Professional Documents
Culture Documents
White Collar PDF
White Collar PDF
1
2
ACKNOWLEDGEMENT
In preparation of my assignment, I had to take the help and guidance of some respected
persons, who deserve my deepest gratitude. As the completion of this assignment gave me
much pleasure, I would like to show my gratitude to Professor Dr. Vinod Kumar Saroj
sir, on Mats University for giving me required guidelines for assignment throughout
numerous consultations. I would also like to expand my gratitude to all those who have
directly and indirectly guided me in writing this assignment. In my grateful list,
technology is the first thing I’m thankful for. I respect and thank Mats University, Mats
law school, Raipur for the great learning opportunity which enhanced my knowledge in
the subject. Also, I am grateful that I could finish the project on time. Last but not the
least, gratitude to my helpful classmates for support and willingness to help.
2
3
DECLARATION
I certify that this assignment is my own work, based on my personal study and/or
research and that I have acknowledged all material and sources used in its preparation,
whether they be books, articles, reports, lecture notes, and any other kind of document,
electronic or personal communication. I also certify that this assignment/report has not
previously been submitted for assessment in any other unit, except where specific
permission has been granted from all unit coordinators involved, or at any other time in
this unit, and that I have not copied in part or whole or otherwise plagiarized the work of
other students and/orpersons.
MATS ID:MU22LLM1Y028
3
4
CERTIFICATE
This is to certify that Trupti Dipan Gala, a student of 1 year LL.M of Mats University,
Raipur has successfully completed the research on the assignment on White collar crime
on the topic “Cyber Crime : A Broad Spectrum Of Criminal Activities” under the
guidance of Professor Dr. Vinod Kumar Saroj Sir during the year 2022-23. The original
research work was carried out by her under my supervision. It is further certified that this
project is the individual work of the candidate.
Signature:
Date: 7th January, 2023.
4
5
TABLE OF
CONTENT
5
6
18. Conclusion 27
19. Bibliography 28
6
7
LIST OF ABBREVIATION
4) Ors- others.
5) Etc. - Et cetera.
7
8
LIST OF CASES
8
9
Introduction
MEANING :- White-collar crime is a type of crime committed by persons from upper-
class backgrounds who are members of a recognized social group. These crimes are
perpetratedas a result of their employment.
purposes starting from the individual to large organizations across the globe. In simple
term we can define computer as the machine that can stores and manipulate/ process
information or instruction that are instructed by the user. Most computer users are utilizing
the computer for the erroneous purposes either for their personal benefits or for other’s
benefit since decades, hence this gave birth to “Cyber Crime”. This had led to the
engagement in activities which are illegal to the society.
We are living in an era where the internet has become a part of our daily schedule.
Everything, from ordering food to shopping online, studying a subject to looking at
memes, posting online about your whereabouts to online transactions, has been so
engraved in our functioning that we tend to overlook the threats and dangers it poses to us.
The web is a worldwide stage, which means that anyone can have access to it. And once
people have access to anything, they start violating it.
Cyber Crime
Sussman and Heuston first proposed the term “Cyber Crime” in the year 1995.
Cybercrime cannot be described as a single definition; it is best considered as a collection
of acts or conducts. These acts are based on the material offence object that affects the
computer data or systems. These are the illegal acts where a digital device or
information system is a tool or a target or it can be the combination of both. The
cybercrime is also known as electronic crimes, computer-related crimes, e-crime,
hightechnology crime, information age crime etc.
The Indian Law does not define the term ‘cybercrime’. It is neither defined in the
Information Technology Act, 2000 nor in the I.T. Amendment Act, 2008 nor in any other
legislation of India. In fact, the Indian Penal Code still does not use the term ‘cybercrime’
even after its amendment by the Information Technology (Amendment) Act, 2008.
However, cybercrime can be defined as any criminal activity directly related to the use of
computers and the internet, such as illegal trespass into the computer system or
database of
9
10
another, manipulation or theft of stored or online data, hacking, phishing, cyber warfare,
spreading computer viruses etc. In simple words, any offence or crime in which a
computer is used for committing that crime.There is a myth among the people that Cyber-
crimes can only be committed over the cyberspace or the internet. In fact, Cyber-crimes
can also be committed without ones involvement in the cyber space, it is not necessary
that the cyber- criminal should remain present online. Software privacy can be taken as an
example.
Dr. Debarati Halder and Dr. K. Jaishanka define Cyber Crimes as: “Offences that are
committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern telecommunication networks
such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)”
The oxford Dictionary defined the term Cyber Crimeas “Criminal activities carried out
by means of computers or the Internet.
Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber
Laws with Cyber Glossary is as follows –
- Any illegal action in which a computer is the tool or object of the crime i.e. any
crime, the means or purpose of which is to influence the function of a computer,
- Any incident associated with computer technology in which a victim suffered or
could have suffered loss and a perpetrator, by intention, made or could have made
a gain,
- Computer abuse is considered as any illegal, unethical or unauthorized behavior
relating to the automatic processing and transmission of data
10
11
In 1992, the first Cyber-crime appeared wherein the first polymorphic virus was released.
In India, one of the very first cases of Cyber-crime was that of Yahoo v. Akash Arora.
This case occurred in 1999. In this case, the defendant Akash Arora was accused of using
the trademark or domain name 'yahooindia.com' and a decree of permanent injunction
was sought. The other case is of Vinod Kaushik and ors. V/s. Madhvika Joshi and ors.
In which it was held that accessing of e-mail accounts of husband and father-in-law
without their permission is unauthorized under section 43 of the IT Act, 2000. This case
was decided in 2011.The above-mentioned cases refer to the fact as how did the Cyber-
crime evolve in India.
Complexity of the society determines the complexity of the crime that evolves’
around it. To understand the crime in a society, it is essential and crucial to verify all the
factors which influence and contribute to the crime. The socio- economic and political
structure of the society needs to understand the crime and the recourse that may curb the
same. The preventive and corrective measures adopted by the machinery to control the
crime and delinquent behaviour in the society are also taken into consideration while
studying the nature and scope of a crime.
The advancement of the technology has produced new socio-economic and political
problem in the society and instead of helping the state in controlling the problem it has
created new complex situation which is difficult to understand and even more
difficult to
11
12
apply current law to face the situation. The state machinery is not equipped with enough
sources and knowledge to handle the modern crime. Computers have transformed the
modern society beyond expectations in last three to four decades. It has made life not only
convenient but has also immensely helped different sections of the world come closer
socially, economically and culturally.
The Computer technology has made it possible to have access to all corners of the world
while sitting in a room. Modern technology has put an end to the barriers of time and
space. However, unlikely with the remarkable merits of having computers today, due to
this the jurisdictional issue has been created in legal system.
Thus, the global dimension of Cyber Crime is made it difficult to handle and dealt with.
The evolution of internet technology has given us so many advantages to deal with future
problems and grow with rapid rate but also it has provided the scope for criminals to
commit their crime with least chance of detection. The cyberspace has proved a boon to
the deviant behaviour in the society. The concept of Cyber Crime has gained speed and we
are facing great threat of its impact on world society. The human society is become
vulnerable to Cyber Crime due to more and more dependence on technology.
12
13
The Concept of Cyber Crimeis very different from the traditional crime. Also due to the
growth of Internet Technology, this crime has gained serious and unfettered attention as
compared to the traditional crime. So it is necessary to examine the peculiar
characteristicsof Cyber Crime.
o Geographical challenges
In cyberspace the geographical boundaries reduced to zero. A CyberCriminal in no
time sitting in any part of the world commit crime in other corner of world. For
example a hacker sitting in India hack in the system placed in United States.
o Virtual World
The act of Cyber Crimetakes place in the cyber space and the criminal who is
committing this act is physically outside the cyber space. Every activity of the criminal
while committing that crime is done over the virtual world.
o Collection of Evidence
It is very difficult to collect evidence of Cyber Crime and prove them in court of
law due to the nature of Cyber Crime. The criminal in Cyber Crimeinvoke jurisdiction
of several countries while committing the Cyber Crimeand at the same time he is
sitting some place safe where he is not traceable.
13
14
Classifications of Cyber Crime
Cyber Crime can be classified into four major categories. They are as follows:
Cyber bullying: The term cyber bullying is not defined under any Indian law.
However, in general parlance, cyberbullying refers to bullying someone by
threatening, harassing or embarrassing the victim using technology digital device.
Generally, cyberbullying includes the following activities on the internet:
- Humiliating/embarrassing content posted online about the victim of online
bullying,
- Hacking social media accounts
- Posting vulgar messages on social media
- Threatening the victim to commit any violent activity
- Child pornography or threatening someone with child pornography
Also, Section 66E of the IT Act provides the punishment for violating any person’s
privacy through the internet. Under this section, any person who intentionally
violates anyone’s privacy by transmitting, capturing or publishing private pictures
of others shall be punished with imprisonment up to three years imprisonment or
a fineof up to three lakhs.
Further, Section 507 of IPC provides that any person who threatens anyone
through anonymous communication shall be punished with imprisonment for up
to two years.
14
15
One of the prime cases in which cyberbullying was discussed was Shreya
Singhal
v. Union of India (2015). In this case, the Hon’ble Supreme Court struck down
Section 66A of the IT Act. The said Section dealt with the transmission of
objectionable messages via a computer resource. The court held that the said
Section was a violation of Article 19(1)(a) of the Indian Constitution, which deals
with citizens’ right to freedom of speech and expression. The court further held
that other legal provisions like Sections 66B and 67C of the IT Act and several
Sections of the IPC were sufficient enough to deal with cyberbullying.
Cyber defamation: Cyber defamation means the harm that is brought on the
reputation of an individual in the eyes of other individual through the cyber
space. The purpose of making defamatory statement is to bring down the
reputation of the individual. Punishment for Cyber defamation is provided under
Section 67 of the IT Act; whoever publishes or transmits a defamatory statement
about a person shall be punished with 2 years imprisonment and a fine up to
₹25000.
Phishing: In this type of crimes or fraud the attackers tries to gain information
such as login information or account’s information by masquerading as a reputable
individual or entity in various communication channels or in email.Section 66C
of the IT Act penalizes any offender committing phishing-related activities. It
provides that anyone who fraudulently uses an electronic signature, password or
any other unique identification feature of any other person is punishable with
imprisonment ofup to three years and a fine of up to Rs.1 lakh.
Cyber theft: Cyber theft is a type of cybercrime which involves the unauthorized
access of personal or other information of people by using the internet. The main
motive of the cyber criminals who commit cyber theft is to gather confidential
data like passwords, images, phone numbers, etc. and use it as leverage to
demand a lump sum amount of money. The unauthorized transmission of
copyrightedmaterials, trademarks, etc. over the internet is also a part of cyber theft.
Cyber thefts are committed through various means, like hacking, email/
SMS spoofing, etc. Under the IT Act, data theft is defined under Section 43(b) as
downloading, copying, or extracting any data, computer database or information
from such computer, system, or network without the permission of its owner. 15
Punishment for
16
cyber theft (specifically, identity theft) is provided under Section 66C of the IT
Act. The punishment for the same is imprisonment of up to three years and/or
up to ₹ 2lakh fine.
DOS attack: In this attack, the attacker floods the servers, systems or networks
with traffic in order to overwhelm the victim resources and make it infeasible or
difficult for the users to use them. Cyber attackers who launch DoS in India are
punishable under Section 66F of the IT Act, which deals with cyber terrorism. As
per the said Section, any person who disrupts the authorised access to a
computer resource or gets access to a computer resource through unauthorised
16
means or causes damage to
17
a computer network is liable for imprisonment which may extend for life.
Salami attack: The other name of Salami attack is Salami slicing. In this attack,
the attackers use an online database in order to seize the customer’s
information like bank details, credit card details etc. Attacker deduces very little
amounts from every account over a period of time. In this attack, no complaint is
file and the hackers remain free from detection as the client’s remain unaware of
the slicing.
Web Jacking: Web Jacking refers to the illegal redirection of a user’s browser
froma trusted domain’s page to a fake domain without the user’s consent. By using
the method of Web Jacking, people visiting any well-known or reliable website
can be easily redirected to bogus websites, which in turn lead to the installation of
malware, leak of personal data, etc. Web jackers intend to illegally collect
confidential information of users by enticing them to click on any link which
may seem genuineat the first glance.
In India, data diddling is an offence under Section 65 of the IT Act. The said
Section provides that knowingly or intentionally concealing, destroying, altering or
causing another to conceal, destroy, or alter any computer source code used for a
computer, computer programme, computer system or computer network is
punishable with imprisonment of up to three years or with fine of up to two lakhs.
17
18
Cyber Terrorism: Cyber terrorism means using cyberspace to hurt the general
public and damage the integrity and sovereignty of any country. The IT Act
defines cyber terrorism under Section 66F as any acts done by a person with the
intent to create a threat to the unity, integrity, sovereignty and security of the
nation or create terror in minds of people or section of people by way of disrupting
the authorised access to a computer resource or getting access to a computer
resource through unauthorised means or causing damage to a computer network.
The punishment for cyber terrorism as provided under Section 66F of the IT Act is
imprisonment of up to 3 years and/or up to Rs. 2 lakh fine.
o Sony.Sambandh.Com Case
India saw its first cybercrime conviction in 2013. It all began after a complaint was
filed by Sony India Private Ltd, which runs a website called www.sony-
sambandh.com, targeting Non-Resident Indians. The website enables NRIs to send
Sony products to their friends and relatives in India after they pay for it online.
The company undertakes to deliver the products to the concerned recipients. In May
2002, according to the cybercrime case study, someone logged onto the website
under the identity of Barbara Campa and ordered a Sony Colour Television set and a
cordless headphone. She gave her credit card number for payment and requested the
products to be delivered to ArifAzim in Noida. The payment was duly cleared by the
credit card agency, and the transaction was processed. After following the relevant
procedures of due diligence and checking, the company delivered the items to
ArifAzim. At the time of delivery, the company took digital photographs showing
the delivery being accepted by ArifAzim. The transaction closed at that, but after
one and a half months the credit card agency informed the company that this was an
unauthorized transaction as the real owner had denied having made the purchase.
The company lodged a complaint about online cheating at the Central Bureau of
Investigation which registered a case under Section 418, 419 and 420 of the Indian
Penal Code. The matter was investigated, and ArifAzim was arrested. Investigations
revealed that ArifAzim while working at a call centre in Noida gained access to the
credit card number of an American national which he misused on the company's site.
The CBI recovered the colour television and the cordless headphone, in this one of
a
19
20
kind cyber fraud case. In this matter, the CBI had evidence to prove their case,
and so the accused admitted his guilt. The court convicted ArifAzim under Section
418, 419 and 420 of the Indian Penal Code - this being the first time that cybercrime
has been convicted.
The court, however, felt that as the accused was a young boy of 24 years and a first-
time convict, a lenient view needed to be taken. The court, therefore, released the
accused on probation for one year. The judgment is of immense significance for the
entire nation. Besides being the first conviction in a Cybercrime matter, it has shown
that the Indian Penal Code can be effectively applied to certain z used to exchange
many emailsusing the company’s computers. After some time they hadbroken up their
marriage and the young lady created somefake email ids such as “Indian bar
associations” and sentmails to the boy‘s foreign clients. She used the bankscomputer
to do this. The boy‘s company lost a hugenumber of clients and took the bank to court.
The bankwas held liable for the emails sent using the bank‘s system.
o Bazee.com case:
In December 2004 the Chief Executive Officer of Bazee.com was arrested because he
was selling a compact disk (CD) with offensive material on the website, and even
CD was also conjointly sold-out in the market of Delhi. The Delhi police and therefore
the Mumbai Police got into action and later the CEO was free on bail.
20
21
Not just individuals suffer from financial losses due to cybercrimes; some of the
surveys conducted have stated that approximately 80% of the companies participating
in thesurveys accepted financial losses due to cybercrimes.
Not just financial losses, people also suffer from leakage of their personal information.
Many social networking sites, no matter how safe, are still an open platform for
everyone to see someone else’s life, which can be dangerous. Apart from this,
hackers can also hack into one’s account and collect whatever information they want
to. Spamming and phishing also cause harm to people.
Cyber Law
Cyber Law took birth in order to take control over the crimes committed through the
internet or the cyberspace or through the uses of computer resources. Description of the
lawful issues that are related to the uses of communication or computer technology can be
termed as Cyber Law.Cyber Crimes are a new class of crimes which are increasing day
by day due to extensive use of internet these days. To combat the crimes related to internet
The Information Technology Act, 2000 was enacted with prime objective to create an
enabling environment for commercial use of I.T. The IT Act specifies the acts which have
been made punishable. The Indian Penal Code, 1860 has also been amended to take into
its purview Cyber Crimes.
With the evolution and development of the internet, information technology and
computers, challenges imposed by Cyber Crimes have also increased. Therefore, cyber
laws regulate all fields of laws in which Cyber Crimes can be committed, such as criminal
law, contract, intellectual property law and tort. Cyber laws deal with various kinds of
concerns, such as free speech, safety, intellectual property rights, privacy, terrorism, e-
commerce andjurisdiction of cyber laws.
With the increase in the number of internet users, the need for cyber laws and their
application has become very urgent in modern times. Cyber laws are needed because:
Consumers are increasingly using online transactions with the increased popularity of
payment apps and sites, as they are easy and efficient. Government’s scheme of
‘Cashless India’ has also gained popularity resulting in a high amount of online
transactions.
Email, SMS, messaging apps and social networking sites have become the main mode
of communication.
Companies are highly dependent upon their computer networks to keep their electronic
data safe.
22
23
Most of the government forms are now filled in electronic format, for example, Income
Tax Return, Passport application, Pan Card application, Company law forms etc.
Computers and networks also help in non-Cyber Crimes as well. As most of the data,
these days are stored in computers and mobile phones. The evidence collected from
them can help in various crimes such as kidnapping, terrorist attacks, counterfeit
currencies, tax evasion and such.
Cyber laws help in representing and defining the model of cyber society and
maintaining cyber properties.
Digital contracts are also gaining popularity in modern times; cyber laws help in
protecting the rights of these legally enforceable digital contracts.
In India, cyber laws are contained in the Information Technology Act, 2000. The main
object of this Act is to provide legal recognition to e-commerce and electronic formats
and to facilitate the filing of electronic records with the Government. This legislation lays
down rules and regulations related to cybercrimes, electronic information and formats,
electronic authentication and digital signatures, and liability of network service
providers. The I.T. Act is based on the United Nations Model Law on Electronic
Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of the
United Nations by a resolution dated30 January 1997.
23
24
24
25
25
26
26
27
CONCLUSION
The rise and proliferation of newly developed technologies begin star to operate many
cybercrimes in recent years. Cybercrime has become great threats to mankind. Protection
against cybercrime is a vital part for social, cultural and security aspect of a country.
The role and usage of the internet is increasing worldwide rapidly. It has increased the
convenience of the consumer as everything can be done staying at home; however, it
has also increased the convenience of cybercriminals to access any data and information
which people intentionally and unintentionally provide on the internet and otherwise. So,
along with proper legislation to protect and prevent cybercrimes, it is necessary that
people are made aware and educated regarding cybercrimes.
Nevertheless, even though internet users let out their personal data easily, it still remains
the responsibility of the State to protect the interests of its people. It has been
recently found that big companies like Facebook use personal information and data of its
users and use this information to influence the political views of people. This is a serious
threat to both individual’s privacy and the Nation’s interests. With the introduction of
the I.T. Act, 2000, the issue of crimes in Cyberspace in India has been addressed very
smartly, yet, the proper implementation of the Act is still lacking. The need for efficient
cyber laws is very evident, considering the current scenario, but individuals should also be
aware of such threats while surfing the internet.
27
28
Bibliography
o www.cyberralegalservices.com
o Cybercrime.org.za/definition
o ipleaders.com
o indiankanoon.org
o legalservicesindia.com
o infosecawareness.in/cyber-laws-of-india
o Information Technology Act, 2000 Bare act
o Indian Penal Code, 1860 Bare act
o Professor S.T. Viswanathan: The Indian Cyber Laws with Cyber Glossary
28