Cyber Crimes - An Indian Perspective: Ms - Preeti Jain
Cyber Crimes - An Indian Perspective: Ms - Preeti Jain
, 2016 1
Ms.Preeti Jain
Introduction
The different types of Internet crime vary in their design and how
easily they are able to be committed. The typical crimes in
criminal history are now being brought to a whole different level of
innovation and ingenuity. Such new crimes devoted to the
Internet are email “phishing”, hijacking domain names, virus
immistion, and cyber vandalism. A couple of these crimes are
activities that have been exposed and introduced into the world.
People have been trying to solve virus problems by installing virus
protection software and other software that can protect their
computers. Other crimes such as email “phishing” are not as
known to the public until an individual receives one of these
fraudulent emails. These emails are cover faced by the illusion
that the email is from your bank or another bank. When a person
reads the email he/she is informed of a problem with he/she
personal account or another individual wants to send the person
some of their money and deposit it directly into their account. The
email asks for your personal account information and when a
person gives this information away, they are financing the work of
a criminal.
Company Secretary.
Cyber Laws
Since the first computer crime law, the Counterfeit Access Device
and Computer Fraud and Abuse Act of 1984, the government has
been trying to track down and stop online criminals. The FBI has
tried many programs and investigations in order to deter Internet
crime, like creating an online crime registry for employers
(Metchik 29). The reality is that Internet criminals are rarely
caught. One reason is that hackers will use one computer in one
country to hack another computer in another country. Another
eluding technique used is the changing of the emails, which are
involved in virus attacks and “phishing” emails so that a pattern
cannot be recognized. An individual can do their best to protect
themselves simply by being cautious and careful. Internet users
need to watch suspicious emails, use unique passwords, and run
anti-virus and anti-spyware software. Do not open any email or
run programs from unknown sources.
In May 2000, both the houses of the Indian Parliament passed the
Information Technology Bill. The Bill received the assent of the
President in August 2000 and came to be known as the
Information Technology Act, 2000. Cyber laws are contained in
the IT Act, 2000 / amendment thereof. This Act aims to provide
the legal infrastructure for e-commerce in India. And the cyber
laws have a major impact for e-businesses and the new economy
in India. So, it is important to understand what are the various
perspectives of the IT Act, 2000 and what it offers.
The Information Technology Act, 2000 also aims to provide for the
legal framework so that legal sanctity is accorded to all electronic
records and other activities carried out by electronic means. The
Act states that unless otherwise agreed, an acceptance of contract
may be expressed by electronic means of communication and the
same shall have legal validity and enforceability.
Chapter-XI of the Act talks about various offences and the said
offences shall be investigated only by a Police Officer not below the
rank of the Deputy Superintendent of Police. These offences
include tampering with computer source documents, publishing
of information, which is obscene in electronic form, and hacking.
The Act also provides for the constitution of the Cyber Regulations
Advisory Committee, which shall advice the government as
regards any rules, or for any other purpose connected with the
said act. The said Act also proposes to amend the Indian Penal
Code, 1860, the Indian Evidence Act, 1872, The Bankers' Books
Evidence Act, 1891, The Reserve Bank of India Act, 1934 to make
them in tune with the provisions of the IT Act.
This Chapter entails civil liability and the offender is liable to pay
damages by way of compensation.
Illustration:
Illustration:
Priya has copied the original data from the computer at her
workplace into her personal pen drive. She has copied the data.
Illustrations:
Illustrations:
Illustrations:
Illustrations:
Illustration:
Illustration:
Rajni regularly uses her computer to log into her online banking
account with State Bank of India. Sumit sends Rajni a phished
email that appears to come from State Bank of India. The email
contains a link to what appears to be a State Bank of India
Webpage. Rajni enters her login details on this webpage. Now
Sumit has obtained her login information. He then purchases
some software online and uses Rajni’s online bank account to pay
for it. He will be liable under this section.
Illustration:
Illustration:
(1) Whoever,-
Section 66F deals with Cyber Terrorism i.e. one who causes denial
of access to computer resources, or has unauthorized access to a
computer resource, or introduces a virus, with the intent to
threaten the unity, integrity, security or sovereignty of India or to
strike terror in any section of the people is deemed to be
committing cyber terrorism. The wordings of Section 66 F
suggests that the use of the internet in an ancillary role in
furtherance of terrorism (“ancillary cyber activities”) for example;
terrorist use of information technology to formulate plans, spread
propaganda, support terrorist recruiting, raise funds, and
communicate is not regarded as cyber terrorism. It is only when
the destructive nature of the “act” itself is carried out via
computers or other cyber/electronic means through techniques
such as infected e-mail attachments. Delivery of the terrorist’s
message via the Internet does not constitute cyber terrorism.
“Whoever,-
The section 67B deals with child pornography. This section makes
even the recording in electronic form of any sexually explicit act
with children shall be punishable under this section. Even if one
is found to be engaged in online relationship with sexual overtone
that may offend a reasonable adult on the computer resource
would be punishable under this section. The expression “May
offend a reasonable adult” is subject to judicial scrutiny and
interpretation and leaves scope for misuse and controversy.
“Save as otherwise provided in this Act or any other law for the
time being in force, any person including an intermediary who,
while providing services under the terms of lawful contract, has
secured access to any material containing personal information
about another person, with the intent to cause or knowing that he
is likely to cause wrongful loss or wrongful gain discloses, without
the consent of the person concerned, or in breach of a lawful
contract, such material to any other person shall be punished
with imprisonment for a term which may extend to three years, or
with a fine which may extend to five lakh rupees, or with both.”
This Section deals with Data base security & privacy. A person
including an intermediary is held liable if he discloses “personal
information” which he accessed while providing services under a
contract. The liability arises if the disclosure was made with an
intention to cause or knowing that he is likely to cause wrongful
loss or wrongful gain to a person.
Mentioned below are the some protection tips which may help in
minimizing cyber risks:
1. Connect to your bank using a device that has the latest and
updated security software, web browser and operating system.
2. Logout immediately after you have completed your
transactions.
3. If you are connected to a public wifi, don't access your bank
account.
4. Never click on a link in an email to visit your bank's site.
Always type the url in the browser address bar.
5. Never disclose your password or PIN to anyone, not even to a
genuine bank employee.
6. Take a print-out of the transaction confirmation. Store this
print-out till you cross check that transaction in your monthly
statement.