
modify themselves to value the proof in intelligent organization.
7. Effects of it Act
1. The ramifications of these arrangements for the corporate segment
would be that email will now be a substantial and authoritative
document of correspondence in our nation, which can be properly
delivered and affirmed in an official courtroom. The corporates today
flourish with email, not just as the type of correspondence with
substances exterior the organization yet in addition email is utilized as a
crucial devices for intra organization correspondence. Till now it has
been seen that the corporates in their intra organization correspondences
on email have not been exceptionally watchful in utilizing the dialect in
such messages. Corporates should comprehend that they might should
be more watchful while composing messages, regardless of whether
outside the organization or inside as the same with whatever dialect
could be demonstrated in the official courtroom, once in a while much to
the hindrance of the organization. Indeed, even intra organization notes
and updates, till now utilized just for official purposes, should likewise
be coming surprisingly close to the IT Act and will be acceptable as
confirmation in a courtroom. A conceivable outcome of the same for a
run of the mill wired organization would be that any representative,
despondent with a specific email correspondence, regardless of whether
in individual or got in an official or individual limit, may make the said
email as the establishment for propelling a suit in a courtroom. Further,
when an organization official sends an email to another official in the
organization with some defamatory or other related material and
duplicates the same to others, there are conceivable outcomes that he
may arrive in a case in a court of law.6
2. Companies might now have the capacity to complete electronic business
utilizing the lawful foundation gave by the Act. Till now, the
5 Jessica stanicon (2009), Available at www. Dynamicbusiness.com
6 Prasun sonwalkar(2009), India emerging as centre for cyber crime: UK study, Available at
www. Livemint.com
International Journal of Pure and Applied Mathematics Special Issue
1239
development of Electronic business was obstructed in our nation
essentially in light of the fact that there was no lawful foundation to
manage business exchanges on the web.
3. Corporates will now have the capacity to utilize advanced marks to do
their exchanges on the web. These computerized marks have been given
legitimate legitimacy and endorse in the Act.
4. The Act likewise tosses open the entryways for the section of corporates
in the matter of being of being Certifying Authorities for issuing Digital
Signatures Certificates. The Act does not make any refinement between
any legitimate substance for being delegated as a Certifying Authority
insofar as the standards stipulated by the administration have been
followed.7
5. The Act additionally empowers the organizations to record any frame,
application or some other archive with any office, expert, body or office
possessed or controlled by the proper Government in the electronic
shape by methods for such electronic shape as might be recommended
by the suitable Government. India is quickly pushing forward in the field
of electronic administration and it won't be well before governments
begin taking applications or issuing permit, allow, authorize or
endorsements ,by whatever name called, online . This arrangement
should be an extraordinary leveler as this will empower a wide range of
organizations to complete a ton of their connection with various
government offices on the web, along these lines sparing costs, time and
wastage of valuable manpower.8
6. Corporates are commanded by various laws of the nation to keep and
hold significant and corporate data. The IT Act empowers organizations
legitimately to hold the said data in the electronic shape.
7. If the data contained in that remaining parts open to be usable for an
ensuing reference;
8. The electronic record is held in the arrangement in which it was initially
created, sent or got or in an organization which can be shown to speak to
precisely the data initially produced, sent or got;
9. The points of interest which will encourage the distinguishing proof of
the inception, goal, date and time of dispatch or receipt of such
electronic record are accessible in the electronic record:
10. The It Act likewise addresses the essential issues of Security which are
so basic to the accomplishment of electronic exchanges. The Act has
additionally given a legitimate definition to the idea of secure
computerized marks which would be required to have been gone through
an arrangement of a security strategy, as stipulated by the administration
at a later date. In the circumstances to come, secure advanced marks
7 India emerging as cyber crime centre (2009), Available at www. Wegathernews.com
8 Casey, E. Digital evidence and computer crime, forensic science, computers and internet,
Londonacademic press 2011: pp.5-19.
International Journal of Pure and Applied Mathematics Special Issue
1240
should assume a major part in the New Economy especially from the
point of view of the corporate division as it will empower a more secure
exchange online.9
In the present situation, data is incomparable. Data is put away on their
individual PC frameworks by the organizations separated from keeping up a go
down. Under the IT Act,2000, it might now be workable for corporates to have
a statutory cure on the off chance that in the event that anybody breaks into their
PC frameworks or system and causes harms or duplicates information. The cure
gave by the Act is as fiscal harms not surpassing Rs.100,00,000. This
punishment of harms apply to any individual who, without consent of the
proprietor or whatever other individual who is responsible for a PC, PC
framework or PC organize,- 10
1. Gets to or secures access to such PC, PC framework or PC organize.
2. Downloads, duplicates or concentrates any information, PC information
base or data from such PC, PC framework or PC organize including data
or information held or put away in any removable stockpiling medium;
3. Acquaints or causes with be presented any PC contaminant or PC
infection into any PC, PC framework or PC organize;
4. Harms or causes to be harmed any PC, PC framework or PC arrange,
information, PC information base or some other projects dwelling in
such PC, PC framework or PC organize;
5. Disturbs or causes interruption of any PC, PC framework or PC
organize;
6. Denies or makes the refusal of access any individual approved to get to
any PC, PC framework or PC organize using any and all means;
7. (g) Gives any help to any individual to encourage access to a PC, PC
framework or PC arrange in repudiation of the arrangements of this Act,
guidelines or controls made the reunder,
8. Charges the administrations profited of by a man to the record of
someone else by messing with or controlling any PC, PC framework, or
PC network.11
9. Corporates in India would now be able to take a murmur of alleviation
as the IT Act has characterized different digital violations and has
announced them corrective offenses culpable with detainment and fine.
These incorporate hacking and harm to PC source code. Regularly
corporates confront hacking into their frameworks and data. Till date,
the corporates were in a powerless condition as there was no lawful
review to such issues.But the IT Act changes the scene through and
through.
9 Farmer, Dan and Charles, mann c. Surveillance nation, Technology review, vol 106, No.4,
2003, pp.46. 10
Harrison, A. Privacy group critical of release of carnivore data, computer world, vol.34,
No.42,2006, pp.4 11
Hoffer.J.A, and D.W.straub 1989, the 9 to 5 underground: Are you policing computer
crimes, Sloan management Review (summer 1989), 35-43.
International Journal of Pure and Applied Mathematics Special Issue
1241
In any case, regardless of the staggering positive highlights of the IT Act,2000
for the corporate segment, there are two or three issues that worry the corporates
in the said Act:-
1) The said step has come somewhat late. With the marvel development of
Internet which duplicates roughly every 100 days, the said Act ought to
have been breathed easy back.
2) It might be related to specify that the said Act implies to be material to
the entire of India as well as to any offense or contradiction there under
submitted outside of India by any individual. This arrangements in area
1(2) isn't obviously and joyfully drafted. It isn't clear in the matter of
how and in what specific way, the said Act should apply to any offense
or negation there under submitted outside of India by any individual.
The implementation part of the IT Act is a territory of grave concern.
Various troubles are probably going to emerge in the authorization of
the said Act as the medium of Internet has contracted the span of the
world and gradually, national limits should stop to have much
importance in Cyberspace.
3) It is additionally peculiar that area 1(4) of the said Act avoids various
things from the pertinence of the IT Act. The Act does not have any
significant bearing to (an) a debatable instrument as characterized in
area 13 of the Negotiable Instruments Act, 1881; (b) an energy of lawyer
as characterized in segment 1 An of the Powers-of-Attorney Act, 1882;
(c) a trust as characterized in segment 3 of the Indian Trusts Act, 1882;
(d) a will as characterized in statement (h) of segment 2 of the Indian
Succession Act, 1925 including some other testamentary demeanor by
whatever name called; (e) any agreement for the deal or movement of
undaunted property or any enthusiasm for such property. The said IT
Act as of now bars various essential things. The Act discusses advancing
electronic trade and it starts by barring relentless property from the
ambit of electronic business a thinking which makes no sense!
4) The IT Act, 2000 does not contact at all the issues identifying with
Domain Names. Indeed, even Domain Names have not been
characterized and the rights and liabilities of Domain Name proprietors
don't discover any specify in the said law. It might be presented that
Electronic Commerce depends on the arrangement of Domain Names
and barring such critical issues from the ambit of India's First Cyberlaw
does not speak to rationale.
5) The IT Act, 2000 does not likewise bargain at all with the Intellectual
Property Rights of Domain Name proprietors. Combative yet vital issues
concerning Copyright, Trademark and Patent have been left immaculate
in the said law consequently leaving numerous escape clauses in the said
law.
6) The IT Act discusses the utilization of electronic records and
computerized marks in government offices. However, unusually it
additionally says in area 9, this does not present any privilege upon any
individual to demand that the report in inquiries ought to be
International Journal of Pure and Applied Mathematics Special Issue
1242
acknowledged in electronic frame. The control of the Government is
evident, as the Controller of Certifying Authorities needs to release his
capacities subject to the general control and course of Central
Government. The Internet and the marvel of electronic business require
that base obstacles and snags should be placed in their direction. The
Act tries to bureaucratize the whole procedure of controlling electronic
business. This is probably going to come about into outcomes of
deferrals and other related issues.
7) As Cyberlaw is developing, so are the new structures and signs of digital
wrongdoings. The offenses characterizes in the IT Act are in no way,
shape or form comprehensive. Be that as it may, the drafting of the
significant arrangements of the IT Act influence it to show up as though
the offenses itemized in the said IT Act are the main Cyber offenses
conceivable and existing. For instance, digital offenses like cybertheft,
cybers talking, digital badgering and digital maligning are not secured
under the Act.
8) The IT Act discusses Adjudicating Officers who should arbitrate
whether any individual has conferred a repudiation of any arrangements
of this Act of any tenets, controls, bearings or request made there under.
How these Adjudicating Officers will settle the contradiction of the Act
has not been clarified or very much characterized. Further, it has
additionally not been indicated with reference to how the said
Adjudicating Officers should decide if any contradiction of the Act or
any offense has been conferred by any individual outside India. Further,
what specialist would these Adjudicating Officers have viz-a-viz people
outside India who have conferred any digital offenses have not been
characterized. No complete strategy for arbitration by Adjudicating
Officers has been comprehensively spelt out by the IT Act. Encourage
the regional purview of the said Adjudicating Officers and furthermore
the Cyber Regulations Appellate Tribunal has not been characterized.
9) Section 55 of the IT Act expresses that no request of the Central
Government delegating any individual as the Presiding Officer of a
Cyber Appellate Tribunal might be brought being referred to in any way
and no Act or continuing before a Cyber Appellate Tribunal should be
brought being referred to in any way on the ground simply of any
deformity in the constitution of a Cyber Appellate Tribunal. The said
arrangements is violative of the Fundamental Rights of the nationals as
are cherished in Chapter III of the Constitution of India and the said
arrangement isn't practical and is probably going to be struck around the
courts. The Central Government can't assert resistance in arrangements
to Cyber Appellate Tribunal, as the same is in opposition to the soul of
the Constitution of India. Further, it might be presented that if there is a
deformity in the constitution of a Cyber Appellate Tribunal, that goes to
the foundation of the issue and renders all procedures and
demonstrations of the said Cyber Appellate Tribunal invalid and void
abinitio.
International Journal of Pure and Applied Mathematics Special Issue
1243
10) Further the said IT Act discusses any organization of the legislature
capturing any data transmitted through any PC asset if the same is
important in light of a legitimate concern for the power or uprightness of
India, the security of the State, well disposed relations with outside
States or open request or for anticipating induction to the commission of
any cognizable offense. This is one arrangement which is probably
going to be abused by future governments to suit their political thought
processes as additionally with the end goal of exploitation. No
benchmarks or arrangements have been set around the IT Act, which
characterize any conditions definite above. The supporters of the reason
for singular security and flexibility see this arrangements as a gross
infringement of individual opportunity and that previously mentioned
conditions are outlandish limitations, which are not admissible with
regards to the quick development of Internet.
11) Further, the said IT Act is probably going to cause a contention of ward.
12) Another noteworthy hazy area is that the draconian forces given to a cop
not beneath rank of the Deputy Superintendent of Police under Section
80 of the Act have been left immaculate. No place on the planet do be
locate a parallel such a wide an unlimited energy to given to any officer
to investigate and keeping the commission of a digital wrongdoing. All
things considered, the power given by the IT Act to the said DSP
incorporates the ability to " enter any open place and hunt and capture
without warrant any individual discovered in that who is sensibly
associated or having conferred or with submitting or of being going to
submit any offense under this Act." The said control has been given with
no limitations of any sort at all. It is particularly conceivable that the
same is probably going to be abused and mishandled with regards to
Corporate India as organizations have open workplaces which would
come extremely close to "open place" under Section 80 and
organizations won't have the capacity to escape potential provocation
from the hands of the DSP . This region of the IT Act can be one of the
best worries for the administration, the industry and the general
population at large.12
13) The greatest worry about the new Indian Cyberlaw identifies with its
execution. The said Act does not set down parameters for its execution.
Additionally when Internet infiltration in India is amazingly low and
government and police authorities, by and large are not in the slightest
degree, PC astute, the new Indian Cyberlaw brings up a larger number of
issues than it answers them. It appears that the Parliament would be
required to revise the IT Act, 2000 to evacuate the hazy areas specified
previously.
All said and done, The Information Technology Act,2000 is an incredible
12
Sprecher. R, and M.pertl, 1988, intro industry effects of the MGM grand fire, quarterly
journal of business and economics, 96-16.
International Journal of Pure and Applied Mathematics Special Issue
1244
accomplishment and an amazing advance ahead the correct way. The IT Act is
an initial step taken by the Government of India towards advancing the
development of electronic trade with the goal that Electronic Commerce in
India can jump frog to progress. Notwithstanding the entirety of its failings, it is
a first verifiable advance. (Khosrow-2014).
8. Suggestions
In order to prevent cybercrime IT Act has come up with 8 tips to avoid
cybercrime:
Constantly update passwords and login details: By changing your login details,
at least once or twice a month, you can cut down your chances of being a target
of cybercrime.
A secure computer will deter cyber criminals: Always be sure to activate your
firewall settings. Furthermore, installing anti-virus and anti-spyware software
will protect your computer from various forms of malware, viruses, Trojan
horses and other malicious software used to obtain your personal details.13
Be social media savy: Make sure your social networking profiles (e.g.
Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security
settings. Be careful what information you post online. Once it is on the Internet,
it is extremely difficult to remove.14
Secure mobile details :More often than not, we leave our mobile devices
unattended. By activating the built-in security features you can avoid any access
to personal details. Never store passwords, pin numbers and even your own
address on any mobile device.15
Protect your data: Use encryption for your most sensitive files such as tax
returns or financial records, make regular back-ups of all your important data,
and store it in a different location. Be aware of what you do while using WI-fi
hotspots: While these access points are convenient, they are far from secure.
Avoid conducting financial or corporate transactions on these networks.16
Protect your e-identity : Be cautious when giving out personal information such
as your name, address, phone number or financial information on the Internet.
Make sure that websites are secure (e.g. when making online purchases) or that
you’ve enabled privacy settings (e.g. when accessing/using social networking
sites).
13
Baskerville. R, 1991, risk analysis: An interpretive feasibility tool in justifying information
systems security European Journal of information systems, 121-139. 14
LymanJ. 2002, In search of the worlds costliest computer virus, www. Newsfactor.com 15
Cyber trust and crime prevention, midtime review, November 2005- January 2009. 16
Professionals p, The IT act, 2000, professional book, publisher 2011.
International Journal of Pure and Applied Mathematics Special Issue
1245
Avoid being scammed: Always think before you click on a link or file of
unknown origin. Don’t feel pressured by any emails. Check the source of the
message. When in doubt, verify the source. Never reply to emails that ask you
to verify your information or confirm your user ID or password.
9. Conclusion
The information technology act is the sole savior to combat cyber crime in
nature. Though offences where computer is either tool or target also falls under
the Indian penal code and other legislation of the nation, but this act is a special
act to tackle the problem of cyber crime. The act was sharpened by the
amendment act of 2008, yet the act is still in it budding stage. There is grave
underreporting of cyber crimes in the nation. Cyber crime is commited every
now and then, but is hardly reported. The cases of cyber crime that reaches to
the court of law are therefore very few. There are practical difficulties in
collecting, storing and appreciating digital evidence. Thus the act has miles to
go and promises to keep of the victim of cyber crimes. To conclude i would
quote the words of noted cyber law expert in the nation and supreme court
advocate Mr.Pavan Duggal, 17
“While the lawmakers have to be complemented
for their admirable work removing various deficiencies in the Indian cyber law
and making it technologically neutral, yet it appers that there has been a major
mismatch between the expectation of the nation and the resultant effect of the
amended legislation. The most bizarre and startling aspect of the new
amendments is that these amendments seek to make the idnian cyber law a
cyber crime friendly legislation a legislation that goes extremely soft on cyber
criminals, with a soft heart, a legislation that chooses to encourage cyber
criminals by lessening the quantum of punishment accorded to them under the
existing law......a legislation which makes a majority of cyber crimes stipulated
under the act as bailable offences, a legislation that is likely to pave way for
india to become the potential cyber crime capital of the world......”18
References
[1] Wall, David.s. “Catching cyber criminals”. Testimony before the special oversight panel of terrorism committee on armed services, US House of Representatives, 23 May 2000.
[2] Ghosh, Sumit. “The Nature Of cyber attacks in the future: A position paper. “Information systems security (2004):18-33 Academic search premier 19 jan 2011.
[3] Virus glossary (2006), virus Dissemination, Available at www. Virtualpune.com.
17
Rona’s Nagpal,cyber crime and digital evidence- Indian perspective, Asian school of
cyber law, 2009. 18
Rohas Nagpal, fundamentals of cyber law, Asian school of cyber law, 2009.
International Journal of Pure and Applied Mathematics Special Issue
1246
[4] Shantosh Raut (2008),Network interferences, Available at http//www.santodhraut.com.
[5] Jessica stanicon (2009), Available at http//www.dynamicbusiness.com.
[6] Prasun sonwalkar (2009), India emerging as centre for cybercrime: UK study, Available at http//www.livemint.com.
[7] India emerging as major cyber crime centre (2009), Available at http//we gather news.com.
[8] Casey, E.Digital evidence and computer crime, forensic science, computers and internet, London,academic press 2011: pp.5-19
[9] Farmer, Dan and Charles, Mann c. Surveillance nation, Technology review, vol.106,No.4, 2003: pp.46
[10] Harrison, A.privacy group critical of release of carnivore data, computer world, vol.34, No.41,2006:pp.4
[11] Hoffer , J.A, and D.W. Straub, 1989, the 9 to 5 underground: Are you policing computer crimes,Sloan management Review (summer 1989), 35-43.
[12] Sprecher, R. and M.pertl, 1988, intro industry effects of the MGM grand fire, quarterly journal of business and economics, 96-16.
[13] Baskerville R, 1991, risk analysis: An interpretive feasibility tool in justifying information systems security, European journal of information systems, 121-130.
[14] Lyman J, 2002, In search of the worlds costliest computer virus, http//www.newsfactor.com
[15] D’Amico A, 2000, what does a computer security breach really cost? The sans institute.
[16] Hancock.B, 2002, security crisis management- The basics, computers and security, 397-401.
[17] Cyber trust and crime prevention, mid term review, November 2005- January 2009.
[18] Professionals p, The IT act, 2000, professional book publisher 2011.
[19] Rohas Nagpal, fundamentals of cyber law, Asian school of cyber law, 2009.
[20] Rona’s Nagpal, cyber crime and digital evidence- Indian perspective, Asian school of cyber law, 2009.
International Journal of Pure and Applied Mathematics Special Issue
1247
1248