Professional Documents
Culture Documents
Cyber Law
Cyber Law
Cyber Law
❖Cognizable Offence :-
✓ The offence in which arrest without warrant is provided are called
cognizable offence.
✓ In case of cognizable offence the polices has the power to arrest the
person without warrant (order of arrest from the court/court order )
✓ Example : cognizable offences are those offence which are serious in
nature such as murder, rape, dowry, kidnapping, theft etc.
✓ Characteristics :
1. FIR is First Information Report is registered with the police.
2. Police can start investigation without taking the permission from the
court.
3. The state government is the prosecutor the responsibilities of the
complaining or of victim is only to participate & providing assistance
to the public prosecutor.
4. The burden to prove the allegation lies with the public prosecutor.
✓ Section 154 Cr. P.C. provides that under cognizable offence the police
has to obtain the FIR from the deceased or from eased relatives or
represented without the permission of magistrate & the same has to be
entered in the general diary of the police station.
✓ After completing the investigation the police is required to file the
change sheet before the criminal court & afterword further procedure
like framing the issues, evidence, defense evidence, final argument &
judgment.
➔ Non- cognizable Offence:-
✓ Non-cognizable Offence means a case in which a police officer has no
authority to arrest without a warrant.
✓ Non-cognizable Offence is not serious in nature.
✓ For example: Assault, cheating, forgery, defamation.
✓ Characteristics :
1. FIR is Filed in the court.
2. Investigation of the case cannot be started when the court gives an
order to start the investigation.
3. The investigation can only be started when the court gives an order
to start the investigation.
4. It is the complaint who seeks to prosecute the accused 1.
5. The burden of proving of the offence lies upon the complaints.
6. No FIR can be registered the complaints can file a criminal complaint
in the court of magistrate.
1)Hacking :-
Hacking can be made in the following ways.
It refers to breaking into computer System. Hacking also means where hackers
destroys, deletes, after any information to stored in the computer system or
diminishes its value or utility.
Hacker is a person who hacks the computer system the can be classified in the
following.
a) Code Hackers.
b) Phreakers
c) Cyber Punks
d) Crackers
a)Code hackers :-
They have knowledge of intricacies of computer system and dear operation.
b) Phreakers:-
Phreakers have deep knowledge of Internet and Telecommunication system.
c) Cyber Punks :-
Cyber Punks specialized in cryptography (It is a method of storing and
transmitting data it can also be used for users authentication)
d)Crackers :-
Crackers the Backers into computer security system.
Out of all Cyber crimes hacking are now is the biggest threat to Internet and E-
commerce. The hacking is causing the huge loss which may be calculated in
billions and trillions if the hacking is unchecked it may cause a serious threat in
future to e-commerce and because of threat and its security system the e-
commerce is going to be costlier.
India is centre point of Pakistan; and Chinese hackers they sometimes insert al
link to pornographic website and also website of SEBI(Stock Exchange Board of
India ) had been Hacked there may be some reason for hacking such as
1) For fun as a hobby mostly teenagers
2) To damage competitors Business.
3) For fraud and misappropriation.
4) To test the Client system, Internet security and to win their confidence.
➔ Punishment for Hacking:-
The punishment for hacking is as under
a) An imprisonment upto 3 yrs.
b) Imprisonment with a fine which may extend to 2 Lacs of props.
c) Sometimes the punishment as mentioned above may be given together(a
and b).
➔ Case Law: -
✓ In feb 2001 two person Mr. Amit and Mr. Kapil blocked access to the
complained website on the grounds of non-payment of charges for
hiring web space. They not only blocked but displayed the message
site closed due to non-payment of bill.
✓ Blocking access was legal but display of message amounted to
hacking and wrongful loss under section 66 of IT Act and Section 23
of IPC
✓ The IT Act also covers the damages up to rupees 1 core on the
commission of computer related crimes without the permission of
owner.
2)Teenage Web Vandals:-
✓ Artech, Nemesustn, Team holocaust and Doo-Doo Knew are teenage
Web Vandals also called by security experts as ankle, biters packet
monkeys and script kiddies.
✓ It is noted that this teenage web vandals either deface web pages or
tag remarks on websites.
✓ This type of cyber crime has become fashionable and hot fabric of
teenagers nudism in India.
✓ E.g:-How to hack CD’s are easily and cheaply available only for 100-200-
300 which is affordable for any student such CD’s are helpful in cracking
a game to hacking a internet account and hijacking computer./
✓ The significant motivating factor of teenage criminality which is district
from other teenage crime such as drug abuse and violence.
✓ It can be checked by impacting information about the adverse
consequences of cyber crime to the IT Industry and the society the
parents can prevent children and check their acts.
3)Cyber Fraud :-
➔ Fraud :-
✓ A fraud is a deliberate deception to secure unfair and un lawful game or
to despised or to victim of a legal right section 17 of the Indian Contract
Act says fraud means and includes anty one of the following Acts
committed by a party through a contract with an intend to deceive
another party or his agent or to induced him to enter into the contract
1. The suggestion as a fact of that which is not true, by one who does not
believe it to be true.
2. By concealing (hide ) the material fact knowingly
3. A promise made without an intention to perform
4. Any other Act fitted to deceive
5. Any Act or a mission as the law declares to be fraudulent.
6. All Acts which amount to be cheating would be fraud but all fraud may all be
cheating.
✓ Section 25 of IPC also defines the fraud a person is said to do fraudulent
things if he does that thing with the intend to defraud the other person.
✓ Some of the examples of fraud in the cyber crime or as under like
misuse of credit cards by obtaining password by hacking, bogus
investment, deceptive investment, newsletter containing falls
information, auctions of website (online auction) and misappropriation
and transfer of funds.
➔ Cyber cheating :-section 4/5 of IPC defines cheating
Under Section :
✓ who is ever deceiving any person proudulenty or dishonestly the
person so deceive to deliver any property to any person or to concept
that any person shall return any property or intentionality induces. The
person so deceived to do or aimed to do any, it he were not so
deceived and which act or a mission causes or is likely to cause
damages or harm.
✓ Dishonest concealment of fetch is a deception.
✓ Eg. Mr.A boy exhibition to Z. a fall sample of an article intentionality
deceives Z into believing that the article corresponding with the sample
and there by dishonestly involves Z to buy and pay for the article. In this
case A has Cheated.
➔ Punishment :-
The punishment for cheating is an imprisonment which may extended
upto 1 year or with fine or both as per section 4/7
➔ Virus:
Section 43 Act IT Act says: -
✓ Computer virus move, any computer virus any computer instruction
info. Data or programming that are destroy, damage or adversely
affected the performance of computer.
✓ The edge it self to another computer resource and program, data or
instruction is executed or some other event take place in the computer.
✓ Example:-
The low bug virus come as an attachment to an e-mail with the subject I
love u and when the victim clicks on attachment all the files in the
victim’s computer with junk data thereby destroy or damaging all the
details.
✓ Damage and computer content to destroy, to modify to re-arrange any
computer by anomies.
➔ Fine: -
✓ The info at IT Act in the damage concern not executively to the victim
the Act at planning virus or other content marks in the computer is also
liable at mischief which is define under section 45.
✓ Mischief many, if a person with intent to course is knowing that is out is
likely to course, wrong to loss or damage to the public or any person is
said to committee mischief.
✓ The punishment for mischief if the loss is ranging from rs.50 lac is
punishable with imprisonment for expectedly two years all with fine or
with both (imprisonment & fine together).
➔ Deformation & harassment &email abuse: -
✓ Deformation means, injury or lowering down reputation of accuses.
✓ Deformation is an offence under the IPC (India Panel court) consist of
following essential:
1) Publishing any bad articles are writing which is lowering the
representation of person.
2) Imputation is made intension of causing to the reputation of a
person.
3) Imputation is made by overall words is damaging reputation of a
person.
✓ These are three types of determination
1) Libel :- This is are retained definition.
2) slander :- This is oral definition.
➔ Punishment :-
Section 500 of IPC gives the following punishment.
1) An imprisonment for a term which many extended to two years.
2) With fine many also be post.
3) Imprisonment and fine many both many be avoided together.
➔ Exception :-
In the following bases the imputation doesn’t amount to be an offense.
1) Imputation which is true concerning any person if it is for public good
2) An in good faith regarding the conduct of any person and the following
any public question.
3) Publishing a true report of processing a court of justice.
1. Shrink Wrap:-
➔ Shrink Wrap Contract or licensed agreement.
➔ The terms and condition which can be read and accepted by the
consumer after opening the product.
➔ The terms describe the shrink wrap plastic wrapping used to coat
software boxes.
➔ It is a practice to enclose warranty cards and contract terms inside
boxes containing products other than software’s.
➔ The terms all generally available to review after the product have
been bought and open.
➔ There are the following controversies regarding the shrink wrap
software’s
a. A consumer does not get the opportunities to know the terms and
condition of the software license before its purchase.
b. The terms in the contract are not connected because, it is
enforceable.
c. There is no chance to negotiate the contract.
d. They are for fixed terms of time.
e. They are void because they may be against public policy.
2. Click Wrap:-
➔ A click wrap agreement is mostly found as part of installation process
of software package. It is also called a click through agreement or
click wrap license.
2. Icon clicking:-
➔ Where the user must click on an OK on every button on a dialogue
box or pop-up window a user indicate reaction.
➔ There are the following controversies Lapses.
a. It lacks bargaining power.
b. The term of service may not always appear on the web page. It
must be properly structured so as to enhance the credibility.
c. It user should be allowed to access the process easily.
❖ Formation of Contract under Indian Contract Act 1872:-
2(a) Offer/Proposal
2(b) Acceptance.
➔ Contract under Section 2(h)
➔ A contract enforceable by law is called an contract.
➔ Agreement after + Acceptance.
➔ Contract an agreement + it’s enforceable.
2(c) Agreement:-
➔ Every promise and every set of promise forming the consideration
for each other is any agreement.
➔ Agreement means, where a person is saying to another person to do
or not to do something and the other person is doing the same and
agreement is said to be born between them. This is also known as
“Offeror / Promisor” and the person who accept it is known as
offeree / Promisee.
➔ Enforceability means, that the agreement must be recognized by the
law.
2 (d) Consideration:-
Latin:-quid pro quo (Something in written).
➔ Consideration is called soul of contract and therefore, it is said that
no consideration no contract.
➔ Void:- An agreement not enforceable by law is called “Void
Agreement”.
➔ Voidable:- An agreement which is enforceable by law of the option
one or more of the parties there through but not at the option of
others is a voidable contract.
Voidable contract is also a contract where the consent of a party
is affected by any one of the following elements.
a. Coercion → Threat to the Body / Property.
b. Under influence → undue pressure.
c. Fraud.
d. Miss-representation.
e. Mistake.
❖ Communication of offer / Proposal and Acceptance :-
➔ The communication of offer or proposal can either be made by oral
way or written way an offer is said to be a complete offer.
❖ Communication of Acceptance:-
➔ An offeree often accepting the proposal can send it back to the
offeror but sometimes an acceptance is forwarded to the offeror
butmay not be reaching to the offeror.
➔ The law at this point is that nearly putting the acceptance in the
course at transmission such as it post pax, tellax is said to be
complete whether it is reaching to the knowledge of offeror or not.
❖ Revocation:-
➔ A proposal may be revoked at anytime before the communicate of
its acceptance an acceptance may be revoked at anytime before the
communication at it’s acceptance is received as against the acceptor
but not as the words.
❖ Contract formation on Internet:-
➔ Contract creates a relationship of right and obligations between the
parties Section 11, 12 and 13 plays important role in the for nation at
E-record. Could be attributed to the originator if it was sent by:-
a. The originator himself.
b. A person who may be the agent / authority to act at behalf of the
originator.
c. An information system programmed by or on behalf of the
originator to operate automatically.
❖ Place:-
➔ Creation an termination at right and obligation of the parties in the
contract.
➔ Territorial jurisdiction.
➔ Applicability of laws of land evidentiary consequences.
❖ Time:-
➔ Determination of the time at period at limitations for initiating
litigation (case).
➔ Timely compliance at legal obligation (duties) and procedures.
➔ As we know that electronic records or in the form of date,
records, images or sound stored received or sound in electronic form
or microfil at the same time there are certain problems in
ascertaining the time and place of dispatch and receipt of electronic
records.
➔ As well the geographical borders may not be located at the time
of making the contract.