Study On Cyber Law's of India
Study On Cyber Law's of India
http://doi.org/10.22214/ijraset.2020.6058
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 8 Issue VI June 2020- Available at www.ijraset.com
Abstract: In this present age all the things are depends on internet like online dealing or transaction. As we know internet is vast
source of knowledge, so it's easy to access by anyone from anywhere. Some people used internet technology for criminal
activities like unauthorized access, scams etc. Above unlawful activities or the offense through internet is come under cyber
crime. The term “Cyber Law” was introduced for prevention of cyber crimes. Cyber law is the part of legal systems that
conciliation the legal issues of internet related crime. Cyber Law helps to prevent or reduce criminal activities, for example
freedom of expressions, access to utilization of the online, and online security or online privacy. Cyber crime is also known as
law of web.
Keywords: Net, Access of authorization, Web, TI Act, Cyberspace, Awareness, Imprisonment.
I. INTRODUCTION
The origination of Internet/web has made the lifetime of humans easier, it's been using starting from the individual to large
organizations across the word . Most of us utilizing the Internet for the wrong purposes either for itself or for other’s benefits. This
is the origin of “Cyber Crime”. This encourage to busy in unlawful activities which are illegitimate to the society. We will define
Cyber Crime as crimes committed using computers or network and are usually happen over the cyberspace especially internet
.Cyber laws are the laws that control cyber area. we understood Cyber Crimes, digital electronic signatures, data protections and
privacies etc through Cyber Law. The primary IT Act of India was endorsed by UN’s General Assembly which had its origin from
“United Nations Model Law on Electronic Commerce” (UNCITRAL). Section II shows cyber crime scenario in India. Importance
of cyber crime, awareness programs and IT Act of India 2000 in section III. Section IV describe cyber law in India and eventually
section V shows the conclusion.
C. Section 66A
Extinguished
By intention or by knowingly tries to go through or tries to gain access to computer’s resources without the authorization or
exceeding authorized access, and by such conducts obtains access to the data, information or computer’s database which is
limited or restricted for interest of the security of the state or foreign relations, or any restricted database, data or any
information with the reason to believe that those data or information or the computer’s database obtained may use to cause or
probably use to cause damage the interest of the independence and integrity nation.
a) Punishment: Shall be sentenced to life time imprisonment.
J. Section 67A- Transmitting or publishing of Materials that Contains Sexually Explicit act, etc., in Electronics form
1) Punishment
a) 1st convict Sentences for either description for a term which may extend upto 5 years or imprisonment along with a fine
that could extend to 10 lakhs rupees.
b) 2nd convict sentenced for either description for a term that could extend upto 7 years of imprisonment along with a fine
that may extend upto 20 lakhs rupees.
K. Section 67B- Transmitting or publishing of materials that depicts children in sexually explicit act etc in electronics form.
1) Punishment: Sentenced for either description for a term which can reach 5 years of imprisonment with a fine that would
reach rupees 10 lakhs on the primary conviction. And within the event of second conviction criminals might be sentenced
for either description for a term that would reach 7 years alongside a fine that would extend to rupees 10 lakhs.
M. Section 69- Power to issue Direction for Monitor, Decryption or Interception of any Information Through Computer’s
Resources
1) Where the Central government’s or State government’s authorized officers, as the case may be in this behalf, if fulfilled that it
is required or expedient to do in the interest of the integrity or the sovereignty, the security defence of our country India, state’s
security, friendly relations with the foreign states for preventing any incident to the commission of any cognizable offences that
is related to above or investigation of any offences that is subjected to the provision of sub-section (II). For reasons to be
recorded writing, direct any agency of the acceptable government, by order, decrypt or monitor or cause to be intercept any
information that's generated or received or transmitted or is stored in any computer’s resources.
2) The safeguard and the procedure that is subjected to such decryption, monitoring or interception may carried out, shall be such
as may be prescribed.
3) The intermediaries, the subscribers or any individual who is in the charge of the computer’s resources shall call upon by any
agencies referred to the sub-section (I), extends all services and technical assistances to:
a) Providing safe access to computer’s resources, receiving, transmitting, generating or to store such information .
b) Decrypting, intercepting or monitoring the information.
c) Providing information that is stored in computer.
d) The intermediaries, the subscribes or any individual who fails to help the agency referred in the sub-section (III),
4) Punishment: Sentenced for a period that may extend upto 3 years of imprisonment and also liable to fine.
There are many other sections in the IT Act, 2000 among them a few important sections one should know are as follows:
In section 43, damage to computer, computer system etc.
In section 69A, power to issue direction for blocking from public access of any information through any computer’s resources
In section 69B, power to authorize to collect traffic information or data and to monitor through any computer’s resources for
cyber security
In section 70, un-authorized access to protected system.
In section 71, penalty for misrepresentation.
In section 72, breach of confidentiality and privacy.
In section 73, publishing False digital signature certificates.
In section 74, publication for fraudulent purpose.
In section 75 , act to apply for contravention or offence that is committed outside India.
In section 77, compensation, confiscation or penalties for not to interfere with other punishment.
In section 77A, compounding of Offences.
In Section 85, offences by companies.
V. CONCLUSIONS
The present period is moving towards a technological era. In which every person is constantly involved in the use of internet and
other technical equipment from morning to night. Due to lack of knowledge about cybercrime and cyber laws, people commit
crimes or fall prey to it. Cybercrime has been hazard to humanity. Therefore, in today's age, children, elders, officers, employees,
rich, poor (every one) should know what is cybercrime and its imprisonment . Information related to all the above facts and why
cyber law is important and its provision of punishment, has been contained in this paper. Cyber security is possible only by
compliance with cyber law. Know or inadvertently the graph of crime is increasing, which will be difficult to stop due to lack of
cyber law. Awareness is only key to avoid cyber crimes. Cyber crime could be committed from anywhere, it does'nt have any
national boundary. It is must to get the crimes committed in and around you will discuss with your family or police. IT Act 2000
has been amendment in 2008 as the "IT Act 2008" because increasing graph of cybercrime and new type of internet related crime.
REFERENCES
[1] Ms. Nisha Tikariha Vaishnav, "CYBER CRIME PROBLEMS AND PREVENTION EFFECT ON SOCIETY" Journal of Information and Computational
Science, Vol. 13, Issue 1,No29-36, 2020.
[2] Marco Gercke, "Understanding cybercrime: Phenomena, challenges and legal response". Book Page no 2 (1.3), 2012.
[3] Animesh Sarmah, "A brief study on Cyber Crime and Cyber Law’s of India ", International Research Journal of Engineering and Technology (IRJET), Vol. 4,
No 6, 2017.
[4] https://en.wikipedia.org/wiki/Information_Technology_Act,_2000
[5] Nadine Touzeau," Behavioral Cybercriminals Differentiations between the Real World and the Virtual Space" J Forensic Res, an open access journal, Vol. 8,
Issue 6, No.1-2,2017