Cyber Law in India
The computer-generated
world of internet is known as cyberspace and the laws prevailing this area are
known as Cyber Laws and all the users of this space come under the ambit of
these laws as it carries a kind of worldwide jurisdiction. Cyberlaw can also be
described as a branch of law that deals with legal issues related to the use of
inter-networked information technology. In short, cyber law is the law
governing computers and the internet.
The growth of Electronic
Commerce has propelled the need for vibrant and effective regulatory mechanisms
which would further strengthen the legal infrastructure, so crucial to the
success of Electronic Commerce. All these governing mechanisms and legal
structures come within the domain of Cyberlaw.
Cyber Law is important
because it touches almost all aspects of transactions and activities and on
involving the internet, World Wide Web, and cyberspace. Every action and
reaction in cyberspace has some legal and cyber legal angles.
Cyber Crime is not
defined in Information Technology Act 2000 nor in the National Cyber Security
Policy 2013 nor in any other regulation in India. Hence, to define cyber-crime,
one can say, it is just a combination of crime and computer. In other words, any
offence or crime in which a computer is used is a cyber-crime. Even a petty
offense like stealing or pickpocket can be brought within the broader purview
of cybercrime if the basic data or aid to such an offense is a computer or information stored in a computer used (or misused) by the fraudster. The I.T.
Act defines a computer, computer network, data, information and all other
necessary ingredients that form part of a cybercrime.
Cyber law encompasses laws relating to:
- Cybercrimes
- Electronic and digital signatures
- Intellectual property
- Data protection and privacy
Cyber space includes
computers, networks, softwares, data storage devices (such as hard disks, USB
disks etc), the internet, websites, emails and even electronic devices such as
cell phones, ATM machines, etc.
Cyber Crime?
# Any crime with the help of computer and
telecommunication technology.
# Any crime where either the computer is used as an
object or subject.
Categories of Cyber Crime
- Cybercrimes against persons
- Cybercrimes against property
- Cybercrimes against government
1. Against a Person
# Cyber stalking
# Impersonation
# Loss of Privacy
# Transmission of Obscene Material
# Harassment with the use of computer
2. Against Property
# Unauthorized Computer Trespassing
# Computer vandalism
# Transmission of harmful programmes
# Siphoning of funds from financial institutions
# Stealing secret information & data
# Copyright
3. Against Government
# Hacking of Government websites
# Cyber Extortion
# Cyber Terrorism
# Computer Viruses
Some Other Crimes
# Logic Bombs
# Spamming
# Virus, worms, Trojan Horse
# E-Mail Bombing
# E-Mail abuse etc.
Need For Cyber Law
In today’s techno-savvy
environment, the world is becoming more and more digitally sophisticated and so
are the crimes. Internet was initially developed as a research and information
sharing tool and was in an unregulated manner. As the time passed by it became
more transactional with e-business, e-commerce, e-governance, and e-procurement
etc. All legal issues related to internet crime are dealt with through cyber
laws. As the number of internet users is on the rise, the need for cyber laws
and their application has also gathered great momentum.
In today’s highly digitalized world, almost everyone
is affected by cyber law.
For example:
# Almost all transactions
in shares are in Demat form.
# Almost all companies
extensively depend upon their computer networks and keep their valuable data in
electronic form.
# Government forms
including income tax returns, company law forms, etc. are now filled in
electronic form.
# Consumers are
increasingly using credit/debit cards for shopping.
# Most people are using
email, phones and SMS messages for communication.
# Even in non-cyber crime
cases, important evidence is found in computers/cell phones eg: in cases of
murder, divorce, kidnapping, tax evasion, organized crime, terrorist
operations, counterfeit currency, etc.
# Cybercrime cases such
as online banking frauds, online share trading fraud, source code theft, credit
card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email
hijacking, denial of service, hacking, pornography, etc. are becoming common.
# Digital signatures and
e-contracts are fast replacing the conventional methods of transacting business.
Cyber Laws In India
In India, cyber laws are
contained in the Information Technology Act, 2000 (IT Act) which came into
force on October 17, 2000. The main purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate filing of electronic
records with the Government.
The existing laws of
India, even with the most compassionate and liberal interpretation could not be
interpreted in the light of the emergency cyberspace, to include all aspects
relating to different activities in cyberspace. In fact, the practical experience
and the wisdom of judgment found that it shall not be without major threats
and pitfalls, if the existing laws were to be interpreted in the scenario of
emerging cyberspace, without enacting new cyber laws. Hence, the need for
enactment of relevant cyber laws.
None of the existing laws
gave any legal validity or sanction to the activities in Cyberspace. For
example, the Net is used by a large majority of users for email. Yet till
today, email id not legal in our country. There is no law in the country, which
gives legal validity, and sanction to email. Courts and judiciary in our
country have been reluctant to grant judicial recognition to the legality of
email in the absence of any specific law having been enacted by the Parliament.
As such the need has arisen for Cyber law.
World and Cyber Laws
# The Great firewall of
China monitors every moment in cyber space and protect to publish any offensive
content.
# China have an hold on
every content which is harmful of dangerous for the government of China.
# Brazil is considered
worlds biggest airport for Hackers.
# Iran is also a
dangerous country for the Netizens. He also have a Crime Police unit for crime
in Cyber Space.
Importance of Cyber Laws
# We are living in a highly digitalized world.
# All companies depend upon their computer networks
and keep their valuable data in electronic form.
# Government forms including income tax returns,
company law forms etc are now filled in electronic form.
# Consumers are increasingly using credit cards for shopping.
# Most people are using email, cell phones and SMS
messages for communication.
# Even in non-cyber crime cases, important evidence is
found in computers/cell phones e.g. in cases of divorce, murder, kidnapping,
organized crime, terrorist operations, counterfeit currency, etc.
# Since it touches all the aspects of transactions and
activities on and concerning the Internet, the World Wide Web, and Cyberspace
therefore Cyber law is extremely important.
Conclusion
To sum up, though a crime
free society is perfect and exists only in illusion, it should be constant
attempt of rules to keep the criminalities lowest. Especially in a society that
is dependent more and more on technology, crime based on electronic
law-breaking are bound to increase and the law makers have to go the extra mile
compared to the impostors, to keep them at bay.
Technology is always a double-edged sword and can be
used for both the purposes “good or bad”. Steganography, Trojan Horse,
Scavenging (and even Dos or DDos) are all technologies and per se not crimes,
but falling into the wrong hands with an illicit intent who are out to exploit
them or misuse them, they come into the array of cyber-crime and become
punishable offences.
Hence, it should be the tenacious efforts of rulers
and law makers to ensure that technology grows in a healthy manner and is used
for legal and ethical business growth and not for committing crimes. It should
be the duty of the three stake holders viz. i) the rulers, regulators, law
makers and agents ii) Internet or Network Service Suppliers or banks and other
intercessors and iii) the users to take care of information security playing
their respective role within the permitted limitations and ensuring obedience
with the law of the land.
No comments:
Post a Comment