Professional Documents
Culture Documents
Cyber Law Essay
Cyber Law Essay
ABSTRACT
Nowadays, everyone is heading into the realm of digitization and networking,
which, without a question, has a diverse benefit in our daily lives. Digitalisation
is sweeping the planet in both good and terrible ways. On the one hand,
technology assists people in their daily lives; on the other hand, it gives birth to
a new criminal tactic known as cybercrime. India has the highest rate of
cybercrime in the world. A study was carried out from November to December
2021. With 76% of internet users having experienced cybercrime, India has the
highest percentage. The government requires laws and orders to prevent such
crimes from occurring.
"Many cybersecurity laws are primarily determined by each country's territorial
extent." The penalties also vary depending on the offense committed, ranging
from fines to imprisonment." National Cyber Security Policy, IT Act of 2000.
The Information Technology Act of 2000, the National Cyber Security Policy of
2013, or any other guidelines in India do not define cybercrime. As a result, to
characterize digital wrongdoing, one can simply state it is a combination of
wrongdoing and PC.
INTRODUCTION
A general definition of cyber law is a complete set of rules that deal with the
web, PC frameworks, the internet, and any issues related to the internet or data
innovation. Internet regulation encompasses a wide range of topics, including
sections of contract regulation, security rules, and protected innovation
legislation. It manages the electronic distribution of programs, data, information
security, and electronic commerce. Under digital legislation, e-archives are
legitimately acknowledged. Furthermore, the framework provides a design for
electronic commerce exchanges and electronic structural documentation.
Simply put, regulatory arrangements with digital wrongdoings. As the web-
based business has grown in popularity, it has become critical to ensure that
adequate procedures are in place to prevent acts of negligence.
The internet is the computer-created cosmos of the web, and the policies that
govern or are now in effect in this area are known as digital regulations or IT
regulations. Because these rules have a broad application, all users of this
website rely on them.
Many cybersecurity rules are mostly determined by each country's territorial
extension. The penalties also vary depending on the offense committed, ranging
from fines to imprisonment. National Cyber Security Policy, IT Act of 2000.
The Information Technology Act of 2000, the National Cyber Security Policy of
2013, or any other guidelines in India do not define cybercrime. "The modern
thief steals with a computer rather than a sword." The terrorist of the future may
be able to cause more damage with a keyboard than a bomb."
Cyber fraud is a type of cybercrime that involves using the internet to provide
false information in order to obtain money or property from his victim. Cyber
fraud encompasses a wide range of crimes conducted over the internet. That
differs from stealing in that the victim is used as a ruse by the criminal to obtain
information regarding money or property. The most prevalent cyber scams that
result in the victim's loss of information or financial assets include hacking,
phishing, and identity theft. In recent years, individuals and organizations have
had to be equally alert of both insiders and outsiders for fraud.
“Cyber stalking”
Cyberstalking is a crime in which someone annoys or stalks a victim by
electronic or computerized means such as virtual entertainment, email, texting
(IM), or messages delivered during a conversation gathering or debate.
“Impersonation”
Whoever imitates or attempts to imitate someone else in any situation, true or
fictitious, by providing false segment data or biometric data.
“Loss of privacy”
Privacy is about more than just hiding things; it is also about controlling who
the rest of the world thinks they are. Individuals might suffer serious
consequences from loss of privacy, ranging from shame to identity theft.
“In India, cyber laws are contained in the Information Technology Act, 2000
(“IT Act”), which came into force on October 17, 2000.” The fundamental goal
of the Act is to legalize electronic trade and make it easier to file electronic
records with the government.
In this instance, bank management trainees were married. "The pair had been
exchanging letters on the company's computers." They had divorced after a
while, and the lady created a bogus email address like "Indian bar
organizations," and mail was sent to overseas consumers." She sent these emails
using the bank's computer. As a result, large consumers are lost. The bank was
deemed responsible for the emails.
AVNISH BAJAJ V. STATE (N.C.T.) OF DELHI
CONCLUSION
In general, innovation is a two-sided coin that can be used for both good and
evil. Steganography, Trojan Horse, Scavenging (and even Dos or DDoS) are
innovations and, in essence, not violations; however, when they fall into the
hands of some undesirable individuals with a malicious intent who are on a
mission to take advantage of or abuse them, they enter the realm of digital
wrongdoing and become culpable offenses.