Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/283089901

A comprehensive legal framework of Indian Cyber Laws A comprehensive legal


framework of Indian Cyber Laws

Article · January 2013

CITATIONS READS

0 5,411

1 author:

Anuranjan Misra
Noida International University
1 PUBLICATION   0 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Cloud Computing Security (Ph.d) View project

All content following this page was uploaded by Anuranjan Misra on 23 October 2015.

The user has requested enhancement of the downloaded file.


SPC ERA International Journal of Law and Governance Vol.1, No.1 2013

A comprehensive legal framework of Indian Cyber


Laws
Anuranjan Misra
Professor and Dean Academics
Bhagwant Institute of Technology, Ghaziabad (UP) India
Email: anuranjanmisra@gmail.com

Abstract- atoms. Territorially based law-making


In the today’s era of rapid growth, and law-enforcing authorities find this
Information technology is encompassing new environment deeply threatening.
all walks of life all over the world. These Keywords: Information technology,
technological developments have made Cyber Laws, Cyber crime, Cyber
the transition from paper to paperless Legislations, legal framework
transactions possible. We are now Prologue
creating new standards of speed, Why Cyber Laws At All
efficiency, and accuracy in We may ask why is there a need for a
communication, which has become key separate law to govern the Cyber World?
tools for boosting innovations, creativity This may also assume significance
and increasing overall productivity. looking to the fact that the phenomenal
Computers are extensively used to store spread of Internet has been enabled
confidential data of political, social, mainly due to the absence of a
economic or personal nature bringing centralized regulating agency.
immense benefit to the society. Anyone who has access to a computer
The rapid development of Internet and and a telephone network is free to get
Computer technology globally has led to hooked to the Internet. This
the growth of new forms of transnational uncontrollable growth of the Internet
crime especially Internet related. These makes the need for regulation even more
crimes have virtually no boundaries and badly felt.
may affect any country across the globe. Systems across the globe have many
Thus, there is a need for awareness and different rules governing the behavior of
enactment of necessary legislation in all users. These users in most of the
countries for the prevention of computer countries are completely free to join/
related crime. leave any system whose rules they find
Globally Internet and Computer based comfortable/ not comfortable to them.
commerce and communications cut This extra flexibility may at times lead
across territorial boundaries, thereby to improper user conduct. Also, in the
creating a new realm of human activity absence of any suitable legal framework,
and undermining the feasibility and it may be difficult for System
legitimacy of applying laws based on Administrators to have a check on
geographic boundaries. This new Frauds, Vandalism or Abuses, which
boundary, which is made up of the may make the life of many online users
screens and passwords, separate the miserable.
“Cyber world” from the "real world" of

A comprehensive legal framework of Indian Cyber Laws


SPC ERA International Journal of Law and Governance Vol.1, No.1 2013

This situation is alarming as any element v. Hacking /cracking.


of distrust for Internet may lead to 2. Against Organisations: -
people avoiding doing transactions with a. Against Government, Private Firm,
online sites thereby directly affecting e- Company, Group of Individuals: -
Commerce growth. The (Mis)Use of i. Hacking & Cracking.
Internet as an excellent medium of ii. Possession of unauthorised
communication may in some situations information.
lead to direct damage to physical iii. Cyber terrorism against the
societies. Non-imposition of taxes on government organisation.
online transactions may have its iv. Distribution of pirated software etc.
destructive effect on the physical 3. Against Society at large: -
businesses and also government i. Pornography (specially child
revenues. Terrorists may also make use pornography).
of web to create conspiracies and make ii. Polluting the youth through indecent
violence in the society. exposure.
Therefore, all of us whether we directly iii. Trafficking.
use Internet or not, will like to have
some form of regulation or external Basic approaches for creation of
control for monitoring online Cyber Laws
transactions and the cyber world for Following are the basic approaches for
preventing any instability. creation of Cyber Laws, which will
Defining Cyber Crimes ensure the smooth governance of
"Computer or Cyber crimes are Internet globally:
considered as illegal, unethical or
unauthorized behavior of people relating a) Formulation of new laws and
to the automatic processing and amendment of existing laws by nations
transmission of data, use of Computer within their present territorial boundaries
Systems and Networks". thereby attempting to regulate all actions
Common types of Cyber Crimes may be on the Internet that have any impact on
broadly classified in the following their own population.
groups:- b) Nations may enter into multi-lateral
1. Against Individuals: - international agreements to establish
a. Against Person: - new and uniform rules specifically
i. Harassment through e-mails. applicable to conduct on the Internet.
ii. Cyber-stalking. c) Creation of an entirely new
iii. Dissemination of obscene material on international organisation, which can
the Internet. establish new rules and new means of
iv. Defamation. enforcing those rules.
v. Hacking/cracking. d) Guidelines and rules may naturally
vi. Indecent exposure. emerge from individual decisions like
b. Against property of an individual: - domain name and IP address
i. Computer vandalism. registrations and by websites and users
ii. Transmitting virus. deciding about whom will they
iii. Internet intrusion. patronise.
iv. Unauthorised control over computer
system.

A comprehensive legal framework of Indian Cyber Laws


SPC ERA International Journal of Law and Governance Vol.1, No.1 2013

All of these approaches have their own 1. Creating a suitable climate thereby
merits and demerits and we shall not go Inducing Self Compliance by the
into those details here. Society.
Establishing a Suitable framework 2. Regular monitoring of the scenario for
There is a dire need for the emergence of reliable feedback.
a well-defined framework of Cyber 3. Offering Openness and Flexibility to
Laws, which should be able to do the accept and incorporate necessary
following: modifications at
1) Create and implement a minimum set appropriate times.
of guiding rules of conduct that would 4. Distinctly establishing the Authority-
facilitate efficient Communications and Responsibility guidelines for the
reliable Commerce through the use of Implementing Agency.
Electronic medium. In order to be effective, it has to be
2) Define, punish and prevent wrongful ensured that the Law is Simple, fair and
actions that attack the electronic medium full of clarity. Failing this, the law may
or harm others. One of the greatest be misused to harass individuals
concerns of the field of Cyber Laws has resulting in its defiance. The
been the absence (or rather delay) of a implementing agency will then be
well-defined and comprehensive compelled to take corrective actions to
framework of law across the globe. ensure implementation. This whole
Today’s Internet was born in the early process may result in spread of
1960's while the initial efforts for its corruption and polluting of the overall
regulation could only surface in the late sentiments in society making the job of
1990’s. This problem has been further law implementing agencies more
aggravated by the steep rise in usage of difficult.
Internet in the recent years all over the
world and that too in the absence of any
appropriate legal framework. Surely, the
Cyber Law scenario is globally more Cyber Legislations Worldwide
complicated than traditional laws owing To meet the challenge posed by new
to the reason that the range of activities kinds of crime made possible by
which are to be governed by these laws computer technology including
are largely technology driven, an area telecommunication, many countries have
which is dynamically changing and is also reviewed their respective domestic
beyond anyone’s control. However criminal laws so as to prevent computer
enactment of these laws pose related crimes. Some of these countries
opportunities for nations to carve model are USA, Austria, Denmark, France
Cyber Societies for the future thereby Germany, Greece, Finland, Italy,
taking a lead in becoming Global IT Turkey, Sweden, Switzerland, Australia,
Powers. Canada, India, Japan, Spain, Portugal,
Effective Implementation of any law is UK, Malaysia and Singapore.
as critical an exercise as its enactment. A However, no country has fully resolved
law all the issues such as legal, enforcement
implementing agency has to focus on the and prevention of crime. The legislations
following major areas to be effective: enacted by different countries cover only
few of the classified computer- related

A comprehensive legal framework of Indian Cyber Laws


SPC ERA International Journal of Law and Governance Vol.1, No.1 2013

offences. However, looking to the network, data or program or withhold or


dynamic and fast changing technology, deny use of computer, network etc.
new types of offences may pop-up 25. Knowingly causing transmission of
frequently. data/program with risk that transmission
Some of the major types of offences will damage a computer network, data or
against which many countries across the program or withhold or deny use of
globe have computer, network etc, an unauthorised
enacted various Acts (mostly at access of computer with intent to
preliminary levels) are as follows: - defraud.
1. Unlawful access to data in computers,
2. Damaging data in computer etc.
3. Possession of device to obtain
unauthorised telephone facilities,
4. Unauthorised access to computer and Cyber laws in India
computer material Keeping in line with other countries,
5. Committing mischief with data. India also has passed its first cyber law,
6. Data spying, The Information Technology Act 2000,
7. Computer fraud, which aims to provide the legal
8. Forgery of prohibitive data, backbone for enabling e-commerce in
9. Alteration of data, the country. However the arrival of
10. Computer sabotage. Internet resulted in the rise of new and
11. False entry in an authentic deed complex legal issues.
12. False entry in permit licence or Though India has a detailed and well-
passport defined legal system in place, with laws
13. Electronic record made wrongfully like the Indian Penal Code, the Indian
14. Electronic record made wrongfully Evidence Act 1872, the Banker's Book
by public servant Evidence Act, 1891 and the Reserve
15. Interferences with business by Bank of India Act, 1934, the Companies
destruction or damage of computer Act, and so on. But at the time of
16. Interferences with computer enactment of these laws nobody could
17. Destruction of public document really visualise about the Internet. We
18. Destruction of private document must remember that all the existing laws
19. Unauthorised access with intention in place in India were enacted keeping in
to commit offences/ computer crimes mind the relevant political, social,
20. Unauthorised use and interception of economic, and cultural scenario of the
computer services corresponding time. As like the rest of
21. Knowingly access of computer the world, the existing laws of India also
without authorisation related to national could not handle the various cyber space
defence or foreign relation activities. As such the need arose for a
22. Intentional access of computer Cyber Law.
without authorisation to obtain financial
information Conclusions
23. Unauthorised access of computer of The conclusion may, therefore, be drawn
a Govt. Deptt. Or agency that computer-related crime is a real, (at
24. Knowingly causing transmission of least in respect of certain offences)
data/program to damage a computer expanding phenomenon. Furthermore, a

A comprehensive legal framework of Indian Cyber Laws


SPC ERA International Journal of Law and Governance Vol.1, No.1 2013

steady increase in number of such crimes Richard Raysman, Peter Brown,


in this area is expected which demands Jeffrey D. Neuburger and
for greater attention of lawmakers. William E. Bandon, III. Law
Let's now once again review the Journal Press, 2002-2008. ISBN
alternatives available for establishing a 1-58852-107-9
comprehensive legal framework. Can we 4. Zittrain, Jonathan (2003). "Be
make only territorial laws applicable to Careful What You Ask For:
online activities that have no relevant or Reconciling a Global Internet
perhaps even determinable geographic and Local Law".
location? It seems to be very difficult. http://papers.ssrn.com/sol3/paper
We must also allow responsible s.cfm?abstract_id=395300.
participants on the Internet to set their 5. Gibson, Owen (March 23, 2006).
own rules and to help all concerned "Warning to chatroom users after
(online and offline). The law of the libel award for man labelled a
Internet has already emerged, and we Nazi". The Guardian.
believe can continue to emerge with http://www.guardian.co.uk/law/
individual users voting to join the 6. Myers KS (Fall 2006).
particular systems they find most Wikimmunity: Fitting the
congenial. Communications Decency Act to
However, this model also does not solve Wikipedia. 20. p. 163.
all problems, and various governance SSRN 916529.
issues cannot be resolved overnight. We 7. http://www.cyberlawsindia.net/la
will need to redefine Cyber Legal wyering.html
processes in this new dynamic context. 8. "Law and Borders - The Rise of
Finally, the Cyber Law defined as a
thoughtful group conversation about Law in Cyberspace". Cli.org.
core values and distinct benefits to the Retrieved 2013-11-05.
Society will persist. But it will not, could 9. Zittrain, Jonathan (2003). "Be
not, and should not be the same law as
that applicable to physical, Careful What You Ask For:
geographically defined territories. Reconciling a Global Internet
and Local Law".
References
10. Gibson, Owen (March 23,
1. Computer Law: Drafting and 2006). "Warning to chatroom
Negotiating Forms and users after libel award for man
Agreements, by Richard
labelled a Nazi". The Guardian.
Raysman and Peter Brown. Law
Journal Press, 1999–2008. ISBN 11. Myers KS (Fall 2006).
978-1-58852-024-1 "Wikimmunity: Fitting the
2. Trout, B. (2007). "Cyber Law: A
Communications Decency Act to
Legal Arsenal For Online
Business", New York: World Wikipedia". Harvard Journal of
Audience, Inc. Law & Technology 20:
3. Emerging Technologies and the 163. SSRN 916529.
Law: Forms and Analysis, by

A comprehensive legal framework of Indian Cyber Laws


SPC ERA International Journal of Law and Governance Vol.1, No.1 2013

17. " Internet Crime - The Computer


12. "opennetinitiative.net". Misuse Act 1990".
opennetinitiative.net. Retrieved Homeoffice.gov.uk. Retrieved
2012-01-17. 2012-01-17.
13. "All Content related to China". 18. "All Content related to Saudi
OpenNet Initiative. Arabia". OpenNet Initiative.
14. Free Speech Implications Of 19. "Federal Agency Digital and
Blocking Blog Posts In India, Electronic Signature
taken from Aaron Kelly Internet Regulations". Isaacbowman.com.
Law Firm, Retrieved December 2009-03-16. Retrieved 2012-01-
05, 2011. 17.
15. Warren & Louis Brandeis, The 20. "cyberpolicebangalore.nic.in".
Right to Privacy , 4 Harv. L. cyberpolicebangalore.nic.in.
Rev. 193 (1890) Retrieved 2012-01-17.
16. Solove, D.,Schwartz, P.. (2009). 21. "Centro de Estudios de Postgrado
Privacy, Information, and de la Universidad Pablo de
Technology. (2nd Ed.). New Olavide". Upo.es. Retrieved
York, NY: Aspen 2012-01-17.
Publishers. ISBN 978-0-7355-
7910-1.

A comprehensive legal framework of Indian Cyber Laws

View publication stats

You might also like