What Is Cyber Law
What Is Cyber Law
Cyber law is any law that applies to the internet and internet-related technologies. Cyber
law is one of the newest areas of the legal system. This is because internet technology
develops at such a rapid pace. Cyber law provides legal protections to people using the
internet. This includes both businesses and everyday citizens. Understanding cyber law
is of the utmost importance to anyone who uses the internet. Cyber Law has also been
referred to as the "law of the internet."
Categories of Cyber Crime
Generally, there are three major categories of cybercrimes that you need to know about.
These categories include:
• Crimes Against People. While these crimes occur online, they affect the lives of
actual people. Some of these crimes include cyber harassment and stalking,
distribution of child pornography, various types of spoofing, credit card fraud,
human trafficking, identity theft, and online related libel or slander.
•
• Crimes Against Property. Some online crimes happen against property, such as
a computer or server. These crimes include DDOS attacks, hacking, virus
transmission, cyber and typo squatting, computer vandalism, copyright
infringement, and IPR violations.
•
• Crimes Against Government. When a cybercrime is committed against the
government, it is considered an attack on that nation's sovereignty and an act of
war. Cybercrimes against the government include hacking, accessing
confidential information, cyber warfare, cyber terrorism, and pirated software.
Most of these types of cybercrimes have been addressed by the IT ACT of 2000 and
the IPC. Cybercrimes under the IT ACT include:
• Sending Threating Messages by Email, Indian Penal Code (IPC) Sec. 503.
• Sending Defamatory Messages by Email, Indian Penal Code (IPC) Sec. 499
• Forgery of Electronic Records, Indian Penal Code (IPC) Sec. 463
• Bogus Websites & Cyber Fraud, Indian Penal Code (IPC) Sec. 420
• Email Spoofing, Indian Penal Code (IPC) Sec. 463
• Web-Jacking, Indian Penal Code (IPC) Sec. 383
• Email Abuse, Indian Penal Code (IPC) Sec. 500
There are also cybercrimes under the Special Acts, which include:
There are numerous types of cybercrimes. Some popular type of crimes are as below:-
Hacking:
This is the most popular type of crime, which is related to unauthorised access to the
computer system. The computer system is broken into so that the sensitive information
can be accessed. This involves use of a variety of criminal software by hackers to gain
access to a person’s computer without realizing it. This is different from ethical hacking.
Data theft:
This simply means stealing data, for normal or illegal usage. This happens when a
person violets copyrights and steals music, movies, games and software. This type of
crime is costing the copyright industry a huge money. The legal system is working on
making stronger laws that prevent people from unlawful downloading.
Identity theft:
This is different from data theft. This produces a greater threat to the people using
computers for transaction and banking services. This is used to steal money or buy
things through accessing credit/ debit card, bank account or any other sensitive
information, by criminals in an individual’s name. This results in major financial losses or
even vanishing the credit history.
Cyber Stalking:
This involves use of a computer system to harass the victim. It has been defined as the
use of information and communications technology, particularly the Internet, by an
individual or group of individuals, to harass another individual, group of individuals, or
organization. The behaviour includes false accusations, monitoring, the transmission of
threats, identity theft, damage to data or equipment, the solicitation of minors for sexual
purposes, and gathering information for harassment purposes.
IT Act 2000 has triggered amendments to existing acts to include IT offences related
provisions. Below is the list of other main Acts which are amended by IT Act.
1. The Indian Penal Code, 1860:- IT Act 2000 has amended the section dealing with records
and documents in the IPC by inserting word ‘Electronic’ there by treating the electronic
records and documents on a par with physical records and documents.
2. The Indian Evidence Act 1872:- Prior to passing the IT Act, all evidence in a court was in
the physical form only. With the IT Act giving recognition to all electronic records and
documents. In the definitions part of the Act itself, the all documents including electronic
records were substituted. Words like ‘digital signature’, ‘electronic form’, ‘secure
electronic record’ ‘information’ as used in the IT Act, were all inserted to make them part
of the evidentiary mechanism in legislation.
Cyber Law Trends
Cyber law is increasing in importance every single year. This is because cybercrime is
increasing. To fight these crimes, there have been recent trends in cyber law. These
trends include the following:
Creating awareness of these issues will be a primary focus of governments and cyber
law agencies in the very near future. India, for instance, funded cyber trend research
projects in both 2013 and 2014. In addition, India holds an international conference
related to cyber law every year since 2014. The goal of this conference is to promote
awareness and international cooperation.
Cyber Law and Intellectual Property
An important part of cyber law is intellectual property. Intellectual property can include
areas like inventions, literature, music, and businesses. It now includes digital items that
are offered over the internet. IP rights related to cyber law generally fall into the
following categories:
• Copyright. This is the main form of IP cyber law. Copyrights provide protection to
almost any piece of IP you can transmit over the internet. This can include books,
music, movies, blogs, and much more.
• Patents. Patents are generally used to protect an invention. These are used on
the internet for two main reasons. The first is for new software. The second is for
new online business methods.
• Trademarks/Service Marks. Trademarks and service marks are used the same
online as they are in the real world. Trademarks will be used for websites.
Service marks are used for websites that provide services.
• Trade Secrets. Trade secret laws are used to protect multiple forms of IP. This
includes formulas, patterns, and processes. Online businesses can use trade
secret protections for many reasons. However, it does not prevent reverse
engineering.
• Domain Disputes. This is related to trademarks. Specifically, domain disputes are
about who owns a web address. For instance, the person who runs a website
may not be the person who owns it. Additionally, because domains are cheap,
some people buy multiple domains hoping for a big payday.
• Contracts. Most people don't think contracts apply online. This is not the case.
For example, when you register for a website, you usually have to agree to terms
of service. This is a contract.
• Privacy. Online businesses are required to protect their customer's privacy. The
specific law can depend on your industry. These laws become more important as
more and more information is transmitted over the internet.
• Employment. Some employee contract terms are linked to cyber law. This is
especially true with non-disclosure and non-compete clauses. These two clauses
are now often written to include the internet. It can also include how employees
use their company email or other digital resources.
• Defamation. Slander and libel law has also needed updating because of the
internet. Proving defamation was not altered substantially, but it now includes the
internet.
• Data Retention. Handling data is a primary concern in the internet age. An area
where this has become a big issue is in terms of litigation. In lawsuits, it is now
common to request electronic records and physical records. However, there are
no current laws that require keeping electronic records forever. This is not true
for physical records.
• Jurisdiction. Jurisdiction is a key part of court cases. Cybercrime has complicated
this issue. If a cybercriminal is located in Minnesota and their victim is located in
North Carolina, which state has jurisdiction? Different states have different rules
about this issue. Also, it can depend on in what court, federal or state, a case
was filed.
Protecting IP can be difficult over the internet. An example of this would be the
popularity of pirated movies and music. Each business that relies on the internet needs
to develop strategies for protecting their IP. Governments can also take part in this
process. In 1999, India did just this by updating their IP laws.
Cyber Security Strategies
Besides understanding cyber law, organizations must build cybersecurity strategies.
Cybersecurity strategies must cover the following areas:
• Ecosystem. A strong ecosystem helps prevent cybercrime. Your ecosystem
includes three areas—automation, interoperability, and authentication. A strong
system can prevent cyberattacks like malware, attrition, hacking, insider attacks,
and equipment theft.
• Framework. An assurance framework is a strategy for complying with security
standards. This allows updates to infrastructure. It also allows governments and
businesses to work together in what's known as "enabling and endorsing'.
• Open Standards. Open standards lead to improved security against cybercrime.
They allow business and individuals to easily use proper security. Open
standards can also improve economic growth and new technology development.
• Strengthening Regulation. This speaks directly to cyber law. Governments can
work to improve this legal area. They can also found agencies to handle cyber
law and cybercrime. Other parts of this strategy include promoting cybersecurity,
proving education and training, working with private and public organizations,
and implementing new security technology.
• IT Mechanisms. There are many useful IT mechanisms/measures. Promoting
these mechanisms is a great way to fight cybercrime. These measures include
end-to-end, association-oriented, link-oriented, and data encryption.
• E-Governance. E-governance is the ability to provide services over the internet.
Unfortunately, e-governance is overlooked in many countries. Developing this
technology is an important part of cyber law.
• Infrastructure. Protecting infrastructure is one of the most important parts of
cybersecurity. This includes the electrical grid and data transmission lines.
Outdated infrastructure is vulnerable to cybercrime.
Mitigating Risk
The purpose of cyber law is to reduce risk. This can be done in several ways. Some of
the most effective risk reduction strategies of cyber law include the following:
Information sharing is also a key risk-reduction strategy. The best way to do this is with
mandatory reporting. When a business is a victim of cybercrime, reporting it right away
can reduce further threats. The U.S. promoted this with the Cybersecurity Information
Sharing Act of 2014 (CISA).
Lastly, businesses can use a strong security framework. A good framework has three
parts:
• The Core. These are activities that allow business to identify, protect, detect,
respond, and recover from cyber threats.
• Implementation Tiers. This describes how advanced a business's security system
is. The tiers are Partial, Risk-Informed, Repeatable, and Adaptive. Businesses
should strive for the Adaptive tier.
• Framework Profile. This is a database where businesses record information
about their strategies. This can include concerns and plans for new
cybersecurity.
Network Security
Every network needs advanced security. This includes home networks. The most
effective way to improve network security is by using the right technology. Network
security technology includes the following:
• Active Devices. Active devices help a network deal with too much traffic. They
also prevent unauthorized traffic. These devices can include either software
based or hardware based firewalls, antivirus devices or software, and content
filtering devices.
• Passive Devices. The most common preventive device is an intrusion detection
device. These devices help to recognize unwanted internet traffic.
• Preventative Devices. Many devices are focused on preventing network threats.
These are called preventative devices. These devices can include network
scanners and penetration testers.
• Unified Threat Management. These are complete security devices. They can
include content filtration, firewall technology, and web caching.
New Cyber Laws
Technology is constantly updating. This means that laws must also be constantly
updated. Although U.S. law has remained the same for a long time, five laws were
passed in 2014:
Most of these laws were meant to update existing legislation. FISMA 2014 updated the
framework for security controls. NCPA was meant for information sharing between the
private sector and the government.
The CEA was one of the most important bills. It may affect private organizations. This is
because it promotes developing voluntary cybersecurity standards. This law
strengthens the informal mission of the National Institute of Standards and Technology
(NIST). The CEA also covers areas once covered by the Federal Financial Institutions
Examination Council (FFIEC).
Both the NIST and FFIEC were informal standards. The CEA is a law and more binding.
This is particularly useful for resolving disputes resulting from cybercrimes. Businesses
need to understand the rules of the CEA.
Types of E-commerce
E-commerce/e-business may be classified at large in the following six basic
types:
Advantages of e-commerce
Disadvantages of e-Commerce