Cyber Laws Material

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 50

Page: 1

Cyber laws

Q)What are the impact of Computer in Society?


Introduction:

Computers play a vital role in our society. They are the central tools in modern
societies. Nowadays, computers are used in almost all the field of society. They are
used in education, medicine, entertainment, industries, banks, homes, science and
technology, transportation, communication, and businesses. The terms 'computer'
and 'society' are complementary to each other. If a computer is removed from
society, society becomes useless. All human activities have a great influence on
computers. The progress of any country is measured on the basis of the advancement
in Information Technology (IT). But, it has also negative impacts in society, So, we
should study the positive as well as negative impacts of computers in society.
Computers are used in various sectors like teaching and learning.

Some of the major computer application fields are listed below:


1. Management:
The computer can also be used as a managerial tool to assist in solving business
problems.
2. Banking:
The branches of banks are equipped with terminals giving them an online accounting
facility and enabling them to information about current balances, deposits,
overdrafts, and interest charges.
3. Industrial Applications:
In industry, production may be planned, coordinated, and controlled with the aid of a
computer.
4. Engineering Design:
Computers help to calculate all the parts of a proposed design and also assist in the
design.
5. Road Traffic Control:
Computers assist to control the traffic lights of roads.
Page: 2
Cyber laws

6. Telephones:
Computerized telephone exchanges handle an ever-increasing volume of calls very
efficiently.
7. Medicine:
Computers are widely used in hospitals for tasks such as maintaining drugs, surgical
equipment, payroll, checkup, and treatment of diseases.

Computers have both positive and negative impacts on our daily life as well as in our
social life. But the gross development of the nation is faster with the application of
computers in industries and education. Both positive and negative impacts of
computers are given below:
Positive Impacts
a. Employment:
Computer Science has opened many opportunities for present and future
employment. Nowadays, the world is computerized and computers have become
essential requirements for human life. Because of the development of computers,
people get opportunities related to the development of computer software and
hardware. So, we can say that computers play a vital role to create new employment
opportunities in our society.
b. Education:
Computers have made a direct impact on education. Computers are involved in
teaching and learning processes. They can instruct each student differently, animate
important concepts, and use interactivity to involve students in the learning process.
CAI (Computer Aided Instruction) refers to interactive instructional strategies that
are computers to convey and teach instructional material to students. Similarly, CAL
(Computer Assisted Learning) is used to convey a vast amount of information in a
very short period of time. A computers' voice recognition capability and its
connection to the Internet make it possible for the students to participate in learning
activities.
Page: 3
Cyber laws

c. Communication:
One of the most exciting and fastest-growing applications of computer technology is
communication. The Internet forms a vast web system around the world through
which computers can exchange information at high speed. People, by sitting at one
corner of a country can communicate easily with different people around the world
very easily. Workers use a computer terminal or microcomputer with
telecommunication capability to access their company computer networks and
databases.
d. E-Commerce:
Electronic commerce is an online activity of the business. It is a global phenomenon
of marketing in which goods and services are offered through the Internet. The
business organizations arrange questionnaires and collect views of customers about
products. The advertisement, employment communication, order taking, and supply
are done through the computer.
e. Health care:
Computers are used in the medical field for performing a wide variety of tasks. They
are used in medicine for diagnosing illnesses and monitoring patients to control the
movements of robotic surgical assistants. There are many expert systems to guide
physicians and surgeons. The computerized systems automate the billing and other
administrative processes.
f. Entertainment:
Computers have now become an important part of the entertainment industry. They
are widely used to create special effects in movies. They are used in editing movies
and multimedia presentations. All films and videos are created by using computers.
So, it can be said that there is little chance of entertainment without the use of
computers in our society. Similarly, Virtual Reality (VR) and artificial environments
seem to really help in playing games and watching 3D movies.
g. Science and technology:
Computers are responsible to improve scientific and technological advancements.
They are also used in the design and operations of man-made satellites, space
exploration, vehicles, rockets, and weather forecasting.
Page: 4
Cyber laws

h. Multimedia:
The multimedia presentation gives the information to the targeted group using a
variety of media like text, voice, animation, sound, picture and so on. Multimedia
contents are very clear for viewers to grasp the concept of everything. Multimedia
technology is used in our society, especially for the teaching-learning processes and
advertisements.

Besides the above-mentioned points, the positive impacts of computers can be


listed as:
1. Work can be done in a very short time.
2. More information can be stored in a small space.
3. Multitasking and multiprocessing capabilities are available.
4. It is easy to access data.
5. Impartiality.
6. The documents can be kept secret.
7. It is helpful to produce an error-free result.
8. It can be used for various purposes.

Negative impacts.
a. Reduction of employment:
When computers are installed in organizations, only a few expert employees are
needed and the rest are terminated from jobs. So, it creates the problem of
unemployment also. Because of the lack of knowledge of computer education in our
society, many people are becoming jobless. On the other hand, if our society is
computerized then fewer workers are required. This is the negative impact of
computers.
b. Computer Crime
Computer crime includes theft of computers and computer software, theft of data,
and destruction of data by computer viruses, Many computer crimes involved the
theft of money. Computer-related crimes are numerous and widespread. If data is lost
Page: 5
Cyber laws

or damaged we may not retrieve these in desired time and it creates adverse effects
on business.
c. Privacy
The growth of computerized record-keeping brings dangers of privacy. Computers
contain important and valuable data and they allow this data to be transmitted,
copied, and combined in ways that were never possible with an earlier manual
system. So, important data and information may be changed illegally by computer
users and creates a problem of privacy.
d. Creativity
Nowadays, people are not using their minds for common arithmetic which gradually
results in loss of their numerical ability. On the other hand, people are busy playing
computer games instead of outdoor games. This leads to a decrease in physical and
creative activities.

Besides these points, the negative impacts of computers can be listed as:
1. Highly expensive.
2. Sometimes, huge data and information can be lost.
3. Fast-changing computer technology.
4. illiteracy of computing and computers.

Q). Explain about overview of Web Technology


A Basic Web Technology Overview
Rendering a website works by combining server side technologies with client side
technologies. The “client side” being a web user looking at web pages within their
web browser and “server side” being the computer(s) they interact with when
viewing a website. Understanding this setup is important when looking to develop a
website.
The relationship between the two looks a little bit like this (Each circle being a web
technology):
Page: 6
Cyber laws

What Are the Different Web Technologies?


Web technologies are often divided according to where they are used. That is, are
they focused on the client-side or server-side of web applications? Knowing the basic
categories of web technologies is essential if you plan to work in web development.
Thus, here is a list of web development technologies by category:

 Browsers
 HTML and CSS
 Programming Languages
 Frameworks
 Web Servers
 Databases
 Protocols
 Lastly, data Formats

Although many technologies are involved in creating a web application, some are
more central to building a web application.

Best Web Technologies to Learn


To create a web application, a developer should be familiar with one or two
programming languages, front- and back-end frameworks, databases, and CSS.

CSS
Cascading Style Sheets let designers change the look of a web page. CSS
frameworks such as Bootstrap or Tailwind CSS can speed page development.
However, front-end developers can create modular CSS components that can be
reused as needed, eliminating the need for frameworks such as Materialize and
Bulma.

Tools are continually being developed to help with web page design and creation.
For example, LESS and SASS are pre-compilers that add functionality and make
CSS easier to work with. Flexbox and Grid are two newer tools that help develop
grid-like layouts for web pages.
Page: 7
Cyber laws

Frameworks
Frameworks take care of repetitive development tasks or make programming tasks
easier to do. There are frameworks for the server-side and the client-side of web
development. Different programming languages require different frameworks. A few
server-side frameworks include:

 Node.js. JavaScript server-side framework


 Ruby on Rails. Full-stack framework for Ruby
 .NET. Microsoft’s full-stack framework
 Django. Full-stack framework for Python
 Yii, Zend, and Laravel. Three of the most popular PHP frameworks.
 Meteor. Full-stack framework for JavaScript that can co-exist with front-end
frameworks.
 Spring. Java framework.

Meteor and the PHP frameworks are new to the market. Some front-end frameworks
are based on content management systems (CMS). Both WordPress and Drupal are
CMS-based systems built with PHP. Mobile frameworks are also available, including
Ionic and Phonegap/Cordova. There are several front-end frameworks for JavaScript,
such as

 Angular.js
 Ember.js
 Backbone.js
 Express.js
 Vue.js

With so many frameworks, it’s easy to learn multiple frameworks. The best approach
is to learn one or two and expand as needed.

Programming Languages
Programmers have their favorite languages. The best language is more a matter of
preference than functionality, although there are times when one language may be
better suited to an application than another. Here are the most common programming
languages.

 Javascript
 Python
 Ruby
 PHP
 Java
 C#
 HTML
 Elixir
 Lastly, Scala
Page: 8
Cyber laws

Elixir and Scala are relatively new languages. Other languages include Go,
Objective-C for iPhones, and Swift. Swift is Apple’s latest programming language.

Databases
Databases can be relational like SQL or non-relational like MongoDB. No matter the
database, web applications use them to store data that is used to display on web
pages. The following are the most used databases.

 MongoDB – is an open-source NoSQL database


 Oracle – is an enterprise SQL database
 SQL Server – Microsoft’s SQL database
 Redis – is the most popular key-value store
 PostgreSQL – is a popular, open-sourced SQL database
 MySQL – a popular open-source database

Understanding data storage makes transmission of information from the front-end to


the back-end more efficient.

Overview of Web Development Technologies


In addition to the core web technologies are browsers, web servers, protocols, data
formats, and APIs.

Browsers
Web applications should be browser independent.

 Google Chrome. Most popular browser


 Safari. Apple’s web browser
 Firefox. Open-source browser
 Internet Explorer. Microsoft’s browser

However, if an application is not independent, the web pages may not display as they
should.

Web Servers
Web servers allow communication traffic between the client and the server. The
most used servers include:

 Apache Web Server


 Nginx Web Server
 IIS Web Server
 LiteSpeed Web Server

Also, Apache Tomcat, Node.js, and Lighttpd are other web servers.
Page: 9
Cyber laws

Protocols
Protocols standardize how data interacts among computers. Further, HTTPS is the
protocol between a browser and a website. Indeed, it is the fundamental way
information transports over the internet. Two newer protocol:

 DDP – is a new protocol created in connection with Meteor that establishes a


consistent socket connection between the client and the server.
 REST – is a protocol for APIs.

An API is an application programming interface that allows programs to access


another application. It uses standardized rules for the exchange of information.
Indeed, Facebook and Google use APIs for their web services.

Data Formats
Data formats structure data storage. JSON is becoming the most popular, although
most Microsoft systems still use XML. CSV is a comma-delimited data format,
primarily used by applications such as Excel.

Q). Need For Cyber Law

In today’s techno-savvy environment, the world is becoming more and more


digitally sophisticated and so are the crimes. Internet was initially developed as a
research and information sharing tool and was in an unregulated manner. As the time
passed by it became more transactional with e-business, e-commerce, e-governance
and e-procurement etc. All legal issues related to internet crime are dealt with
through cyber laws. As the number of internet users is on the rise, the need for cyber
laws and their application has also gathered great momentum.

In today’s highly digitalized world, almost everyone is affected by cyber law.

For example:
# Almost all transactions in shares are in demat form.
# Almost all companies extensively depend upon their computer networks and keep
their valuable data in electronic form.
# Government forms including income tax returns, company law forms etc. are now
filled in electronic form.
# Consumers are increasingly using credit/debit cards for shopping.
# Most people are using email, phones and SMS messages for communication.
# Even in “non-cyber crime” cases, important evidence is found in computers/cell
phones eg: in cases of murder, divorce, kidnapping, tax evasion, organized crime,
terrorist operations, counterfeit currency etc.
# Cybercrime cases such as online banking frauds, online share trading fraud, source
code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing
attacks, email hijacking, denial of service, hacking, pornography etc. are becoming
common.
Page: 10
Cyber laws

# Digital signatures and e-contracts are fast replacing conventional method of


transacting business.

Q) Importance of Cyber Laws

# We are living in highly digitalized world.


# All companies depend upon their computer networks and keep their valuable data
in electronic form.
# Government forms including income tax returns, company law forms etc are now
filled in electronic form.
# Consumers are increasingly using credit cards for shopping.
# Most people are using email, cell phones and SMS messages for communication.
# Even in “non-cyber crime” cases, important evidence is found in computers/ cell
phones e.g. in cases of divorce, murder, kidnapping, organized crime, terrorist
operations, counterfeit currency etc.
# Since it touches all the aspects of transactions and activities on and concerning the
Internet, the World Wide Web and Cyberspace therefore Cyber law is extremely
important.
Q).History of cyber law

Q). Explain about Cyber Law (IT Law) in India


Cyber Law also called IT Law is the law regarding Information-technology
including computers and internet. It is related to legal informatics and supervises the
digital circulation of information, software, information security and e-commerce.
IT law does not consist a separate area of law rather it encloses aspects of contract,
intellectual property, privacy and data protection laws. Intellectual property is a key
element of IT law.
Page: 11
Cyber laws

According to Ministry of Electronic and Information Technology, Government


of India :

Cyber Laws yields legal recognition to electronic documents and a structure to


support e-filing and e-commerce transactions and also provides a legal structure to
reduce, check cyber crimes.
Importance of Cyber Law:
1. It covers all transaction over internet.
2. It keeps eyes on all activities over internet.
3. It touches every action and every reaction in cyberspace.

Area of Cyber Law:


Cyber laws contain different types of purposes. Some laws create rules for how
individuals and companies may use computers and the internet while some laws
protect people from becoming the victims of crime through unscrupulous activities
on the internet. The major areas of cyber law include:
1. Fraud:
Consumers depend on cyber laws to protect them from online fraud. Laws are
made to prevent identity theft, credit card theft and other financial crimes that
happen online. A person who commits identity theft may face confederate or state
criminal charges. They might also encounter a civil action brought by a victim.
Cyber lawyers work to both defend and prosecute against allegations of fraud
using the internet.

2. Copyright:
The internet has made copyright violations easier. In early days of online
communication, copyright violations was too easy. Both companies and
individuals need lawyers to bring actions to impose copyright protections.
Copyright violation is an area of cyber law that protects the rights of individuals
and companies to profit from their own creative works.

3. Defamation:
Several personnel use the internet to speak their mind. When people use the
internet to say things that are not true, it can cross the line into defamation.
Defamation laws are civil laws that save individuals from fake public statements
that can harm a business or someone’s personal reputation. When people use the
internet to make statements that violate civil laws, that is called Defamation law.

4. Harassment and Stalking:


Sometimes online statements can violate criminal laws that forbid harassment and
stalking. When a person makes threatening statements again and again about
someone else online, there is violation of both civil and criminal laws. Cyber
lawyers both prosecute and defend people when stalking occurs using the internet
and other forms of electronic communication.
Page: 12
Cyber laws

5. Freedom of Speech:
Freedom of speech is an important area of cyber law. Even though cyber laws
forbid certain behaviors online, freedom of speech laws also allow people to
speak their minds. Cyber lawyers must advise their clients on the limits of free
speech including laws that prohibit obscenity. Cyber lawyers may also defend
their clients when there is a debate about whether their actions consist of
permissible free speech.

6. Trade Secrets:
Companies doing businesses online often depend on cyber laws to protect their
trade secrets. For example, Google and other online search engines spend lots of
time developing the algorithms that produce search results. They also spend a
great deal of time developing other features like maps, intelligent assistance and
flight search services to name a few. Cyber laws help these companies to take
legal action as necessary in order to protect their trade secrets.

7. Contracts and Employment Law:


Every time you click a button that says you agree to the terms and conditions of
using a website, you have used cyber law. There are terms and conditions for
every website that are somehow related to privacy concerns.

Advantages of Cyber Law:


 Organizations are now able to carry out e-commerce using the legal infrastructure
provided by the Act.

 Digital signatures have been given legal validity and sanction in the Act.

 It has opened the doors for the entry of corporate companies for issuing Digital
Signatures Certificates in the business of being Certifying Authorities.

 It allows Government to issue notification on the web thus heralding e-


governance.

 It gives authority to the companies or organizations to file any form, application


or any other document with any office, authority, body or agency owned or
controlled by the suitable Government in e-form by means of such e-form as may
be prescribed by the suitable Government.

 The IT Act also addresses the important issues of security, which are so critical to
the success of electronic transactions.

Q) Explain about Intellectual property:


Four Examples of Intellectual Property
Page: 13
Cyber laws

As a business owner, you manage many assets on a daily basis, but you may be
overlooking an important one: intellectual property.

Your intellectual property includes the intangible assets you create for your business,
such as names, designs, and automated processes. And just like tangible possessions,
your intellectual property needs to be monitored and protected.

1. Trademarks
Trademarks are the names, phrases, and symbols that differentiate your brand from
others in your industry. They must be distinctive and used in commerce to sell or
promote a product or service.

Examples: Words, symbols, names, colors, or sounds that identify where your goods
and services come from.

2. Copyrights
A copyright grants legal rights to anything you create that expresses or embodies an
idea. It gives you exclusive rights to copy, distribute, reproduce, display, and license
the work.

Examples:

 Software
 Architectural designs
 Graphic arts
 Video and sound recordings
 Books
 Databases

3. Patents
Patents are granted for new, useful inventions, and they will give you the right to
prevent others from making, using, or selling your invention.

Examples:

 Utility patents: For tangible inventions, such as machines, devices, and composite
materials, as well as new and useful processes
 Design patents: For the ornamental designs on manufactured products
 Plant patents: For new varieties of plants
Page: 14
Cyber laws

4. Trade secrets
A trade secret is a piece of confidential business information whose secrecy gives
you an advantage over your competitors.

Examples: Formulas, patterns, techniques, or processes that are not known or readily
attainable by others.

Q). What is an example of stalking?


Repeated, unwanted phone calls, texts, messages, etc. that may or may not
be threatening. Creating fake profiles to continue contacting a person after they
have been blocked on their personal account. Observing, following or
“coincidentally” showing up wherever the person goes.
Yields:
1.
produce or provide (a natural, agricultural, or industrial product).
"the land yields grapes and tobacco"

2.
give way to arguments, demands, or pressure.
"the Western powers now yielded when they should have resisted"
unscrupulous :
behaving in a way that is dishonest or unfair in order to get what you want:
Q) Explain about Cyber Jurisprudence at Indian and International Level

The functionalistic progression of society has been achieved by the advancement in


all aspects of technology. This era was known to be an artificial intelligence age; the
cyber world is much bigger and wider than any other dimension of communication.
As it is open to all, anyone can participate. Despite connecting people and aiding by
spreading novel information across boundaries, it has become a tool to commit
crimes. Any illegal activities that take place through computers or computer related
network are called cyber crimes. Cybercrimes as well as the prevention of
cybercrimes require technical know-how. It amounts to cybercrime, whether it is a
simple dispute in a chat room or monetary loss caused by cyber fraud.

The broad range of cybercrimes can be divided into two categories for better
understanding. Type one is a single event of cybercrime, which may be phishing,
virus attack, e-commerce fraud, and identity theft. Type two cybercrimes are pretty
serious in nature; it involves repeated interaction with the target, for example,
cyberstalking, harassment, blackmail, and so on. It is an on-going series of events
forming a chain of crimes.
Page: 15
Cyber laws

The term jurisprudence is derived from the Latin words “jus” and “prudence”. The
common English meaning is “knowledge of the law”. Basically, cyber jurisprudence
is the study of cyber jurisdiction.

Cyber jurisprudence

In general, jurisprudence is the concept of law, an analysis of how social norms and
changes have contributed to the development of law. Thus, cyber jurisprudence
might be defined as law directly related to cybercrimes.

Indian cyber law


The Indian parliament went about legislating the Information and Technology Act,
2000, exclusively for addressing cybercrimes. This Act came into force on October
17, 2000, and an amendment was made in 2008. It penalizes criminal activities
taking place in cyberspace and also regulates such activities that may violate the
rights of the cyber community.

Cybercrimes could be categorized into two,

1. Crimes committed against the computer (target of crime) – the destruction


of the available information in a computer by hacking, virus attack, cyberpunk,
Trojan horse, and so on.
2. When committed cybercrimes affect the real life of the users (computer a
tool of crime) – cyber violence, cyberbullying, financial losses, loss of
intellectual property, using cyberspace as a medium of communication for
committing murder, fraud, or terrorist attacks.
Classification of cybercrimes
1. Crimes against individuals – a crime that is likely to affect an individual life.
For example cyber morphing, child pornography, cyberstalking, emails
spoofing, cyber defamation, phishing, etc.
2. Crimes against the government– malicious invasion of cyberspace by taking
advantage of the existing flaws in the website maintained by the government.
Example: cyber terrorism, cyber espionage, hacking government websites with
the intention of trespassing, and stealing the secured data of a nation.
3. Crimes against property – it is primarily a crime against all forms of
property. Illegal possession of someone’s property through the mean of
technical invasion into the victim’s cyberspace. Example: data theft or
manipulation of data, bank or E-commerce fraud, cyber forgery, trogon horse
attacks, virus or worm attacks, data diddling, copyright infringement, etc.
Page: 16
Cyber laws

Notable Cyber offences and penalties under the IT Act:


 Section 65 – tampering with computer source documents

When a person intentionally destroys, alters, or conceals any computer source code,
which is required to be maintained under law.

Punishment: Three years imprisonment, or a fine of 2 lakh INR or both.


 Section 66- using the password of another person

If any person fraudulently uses the passwords, digital signature, or any unique
identity of another person

Punishment: Three years imprisonment or/and fine of 1 lakh INR.


 Section 66D- cheating using computer resource
Punishment: Three years imprisonment or/and fine of 1 lakh INR.
 Section 66E- Publishing private images of others
Punishment: Three years imprisonment or a fine of 2 lakh INR or both.
 Section 66F-Acts of cyber terrorism
Punishment: life imprisonment and non-bailable.
 Section 67- publishing or transmitting obscene material in electronic form
Punishment: 1st offence- 3 years, subsequent offence 5years with fine up to 10 lakh.
 Section 69- government power to block a website in concern with the
integrity and sovereignty of India
Punishment: failure to comply with the direction to block any website may liable for
imprisonment for 7 years with a fine.
 Section 72- the penalty for breach of privacy and confidentiality
Punishment: 2 years imprisonment and/or fine of 1 lakh INR.
Cyber laws at the international level

Cybersecurity laws and regulations in the United States are said to be the most
effective and robust in the world. The Consumer Protection Act of 2017, aimed at
securing the privacy of the user and to prevent data theft. This is applicable to all the
institutions or organizations, that are indulged in the collection and usage of the
user’s personal information. Generally, the penalty associated with the misusage of
consumer’s sensitive information will not exceed 5 million dollars. But, if the same
was accounted for as international misuse then an additional 5 million dollars will be
imposed. Apart from this, there are some Acts that were introduced in the US for
enhancing the common goal of cybersecurity.

Cybersecurity Information-sharing Act (CISA), Cyber Enhancement Act of 2014,


Federal Exchange Data Breach Notification Act of 2015, National Cybersecurity
Protection Advancement Act of 2015. These are all recent amendment Acts brought
up in the existing Regulations. These Acts mandate healthcare organizations,
financial institutions, and federal companies to prevent their data and secure their
Page: 17
Cyber laws

consumer’s information as well. Their primary aim is to spread awareness about


cybersecurity and data storage.

In the UK the Computer Misuse Act of 1990 is the main and mother legislation
related to the attacks against computers. However, it does not expressly define what
a computer is. In the case of DPP v McKeown and, DPP v Jones [1997] 2 Cr App R
155 HL a computer was defined as a “device storing, processing, and retrieving
information.” Thus it is said to be applicable for laptops, personal tablets, and mobile
phones in the same way as traditional PCs and desktops. This Act penalizes the cyber
offences of hacking, denial of services (DoS), and unauthorized invasion into
computer data or programs with the intention to cause an attack on national
cyberinfrastructure.

The Data Protection Act 2018 penalizes cyber-related offences like cyber trespass,
leaking or selling the victim’s personal data without consent, and so on. The cyber
piracy of intellectual property is punishable under the Copyright Design and Patent
Act 1988. The Malicious Communication Act 1988 and Communication Act 2003
make it an offence for a person who sends obscene or indecent messages via a
“public electronic communication network”. The Obscene Publication (Amendment)
Act, 1959, deals with the storage and sharing of such porn related stuff.

Q). List of Cybercrimes: Examples

1. Child Pornography OR Child sexually abusive material (CSAM)


Child sexually abusive material (CSAM) refers to a material containing sexual
images in any form, of a child who is abused or sexually exploited. Section 67 (B) of
the IT Act states that “it is punishable for publishing or transmitting of material
depicting children in the sexually explicit act, etc. in electronic form.

2. Cyber Bullying
A form of harassment or bullying inflicted through the use of electronic or
communication devices such as computers, mobile phones, laptops, etc.

3. Cyber Stalking
Cyber stalking is the use of electronic communication by a person to follow a person,
or attempts to contact a person to foster personal interaction repeatedly despite a
clear indication of disinterest by such person; or monitors the internet, email or any
other form of electronic communication commits the offence of stalking.

4. Cyber Grooming
Cyber Grooming is when a person builds an online relationship with a young person
and tricks or pressures him/ her into doing a sexual act.
Page: 18
Cyber laws

5. Online Job Fraud


Online Job Fraud is an attempt to defraud people who are in need of employment by
giving them false hope/ promise of better employment with higher wages.

6. Online Sextortion
Online Sextortion occurs when someone threatens to distribute private and sensitive
material using an electronic medium if he/ she doesn’t provide images of a sexual
nature, sexual favours, or money.

7. Phishing
Phishing is a type of fraud that involves stealing personal information such as
Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number, etc.
through emails that appear to be from a legitimate source.

8. Vishing
Vishing is an attempt where fraudsters try to seek personal information like
Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc.
through a phone call.

9. Smishing
Smishing is a type of fraud that uses mobile phone text messages to lure victims into
calling back on a fraudulent phone number, visiting fraudulent websites or
downloading malicious content via phone or web.

10. Sexting
Sexting is an act of sending sexually explicit digital images, videos, text messages, or
emails, usually by cell phone.

11. SIM Swap Scam


SIM Swap Scam occurs when fraudsters manage to get a new SIM card issued
against a registered mobile number fraudulently through the mobile service provider.
With the help of this new SIM card, they get One Time Password (OTP) and alerts,
required for making financial transactions through the victim’s bank account. Getting
a new SIM card against a registered mobile number fraudulently is known as SIM
Swap.

12. Credit Card Fraud or Debit Card Fraud


Credit card (or debit card) fraud involves the unauthorized use of another’s credit or
debit card information for the purpose of purchases or withdrawing funds from it.
Page: 19
Cyber laws

13. Impersonation and identity theft


Impersonation and identity theft is an act of fraudulently or dishonestly making use
of the electronic signature, password or any other unique identification feature of any
other person.

14. Spamming
Spamming occurs when someone receives an unsolicited commercial message sent
via email, SMS, MMS and any other similar electronic messaging media. They may
try to persuade the recipient to buy a product or service, or visit a website where he
can make purchases, or they may attempt to trick him/ her into divulging bank
account or credit card details.

15. Ransomware
Ransomware is a type of computer malware that encrypts the files, storage media on
communication devices like desktops, Laptops, Mobile phones etc., holding
data/information as a hostage. The victim is asked to pay the demanded ransom to
get his device decrypts

16. Viruses, Worms, and Trojans


A computer virus is a program written to enter your computer and damage/alter your
files/data and replicate itself.

Worms are malicious programs that make copies of themselves again and again on
the local drive, network shares, etc.

A Trojan horse is not a virus. It is a destructive program that looks like a genuine
application. Unlike viruses, Trojan horses do not replicate themselves but they can be
just as destructive. Trojans open a backdoor entry to your computer which gives
malicious users/programs access to your system, allowing confidential and personal
information to be theft.

17. Data Breach


A data breach is an incident in which information is accessed without authorization.

18. Denial of Services (DoS) attack


A denial of Services (DoS) attack is an attack intended for denying access to
computer resources without the permission of the owner or any other person who is
in charge of a computer, computer system or computer network.

A Distributed Denial of Service (DDoS) attack is an attempt to make an online


service unavailable by overwhelming it with traffic from multiple sources.
Page: 20
Cyber laws

19. Website Defacement


Website Defacement is an attack intended to change the visual appearance of a
website and/ or make it dysfunctional. The attacker may post indecent, hostile and
obscene images, messages, videos, etc.

20. Cyber-Squatting

Cyber-Squatting is an act of registering, trafficking in or using a domain name with


an intent to profit from the goodwill of a trademark belonging to someone else.

21. Pharming
Pharming is a cyber-attack aiming to redirect a website’s traffic to another, bogus
website.

22. Online Drug Trafficking


Online Drug Trafficking is a crime of selling, transporting, or illegally importing
unlawful controlled substances, such as heroin, cocaine, marijuana, or other illegal
drugs using electronic means.

23. Espionage
Espionage is the act or practice of obtaining data and information without the
permission and knowledge of the owner.

Q) EXPLAIN ABOUT Constitutional& Human Rights Issues in Cyberspace:

The internet has been in existence since 1960’s and the World Wide Web (WWW)
since 1990’s. Cyber space raises about human rights and responsibilities. The
International Telecommunications Union estimates that almost 40% of the world’s
population and over 76% of people in developed countries are now internet users.
Government, business and organizations in civil society are increasingly using cyber
space platforms in the communication of information and delivery of services.
Accordingly, the internet has become a major vehicle for the exercise of the right to
freedom of expression and information.

Everyone shall have the right to freedom of expression, this right shall include
freedom to seek, receive and impart information and ideas of all kinds, regardless of
frontiers, either orally, in writing or in print, in the form of art or through any other
media of his choice
Page: 21
Cyber laws

The United Nations Human Rights Commission (UNHRC) has provided extensive
commentary on this article in General Comment Number 3.

The Human Rights Commission has stated that the freedom of expression and
information under Article 19 of the ICCPR include the freedom to receive and
communicate information, ideas and opinions through the internet.

Article 19(3) provides that:

The exercise of the rights provided for special duties and responsibilities. It may
therefore be subject to certain restrictions, but these shall only be such as provided
by a law and are necessary:

a) For respect of the rights or reputations of others.

b) For the protection of national security or public order (order public), or public
health or morals.

This means that (like many other rights) the right to freedom of information must be
balanced with other rights. The United Nations Human Rights Commission has
stated that “The same rights that people have offline must also be protected online”
(mentioning in particular freedom of expression).

Laws seeking to balance rights and responsibilities often distinguish between public
and private conduct.
Page: 22
Cyber laws

Q) EXPLAIN ABOUT Right to Freedom of Expression

Q). Explain about Cyber Forensics


Page: 23
Cyber laws

Cyber forensics is the application of analysis techniques to collect and recover data
from a system or a digital storage media or device.

Some of the specific areas where research is being done in India are:

Q) Right to Access Cyberspace (INTERNET)


Internet is a universal computer network distributing a variety of information using
an interconnected network of TCP/IP (Transmission Control Protocol/ Internet
Protocol). In today's Hi-Tech world, everything is going electronic and to access
them with ease Internet plays a crucial role, even the automotive industry is
manufacturing vehicles that run over electricity and can be accessible directly by
mobile phones with the help of internet. Internet is leading us to a future of
intelligence and autonomous vehicles.

Right To Internet A Basic Human Right:

In 2016, UNHRC General Assembly articulated access to the Internet an essential


human right.

In India, Kerala was the first state to declare the Right to Internet a basic Human
Right. Internet is the pathway to the future and Right to Access Internet is necessary
for living a decent life and therefore is a Moral Human Right.

Relationship between Internet Access and Human Rights:


Mobile Internet Service and Broadband Internet provide a life support system to the
citizen of India from all walks of life. Internet is not only a source of information,
communication and access to social media.

Internet is paramount to the home-based workers and small and individual owned
enterprises which sell their product and services online giving them a means for their
survival.

Internet provides access to transportation for millions of people around the country
by providing them a virtual platform. Internet is a mode of access to the education
for students who take online exams and do online diploma and other courses and thus
it is fundamental to facilitate the advancement and zeal of the Right to Education.
Page: 24
Cyber laws

Internet is getting basic to your day by day life just as an underwriter of financial
development.

Internet Access A Part Of Fundamental Right:

State of Kerala ,Hon'ble High Court stated that Right to access internet is a part of
Right to education and Right to Privacy under Article 21A and Article 21 of the
Constitution of Indian respectively. Internet Access not only enhances the
opportunities of students to acquire knowledge but also enhances the quality of
education.

Right to freedom of speech and expression is guaranteed under Article 19(1)(a) of


the Constitution. Freedom here means the right to express one's opinions freely by
word of mouth, writing, printing, picture, or in any other manner.

Countries Which Have Declared Internet Access A Basic Human Right:

Estonia: In February 2000, the Estonian Parliament sanctioned the new


Telecommunications Act, including Internet Access a essential Human Right.

Greece: In 2001, Greece changed its Constitution and embedded Article 5A


encouraging the option to get to electronically transmitted data, creation, trade, and
dispersion thereof, is a commitment of the State.

European Union: On 25th November 2009, Directive 2009/136/EC of the European


Parliament and Council went into power and amended Directive 2002/22/EC and had
permitted data communication a data rate which is sufficient to permit functional
Internet access.

Finland: In 2010, Communications Market Act, which expressed that widespread


help additionally incorporated an utilitarian Internet association and had articulated
Access to the Internet a Fundamental Human Right via amendment.

Costa Rico: In 2010, The Apex Court of Costa Rico had declared access to Internet a
basic human right. Under Article 33 of the Constitution of Costa Rico Access to the
Internet is a Fundamental Human Right.
Page: 25
Cyber laws

Spain: In November 2009 the Spanish citizens was entitled to have access to the
Internet because of the Act 2/11 of March 2004 which states that sustainable
economy should affix broadband access to its universal service.

Canada: In 2016, Canadian Radio Television and Telecommunications Commission


pronounced Internet access a fundamental assistance.

Internet Shutdowns And Human Right

Internet shutdown is merely a blanket ban imposed by the state on access to Internet
Service, either mobile or fixed line, and is not only a block on social media, but it
also affects businesses, welfare schemes, education, and impact on Human Rights. In
a developing economy like India shutting down Internet service is like closing all
roads for the development of the economy and even shutting down all the banks at
once.

On 4th August 2019, Web shutdown was forced in Jammu and Kashmir when
Parliament revoked Article 370 of the Constitution and the State of J&K was
bifurcated into Union Territory of J&K and Ladakh, prompting 213 days shutdown
which was proceeded till fourth March 2020 bringing about India's longest Internet
shutdown.

Q). EXPLAIN CATEGORIES OF CYBER CRIMES

Cyber Crimes Actually Means: It could be hackers vandalizing your site,


viewing confidential information, stealing trade secrets or intellectual
property with the use of internet. It can also include ‘denial of services’ and
viruses attacks preventing regular traffic from reaching your site. Cyber
crimes are not limited to outsiders except in case of viruses and with respect
to security related cyber crimes that usually done by the employees of
particular company who can easily access the password and data storage of
the company for their benefits. Cyber crimes also includes criminal
activities done with the use of computers which further perpetuates crimes
i.e. financial crimes, sale of illegal articles, pornography, online gambling,
intellectual property crime, e-mail, spoofing, forgery, cyber defamation,
cyber stalking, unauthorized access to Computer system, theft of
information contained in the electronic form, e-mail bombing, physically
damaging the computer system etc.

 Classifications Of Cyber Crimes: Cyber Crimes which are growing


day by day, it is very difficult to find out what is actually a cyber
crime and what is the conventional crime so to come out of this
confusion, cyber crimes can be classified under different categories
Page: 26
Cyber laws

which are as follows:

1. Cyber Crimes against Persons:

There are certain offences which affects the personality of individuals can be
defined as:

 Harassment via E-Mails: It is very common type of harassment


through sending letters, attachments of files & folders i.e. via e-
mails. At present harassment is common as usage of social sites
i.e. Facebook, Twitter etc. increasing day by day.
 Cyber-Stalking: It means expressed or implied a physical threat that
creates fear through the use to computer technology such as internet,
e-mail, phones, text messages, webcam, websites or videos.
 Dissemination of Obscene Material: It includes Indecent
exposure/ Pornography (basically child pornography), hosting of
web site containing these prohibited materials. These obscene
matters may cause harm to the mind of the adolescent and tend to
deprave or corrupt their mind.
 Defamation: It is an act of imputing any person with intent to lower
down the dignity of the person by hacking his mail account and
sending some mails with using vulgar language to unknown persons
mail account.
 Hacking: It means unauthorized control/access over computer system
and act of hacking completely destroys the whole data as well as
computer programmes. Hackers usually hacks telecommunication and
mobile network.
 Cracking: It is amongst the gravest cyber crimes known till date.
It is a dreadful feeling to know that a stranger has broken into
your computer systems without your knowledge and consent and
has tampered with precious confidential data and information.
 E-Mail Spoofing: A spoofed e-mail may be said to be one, which
misrepresents its origin. It shows it’s origin to be different from
which actually it originates.
 SMS Spoofing: Spoofing is a blocking through spam which means
the unwanted uninvited messages. Here a offender steals identity of
another in the form of mobile phone number and sending SMS via
internet and receiver gets the SMS from the mobile phone number of
the victim. It is very serious cyber crime against any individual.
 Carding: It means false ATM cards i.e. Debit and Credit cards used
by criminals for their monetary benefits through withdrawing money
from the victim’s bank account mala-fidely. There is always
unauthorized use of ATM cards in this type of cyber crimes.
 Cheating & Fraud: It means the person who is doing the act of cyber crime
i.e. stealing password and data storage has done it with having guilty
mind which leads to fraud and cheating.
Page: 27
Cyber laws

 Child Pornography: It involves the use of computer networks to


create, distribute, or access materials that sexually exploit
underage children.
 Assault by Threat: refers to threatening a person with fear for their
lives or lives of their families through the use of a computer network
i.e. E-mail, videos or phones.

2. Crimes against Persons Property:

As there is rapid growth in the international trade where businesses and


consumers are increasingly using computers to create, transmit and to store
information in the electronic form instead of traditional paper documents.
There are certain offences which affects persons property which are as
follows:

 Intellectual Property Crimes: Intellectual property consists of a


bundle of rights. Any unlawful act by which the owner is deprived
completely or partially of his rights is an offence. The common form
of IPR violation may be said to be software piracy, infringement of
copyright, trademark, patents, designs and service mark violation,
theft of computer source code, etc.
 Cyber Squatting: It means where two persons claim for the same
Domain Name either by claiming that they had registered the name
first on by right
of using it before the other or using something similar to that
previously. For example two similar names i.e. www.yahoo.com
and www.yaahoo.com.
 Cyber Vandalism: Vandalism means deliberately destroying or
damaging property of another. Thus cyber vandalism means
destroying or damaging the data when a network service is stopped or
disrupted. It may include within its purview any kind of physical harm
done to the computer of any person. These acts may take the form of
the theft of a computer, some part of a computer or a peripheral
attached to the computer.
 Hacking Computer System: Hacktivism attacks those included
Famous Twitter, blogging platform by unauthorized access/control
over the computer. Due to the hacking activity there will be loss of
data as well as computer. Also research especially indicates that
those attacks were not mainly intended for financial gain too and
to diminish the reputation of particular person or company.
 Transmitting Virus: Viruses are programs that attach themselves to
a computer or a file and then circulate themselves to other files and
to other computers on a network. They usually affect the data on a
computer, either by altering or deleting it. Worm attacks plays major
role in affecting the computerize system of the individuals.
 Cyber Trespass: It means to access someone’s computer without
Page: 28
Cyber laws

the right authorization of the owner and does not disturb, alter,
misuse, or damage data or system by using wireless internet
connection.
 Internet Time Thefts: Basically, Internet time theft comes under
hacking. It is the use by an unauthorised person, of the Internet hours
paid for by another person. The person who gets access to someone
else’s ISP user ID and password, either by hacking or by gaining
access to it by illegal means, uses it to access the Internet without the
other person’s knowledge. You can identify time theft if your Internet
time has to be recharged often, despite infrequent usage.

3. Cybercrimes Against Government:

There are certain offences done by group of persons intending to threaten the
international governments by using internet facilities. It includes:

 Cyber Terrorism: Cyber terrorism is a major burning issue in the


domestic as well as global concern. The common form of these
terrorist attacks on the Internet is by distributed denial of service
attacks, hate websites and hate e- mails, attacks on sensitive computer
networks etc. Cyber terrorism activities endanger the sovereignty and
integrity of the nation.
 Cyber Warfare: It refers to politically motivated hacking to conduct
sabotage and espionage. It is a form of information warfare sometimes
seen as analogous to conventional warfare although this analogy is
controversial for both its accuracy and its political motivation.
 Distribution of pirated software: It means distributing pirated
software from one computer to another intending to destroy the
data and official records of the government.
 Possession of Unauthorized Information: It is very easy to
access any information by the terrorists with the aid of internet
and to possess that information for political, religious, social,
ideological objectives.

4. Cybercrimes Against Society at large:

An unlawful act done with the intention of causing harm to the cyberspace
will affect large number of persons. These offences includes:

 Child Pornography: It involves the use of computer networks to


create, distribute, or access materials that sexually exploit underage
children. It also includes activities concerning indecent exposure and
obscenity.
 Cyber Trafficking: It may be trafficking in drugs, human
beings, arms weapons etc. which affects large number of persons.
Trafficking in the cyberspace is also a gravest crime.
Page: 29
Cyber laws

 Online Gambling: Online fraud and cheating is one of the most


lucrative businesses that are growing today in the cyber space. There
are many cases that have come to light are those pertaining to credit
card crimes, contractual crimes, offering jobs, etc.
 Financial Crimes: This type of offence is common as there is rapid
growth in the users of networking sites and phone networking where
culprit will try to attack by sending bogus mails or messages through
internet. Ex: Using credit cards by obtaining password illegally.
 Forgery: It means to deceive large number of persons by sending
threatening mails as online business transactions are becoming the
habitual need of today’s life style.

Q). what is a Cognizable and Non-Cognizable offence in India?

Cognizable offences are those in which the police can arrest without any
warrant. These are more serious in nature. Non-cognizable offences on the
other hand are those for which a police officer has no authority to arrest, unless
with a warrant.

What are Cognizable Offences?


A cognizable offence is an offence in which the police officer as per the first
schedule or under any other law for the time being in force, can arrest the convict
without a warrant and can start an investigation without the permission of the court.
Cognizable offences are generally heinous or serious in nature such as murder, rape,
kidnapping, theft, dowry death etc. The first information report (FIR) is registered
only in cognizable crimes.

Under section 154 Criminal Procedure Code (CrPC), a police officer is bound to
register an FIR in case of a cognizable crime. He can also conduct some kind of
preliminary inquiry before registering the FIR. In these offences, a convict is arrested
and produced before the magistrate in the stipulated time.Some of the examples of a
cognizable offence are as follows:
1. Waging or attempting to wage war, or abetting the waging of war against the
government of India,
2. Murder,
3. Rape,
4. Dowry Death,
5. Kidnapping,
6. Theft,
Page: 30
Cyber laws

7. Criminal Breach of Trust,


8. Unnatural Offenses.
Section 154 of the Criminal Procedure Code, 1973 provides that under a cognizable
offence the Police Officer has to receive the First Information Report (FIR) relating
to the cognizable offence.

What are Non-cognizable Offences?


A non-cognizable offence is the offence listed under the first schedule of the Indian
Penal Code and is bailable in nature. In case of a non-cognizable offence, the police
cannot arrest the accused without a warrant as well as cannot start an investigation
without the permission of the court. The crimes of forgery, cheating, defamation,
public nuisance, etc., fall in the category of non-cognizable crimes.

In this type of crimes, a criminal complaint is lodged with the metropolitan


magistrate who is supposed to order the concerned police station to initiate an
investigation. The police officer is supposed to file the charge sheet with the court
which is followed by a trial. After the trial, if the accused is found guilty, the court
passes the order to issue the warrant to arrest the accused.Some of the examples of a
non-cognizable offence are as follows:
1. Assault,
2. Cheating,
3. Forgery
Q). Different offences under IT Act, 2000.
The faster world-wide connectivity has developed numerous online crimes and these
increased offences led to the need of laws for protection. In order to keep in stride
with the changing generation, the Indian Parliament passed the Information
Technology Act 2000 that has been conceptualized on the United Nations
Commissions on International Trade Law (UNCITRAL) Model Law.
The law defines the offenses in a detailed manner along with the penalties for each
category of offence.

Offences

Cyber offences are the illegitimate actions, which are carried out in a classy manner
where either the computer is the tool or target or both.
Cyber-crime usually includes the following −
 Unauthorized access of the computers
 Data diddling
Page: 31
Cyber laws

 Virus/worms attack
 Theft of computer system
 Hacking
 Denial of attacks
 Logic bombs
 Trojan attacks
 Internet time theft
 Web jacking
 Email bombing
 Salami attacks
 Physically damaging computer system.
The offences included in the I.T. Act 2000 are as follows −
 Tampering with the computer source documents.
 Hacking with computer system.
 Publishing of information which is obscene in electronic form.
 Power of Controller to give directions.
 Directions of Controller to a subscriber to extend facilities to decrypt
information.
 Protected system.
 Penalty for misrepresentation.
 Penalty for breach of confidentiality and privacy.
 Penalty for publishing Digital Signature Certificate false in certain particulars.
 Publication for fraudulent purpose.
 Act to apply for offence or contravention committed outside India
Confiscation.
 Penalties or confiscation not to interfere with other punishments.
 Power to investigate offences.
Example
Offences Under The It Act 2000
Section 65. Tampering with computer source documents
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy or alter any computer source code used
for a computer, computer program, computer system or computer network, when the
computer source code is required to be kept or maintained by law for the being time
in force, shall be punishable with imprisonment up to three year, or with fine which
may extend up to two lakh rupees, or with both.
Explanation − For the purpose of this section “computer source code” means the
listing of programs, computer commands, design and layout and program analysis of
computer resource in any form.
Page: 32
Cyber laws

Object − The object of the section is to protect the “intellectual property” invested in
the computer. It is an attempt to protect the computer source documents (codes)
beyond what is available under the Copyright Law
Essential ingredients of the section
knowingly or intentionally concealing
knowingly or intentionally destroying
knowingly or intentionally altering
knowingly or intentionally causing others to conceal
knowingly or intentionally causing another to destroy
knowingly or intentionally causing another to alter.
This section extends towards the Copyright Act and helps the companies to protect
their source code of their programs.
Penalties − Section 65 is tried by any magistrate.
This is cognizable and non-bailable offence.
Penalties − Imprisonment up to 3 years and / or
Fine − Two lakh rupees.
The following table shows the offence and penalties against all the mentioned
sections of the I.T. Act −

Sectio Offence Punishment Bailability


n and
Congizability

65 Tampering with Computer Imprisonment up to 3 Offence is


Source Code years or fine up to Rs 2 Bailable,
lakhs Cognizable
and triable by
Court of
JMFC.

66 Computer Related Offences Imprisonment up to 3 Offence is


years or fine up to Rs 5 Bailable,
lakhs Cognizable
and

66-A Sending offensive messages Imprisonment up to 3 Offence is


through Communication years and fine Bailable,
service, etc... Cognizable
and triable by
Court of
Page: 33
Cyber laws

JMFC

66-B Dishonestly receiving stolen Imprisonment up to 3 Offence is


computer resource or years and/or fine up to Bailable,
communication device Rs. 1 lakh Cognizable
and triable by
Court of
JMFC

66-C Identity Theft Imprisonment of either Offence is


description up to 3 Bailable,
years and/or fine up to Cognizable
Rs. 1 lakh and triable by
Court of
JMFC

66-D Cheating by Personation by Imprisonment of either Offence is


using computer resource description up to 3 Bailable,
years and /or fine up to Cognizable
Rs. 1 lakh and triable by
Court of
JMFC

66-E Violation of Privacy Imprisonment up to 3 Offence is


years and /or fine up to Bailable,
Rs. 2 lakh Cognizable
and triable by
Court of
JMFC

66-F Cyber Terrorism Imprisonment extend to Offence is


imprisonment for Life Non-Bailable,
Cognizable
and triable by
Court of
Sessions

67 Publishing or transmitting On first Conviction, Offence is


obscene material in electronic imprisonment up to 3 Bailable,
form years and/or fine up to Cognizable
Rs. 5 lakh On and triable by
Subsequent Conviction Court of
imprisonment up to 5 JMFC
years and/or fine up to
Rs. 10 lakh

67-A Publishing or transmitting of On first Conviction Offence is


Page: 34
Cyber laws

material containing sexually imprisonment up to 5 Non-Bailable,


explicit act, etc... in electronic years and/or fine up to Cognizable
form Rs. 10 lakh On and triable by
Subsequent Conviction Court of
imprisonment up to 7 JMFC
years and/or fine up to
Rs. 10 lakh

67-B Publishing or transmitting of On first Conviction Offence is


material depicting children in imprisonment of either Non Bailable,
sexually explicit act etc., in description up to 5 Cognizable
electronic form years and/or fine up to and triable by
Rs. 10 lakh On Court of
Subsequent Conviction JMFC
imprisonment of either
description up to 7
years and/or fine up to
Rs. 10 lakh

67-C Intermediary intentionally or Imprisonment up to 3 Offence is


knowingly contravening the years and fine Bailable,
directions about Preservation Cognizable.
and retention of information

68 Failure to comply with the Imprisonment up to 2 Offence is


directions given by Controller years and/or fine up to Bailable, Non-
Rs. 1 lakh Cognizable.

69 Failure to assist the agency Imprisonment up to 7 Offence is


referred to in sub section (3) years and fine Non-Bailable,
in regard interception or Cognizable.
monitoring or decryption of
any information through any
computer resource

69-A Failure of the intermediary to Imprisonment up to 7 Offence is


comply with the direction years and fine Non-Bailable,
issued for blocking for public Cognizable.
access of any information
through any computer
resource

69-B Intermediary who Imprisonment up to 3 Offence is


intentionally or knowingly years and fine Bailable,
contravenes the provisions of Cognizable.
sub-section (2) in regard
Page: 35
Cyber laws

monitor and collect traffic


data or information through
any computer resource for
cybersecurity

70 Any person who secures Imprisonment of either Offence is


access or attempts to secure description up to 10 Non-Bailable,
access to the protected system years and fine Cognizable.
in contravention of provision
of Sec. 70

70-B Indian Computer Emergency Imprisonment up to 1 Offence is


Response Team to serve as year and/or fine up to Bailable, Non-
national agency for incident Rs. 1 lakh Cognizable
response. Any service
provider, intermediaries, data
centres, etc., who fails to
prove the information called
for or comply with the
direction issued by the
ICERT.

71 Misrepresentation to the Imprisonment up to 2 Offence is


Controller to the Certifying years and/ or fine up to Bailable, Non-
Authority Rs. 1 lakh. Cognizable.

72 Breach of Confidentiality and Imprisonment up to 2 Offence is


privacy years and/or fine up to Bailable, Non-
Rs. 1 lakh. Cognizable.

72-A Disclosure of information in Imprisonment up to 3 Offence is


breach of lawful contract years and/or fine up to Cognizable,
Rs. 5 lakh. Bailable

73 Publishing electronic Imprisonment up to 2 Offence is


Signature Certificate false in years and/or fine up to Bailable, Non-
certain particulars Rs. 1 lakh Cognizable.

74 Publication for fraudulent Imprisonment up to 2 Offence is


purpose years and/or fine up to Bailable, Non-
Rs. 1 lakh Cognizable.

Q) Explain about right to privacy ?

Hacking into someone’s private property or stealing some one’s intellectual work is a
complete violation of his right to privacy. The Indian constitution does not
Page: 36
Cyber laws

specifically provide the “right to privacy” as one of the fundamental rights


guaranteed to the Indian citizens but it is protected under IPC.

Right to privacy is an important natural need of every human being as it creates


boundaries around an individual where the other person’s entry is restricted. The
right to privacy prohibits interference or intrusion in others private life. The apex
court of India has clearly affirmed in its judicial pronouncements that right to privacy
is very much a part of the fundamental right guaranteed under article 21 of the Indian
constitution.

Thus right to privacy is coming under the expended ambit of article 21 of Indian
constitution. So whenever there is some cyber crime which is related to the persons
private property or its personal stuff then the accused can be charged of violation of
article 21 of Indian constitution, and prescribed remedy can be invoked against the
accused.

What is data protection?


Personal data is any information relating to you, whether it relates to your
private, professional, or public life. In the online environment, where vast
amounts of personal data are shared and transferred around the
globe instantaneously, it is increasingly difficult for people to maintain control of
their personal information. This is where data protection comes in.
Data protection refers to the practices, safeguards, and binding rules put in place
to protect your personal information and ensure that you remain in control of it.
In short, you should be able to decide whether or not you want to share some
information, who has access to it, for how long, for what reason, and be able to
modify some of this information, and more.
Governments also have a security interest in ensuring the protection of personal
data. In 2015, criminals stole 21.5 million records from the US Office of
Personnel Management that contained the highly sensitive personal data of
federal employees and their family members. This type of attack is happening
more frequently across the globe, and countries must take action to better protect
individuals’ information.

In the European Union, data protection is a fundamental right, and the


General Data Protection Regulation (GDPR) is the framework for protecting that
right.

Q) Explain about Council of Europe -Budapest Convention on Cybercrime,


Page: 37
Cyber laws

The Convention on Cybercrime, also known as the Budapest Convention on


Cybercrime or the Budapest Convention, is the first international treaty seeking to
address Internet and computer crime (cybercrime) by harmonizing national laws,
improving investigative techniques, and increasing cooperation among nations.[1][2] It
was drawn up by the Council of Europe in Strasbourg, France, with the active
participation of the Council of Europe's observer
states Canada, Japan, Philippines, South Africa and the United States.

Offences under the Convention

The Budapest Convention broadly attempts to cover crimes of illegal access,


interference and interception of data and system networks, and the criminal misuse
of devices. Additionally, offences perpetrated by means of computer systems such as
computer-related fraud, production, distribution and transmission of child
pornography and copyright offences are addressed by provisions of the Convention.

The substantive offences under the Convention can broadly be classified into

“(1) offences against the confidentiality, integrity and availability of computer data
and systems; (2) computer-related offences; (3) content-related offences; and (4)
criminal copyright infringement.”[1] The Additional Protocol makes the act of using
computer networks to publish xenophobic and racist propaganda, a punishable
offence. However, the full range of cybercrimes are not covered under the Budapest
Convention. These include cybercrimes such as identity theft, sexual grooming of
children and unsolicited spam and emails.

What is Asia-Pacific Economic Cooperation?


The Asia-Pacific Economic Cooperation (APEC) is a regional economic forum
established in 1989 to leverage the growing interdependence of the Asia-
Pacific. APEC's 21 members aim to create greater prosperity for the people of the
region by promoting balanced, inclusive, sustainable, innovative and secure growth
and by accelerating regional economic integration.
APEC has 21 members. The word 'economies' is used to describe APEC members
because the APEC cooperative process is predominantly concerned with trade and
economic issues, with members engaging with one another as economic entities.

APEC Members Date of Joining

Australia 6-7 Nov 1989


Page: 38
Cyber laws

Brunei Darussalam 6-7 Nov 1989

Canada 6-7 Nov 1989

Chile 11-12 Nov 1994

People's Republic of China 12-14 Nov 1991

Hong Kong, China 12-14 Nov 1991

Indonesia 6-7 Nov 1989

Japan 6-7 Nov 1989

Republic of Korea 6-7 Nov 1989

Malaysia 6-7 Nov 1989

Mexico 17-19 Nov 1993

New Zealand 6-7 Nov 1989

Papua New Guinea 17-19 Nov 1993

Peru 14-15 Nov 1998

The Philippines 6-7 Nov 1989

Russia 14-15 Nov 1998

Singapore 6-7 Nov 1989

Chinese Taipei 12-14 Nov 1991


Page: 39
Cyber laws

Thailand 6-7 Nov 1989

The United States 6-7 Nov 1989

Viet Nam 14-15 Nov 1998

What Does APEC Do?


APEC ensures that goods, services, investment and people move easily across
borders. Members facilitate this trade through faster customs procedures at borders;
more favorable business climates behind the border; and aligning regulations and
standards across the region. For example, APEC's initiatives to synchronize
regulatory systems is a key step to integrating the Asia-Pacific economy. A product
can be more easily exported with just one set of common standards across

Q) What Is the Organisation for Economic Co-operation and Development


(OECD)?
The Organisation for Economic Co-operation and Development (OECD) is a group
of 37 member countries that discuss and develop economic and social policy. OECD
members are typically democratic countries that support free-market economies.

 The Organisation for Economic Co-operation and Development (OECD) is a


group of 37 member countries that discuss and develop economic and social
policy.
 Members of the Organisation for Economic Co-operation and Development
(OECD) are typically democratic countries that support free-market
economies.
 The stated goal of the Organisation for Economic Co-operation and
Development (OECD) is to shape policies that foster prosperity, equality,
opportunity and well-being for all. 1
 The Organisation for Economic Co-operation and Development (OECD) was
established on Dec. 14, 1960, by 18 European nations, plus the United States
and Canada.3
 The organization is headquartered in the Chateau de la Muette in Paris,
France.4

The OECD was established on Dec. 14, 1960, by 18 European nations, plus the
United States and Canada.It has expanded over time to include members from South
Page: 40
Cyber laws

America and the Asia-Pacific region. It includes most of the world's


highly developed economies.2

In 1948, in the aftermath of World War II, the Organisation for European Economic
Co-operation (OEEC) was established to administer the predominantly U.S.-
funded Marshall Plan for post-war reconstruction on the continent. The group
emphasized the importance of working together for economic development, with
the goal of avoiding any more decades of European warfare. 5 The OEEC was
instrumental in helping the European Economic Community (EEC), which has since
evolved into the European Union (EU), to establish a European Free Trade Area. 6

In 1961, the OECD articles from the December 1960 convention went into effect,
and the United States and Canada joined the European members of the OEEC,
which changed its name to OECD to reflect the broader membership. 3 The
organization is headquartered in the Chateau de la Muette in Paris, France. 4

The OECD publishes economic reports, statistical databases, analyses, and forecasts
on the outlook for economic growth worldwide. Reports are variously global,
regional, or national in orientation. 7 The group analyzes and reports on the impact of
social policy issues–such as gender discrimination on economic growth 8 –and makes
policy recommendations designed to foster growth with sensitivity to environmental
issues.9 The organization also seeks to eliminate bribery and other financial crime
worldwide.1 0

The OECD maintains a so-called "black list" of nations that are considered
uncooperative tax havens, although there are not any nations currently on the list
since by 2009, all nations on the original list had made commitments to implement
the OECD standards of transparency. 11 The OECD is leading an effort with the
Group of 20 (G20) nations to encourage tax reform worldwide and eliminate tax
avoidance by profitable corporations. 12 The recommendations presented for the
project included an estimate that such avoidance costs the world's economies
between $100 billion and $240 billion in tax revenue annually. 13 The group also
provides consulting assistance and support to nations in central Asia and eastern
Europe that implement market-based economic reforms. 14

World Bank

The World Bank is an international financial institution with a mandate of


poverty alleviation and provides leveraged loans to developing countries for capital
programs. The World Bank was established in 1944 and is headquartered in
Washington, D.C.
Page: 41
Cyber laws

The World Bank differs from the World Bank Group, in that the World Bank
comprises only two institutions: International Bank for Reconstruction and
Development (IBRD) and International Development Association (IDA). Whereas
the World Bank Group (WBG) is a family of five international organizations, namely
International Finance Corporation (IFC),Multilateral Investment Guarantee Agency
(MIGA), International Centre for Settlement of Investment Disputes (ICSID), IBRD
and IDA.
The World Bank’s (i.e. the IBRD and IDA’s) activities are focused on developing
countries, in fields such as:

 human development (e.g. education, health),


 agriculture and rural development (e.g. irrigation, rural services),
 environmental protection (e.g. pollution reduction, establishing and enforcing
regulations),
 infrastructure (e.g. roads, urban regeneration, electricity),
 and governance (e.g. anti-corruption, legal institutions development).

The World Bank has launched a new ‘Cybersecurity Multi-Donor Trust


Fund’, to better roll out cybersecurity development agenda in a systematic manner.
The new fund has been developed as an associated trust fund under the
broader Digital Development Partnership (DDP) umbrella program.
World Bank has partnered with four countries, namely Estonia, Japan, Germany,
and the Netherlands, to launch the fund. The main aim of this new fund is to
enhance cyber and digital security capability and capacity in World Bank member
countries, with the development of global knowledge, country assessments, technical
assistance, capacity building and training, along with necessary investments in
infrastructure and technology.

 World Bank Headquarters: Washington, D.C., United States.


 World Bank Formation: July 1944.
 World Bank President: David Malpass.

Common wealth of Nations


Basics and Backgrounds

 The Commonwealth of Nations, at one time known as British


Commonwealth,is an organisation of 54 states.
Page: 42
Cyber laws

 It proclaims that the Commonwealth nations are “free and equal”.


Structure

 The primary activities of the Commonwealth are designed to create an


atmosphere of economic cooperation between member nations, as well as the
promotion of democracy and good governance in them.
London Meet of Commonwealth Heads of Government Meeting

 London hosted the Commonwealth Heads of Government Meet (CHOGM)


with the theme “Towards a Common Future” for 2018.
 The four main goals for the summit were:
 Prosperity: Boosting intra-Commonwealth trade and investment.
 Security: Increasing cooperation to deal with security challenges including
global terrorism, organized crime and cyber-attacks.
 Fairness: Promoting democracy, fundamental freedoms and good governance
across the Commonwealth.
 Sustainability: Building the resilience of small and vulnerable states to deal
with the effects of climate change and other global crisis.

Commonwealth Human Rights Initiative (CHRI)

 The Commonwealth Human Rights Initiative (CHRI) is an independent,


non-partisan, international nongovernmental organization, headquartered
in New Delhi.
 The organization works for the practical realization of human rights across
the Commonwealth. In 1987, several Commonwealth associations founded
CHRI as a response to South Africa’s policy of racism.
Commonwealth Cyber Declaration

 It is the world’s largest and most geographically diverse


intergovernmental commitment on cyber-security

India & the Commonwealth

 India became a member of the Commonwealth in 1947


Page: 43
Cyber laws

 India’s new political interest in the Commonwealth is evident by the


participation of Prime Minister Narendra Modi at the 25th Commonwealth
Heads of Government Meeting (CHOGM) in London in 2018, marking the
first Indian prime ministerial presence in a Commonwealth Summit after
nearly a decade.
Copyright Issues in Cyberspace :

Copyright protection is given to the owner of any published artistic, literary,


or scientific work over his work to prohibit everyone else from exploiting that work
in his name and thereby gain profit from it.
When these proprietary creations are utilized by anyone without the permission of
the owner, it leads to copyright infringement. If copies of any software are made
and sold on the internet without the permission of the owner or even copying the
content from any online source, these all are examples of copyright infringement.

1. Linking –
It permits a Website user to visit another location on the Internet. By simply
clicking on a word or image on one Web page, the user can view another Web page
elsewhere in the world, or simply elsewhere on the same server as the original
page.
Linking damages the rights or interests of the owner of the Linked webpage. It may
create the supposition that the two linked sites are the same and promote the same
idea. In this way, the linked sites can lose their income as it is often equal to the
number of persons who visit their page.
2. Software Piracy –
Software piracy refers to the act of stealing software that is lawfully shielded. This
stealing comprises various actions like copying, spreading, altering, or trading the
software. It also comes under the Indian copyright act.
An example of software piracy is downloading a replica of Microsoft Word from
any website other than Microsoft to avoid paying for it as it is a paid software.
Piracy can be of 3 types:
1. Soft lifting
2. Software Counterfeiting
3. Uploading-Downloading.

 The most common type of softlifting occurs when a person does


legitimately purchase software but installs it onto multiple computers
which is a violation of the licensing agreement.
 Software counterfeiting, also known as piracy, is the illegal distribution
of unauthorized copies. The term software counterfeiting refers to the
distribution of illegal copies of software made to appear as if they were
originals.
Page: 44
Cyber laws

Trademark Issues in Cyberspace :

Trademark means a mark capable of being depicted diagrammatically and which


may distinguish the products or services of one person from those of others and will
embody the form of products, their packaging, and combination of colors. A
registered service mark represents a service. Trademark infringement refers to the
unlawful use of a trademark or service mark which can cause ambiguity, fraud, or
confusion about the actual company a product or service came from. Trademark
owners can take the help of the law if they believe their marks are being infringed.

Domain Names Related issues

A Domain Name is a word or a combination of words which help identify a


website’s association with another individual. Domain names are used to
locate a website and are popularly known as Uniform Resource Locator
(URL). The Internet Domain Name is very important for every business
that wants to establish their name globally. Domain Names consist of two
parts, top-level and second-level domain names. These are easily
identifiable, for e.g. www.google.com, here ‘com’ is the top-level domain
and ‘google’ is the second-level domain. Any individual can purchase a
Domain Name from a certified Registrar for a limited amount of time which
can be renewed by the registrant upon its expiry.

Domain Names can be registered and protected as trademarks as long as it


meets the requirements of a trademark under the Trade Marks Act 1999.
Domain Names that are registered trademarks are universally protected
primarily by the Internet Corporation for Assigned Names and Numbers
(ICANN). Resultantly, in case of any abusive registrations or infringement
of existing rights, an individual has the option to file a Domain Name
Dispute complaint under the Uniform Domain Name Dispute Resolution
Policy (at the international level) or under the .IN Domain Name Dispute
Resolution Policy (at the national level).

A Domain Name Dispute may arise when there is infringing, conflicting


and/or unauthorised use of a domain name on part of an individual. In order
Page: 45
Cyber laws

to successfully establish a Domain Name Dispute, the Complainant is


required to satisfy the criteria laid down in the various dispute resolution
policies. These grounds are elaborated later upon in this article.

As the internet is not restricted by any borders or boundaries, and due to


the global presence of most businesses, a Domain Name infringement can
occur in a country different from where it is registered. In the event of such
a trans-border infringement, the person can use the Uniform Domain Name
Dispute Resolution Policy (UDRP), a standard and uniform Policy across
the world, unlike domestic laws that can vary across jurisdictions.

Broadly, there are three different ways in which a Domain Name is


infringed:

 Cyber-Squatting: Cyber-squatting is carried out through Domain Name Parking,


or when an individual registers a Domain Name with no intention of carrying out
any legitimate commercial or non-commercial activities. It is commonly done by
Registrants in order to sell the domain name further to its authorised user at
exorbitant rates.

 Linking & Framing: Linking & Framing is when a user clicks on a text hyperlink
that takes them to a different website. This website is similar to a well-known
company, and is created solely to deceive the consumers into believing that their
domain name bares association with successful business entities that have a strong
online presence.

 Meta Tagging: Meta Tagging is when words and tags are used to manipulate
search engines into displaying the infringed website. They work similar to
Hashtags that are used on social media websites to increase visibility.

q) Explain about Cyber Terrorism:

Cyber Terrorism is basically the process of causing harm to the community by


making use of Internet networks to conduct violent incidents like loss of life or
data, to achieve some political advantage by giving threats.

 Cyber Terrorism basically involves damaging large-scale computer networks to


achieve a loss of data and even loss of life. Hackers make use of computer
viruses, spyware, malware, ransomware, phishing, programming language
scripts, and other malicious software to achieve their purposes.
Page: 46
Cyber laws

 Also, these types of cyber-attacks which often lead to criminal offenses are
referred to as Cyber Terrorism. These cyber-attacks create panic and physical
damage to a large number of people.
 Cyber Terrorism deals with creating damage to the people and their data using
computer networks intentionally in order to achieve their meaningful purpose.
 Government Agencies like the FBI (Federal Bureau of Investigations) and the
CIA (Central Intelligence Agency) in the past have detected multiple cyber
attacks and cyber crimes through terrorist organizations.
 The main purpose behind carrying out Cyber terrorism is to carry out some
cyberattack that makes a threat.
 According to the FBI, a Cyber Terrorism attack is defined as a cybercrime that
may be used intentionally to cause harm to people on large scale using computer
programs and spyware.
 A cyber terrorism attack is much more harmful than a normal cybercrime
because to intentional harm to the victims and it may not cause financial damage
to cause fear in society.
 In most cases, the criminals target the banking industry, military power, nuclear
power plants, air traffic control, and water control sectors for making a cyber
terrorism attack for creating fear, critical infrastructure failure, or for political
advantage.

Working

The cyber terrorism attacks work in the following ways:


 They use computer viruses, worms, spyware, and trojans to target web servers
and IT service stations. They want to attack military utilities, air force stations,
power supply stations to disrupt all the services.
 They use a Denial of Service attack where the original verified user cannot
access the services for which he is authorized. This creates a sense of fear
among the people for important essential services like medical emergencies.
 These attacks help cyber criminals to get unauthorized access to the user’s
computer using hacking and then stealing that information to fulfill their wrong
purposes.
 Ransomware helps them to hold data and information by asking for some
ransom money from the victim and they even leak the private data of the users if
they don’t get the desired amount.
 They mostly use phishing-based techniques to target users using infected spam
emails to steal the user’s information and reveal that identity to everyone.
 The most popular attack used in cyber terrorism is the APT (Advanced persistent
threat). They use complex penetrating network models to hack into large-scale
computer networks like in an organization. They make themselves undetected in
that organization network and then they continuously steal information related to
military equipment, national defense information, etc.

Attacks:
Page: 47
Cyber laws

The cyber terrorism attacks are usually carried out as follows:


 Unauthorized access: Attackers aim to disrupt and damage all the means of
access to the service. Instead, the hacker gains unauthorized access to the
important resources.
 Disruption: These attacks focus on disrupting public websites and critical
infrastructure resources to create fear within the society of massive fatalities and
commotion.
 Cyberespionage: The government usually carry out some spyware operations
on other government of other country related to military equipment to gain an
advantage over rival nations in terms of military intelligence.
 Economic failure: Cybercriminals want all the technical system failures to
cause a large-scale economic failure like crashing the electricity or water
systems for multiple days to create a panic of these services within the society.
q) Explain about Cyber Defamation

The term ‘Cyber Defamation’ basically means publishing of false statement about
an individual in cyberspace that can injure or demean the reputation of that
individual. In India, defamation can be contemplated as both civil and criminal
offence, and thus legal remedies are provided to the victims by the Indian judiciary
system.

What do we understand by the term “Defamation”?


Defamation can be understood as the wrongful and intentional publication of
something either in the written or oral form about a person to harm his reputation in
the society. For a statement to be considered as defamatory, the following essential
elements must be fulfilled.

 There must be the publication of the defamatory statement, which means


coming to the knowledge of a third party.
 The statement must refer only to the plaintiff
 The statement must be defamatory in nature.

The widely used social media brought a revolution not only in the Indian sphere but
also all across the world. The remarkable growth of the Internet has provided people
with a platform to express their opinions, thoughts, and feelings through various
forms of publications. Nonetheless, the ease of accessibility and publication in this
online world has created several risks as these digital platforms are prone to be
exploited by unscrupulous Internet users in the name of freedom of speech and
expression. Thus this has led to numerous cases of “Cyber Defamation”.
Page: 48
Cyber laws

Cyber defamation is a new concept but the traditional definition of defamation is


injury caused to the reputation of a person in the eyes of a third person, and this
injury can be done by verbal or written communication or through signs and visible
representations. The statement must refer to the plaintiff, and the intention must be to
lower the reputation of the person against whom the statement has been made. On
the other hand, Cyber defamation involves defaming a person through a new and far
more effective method such as the use of modern Electronic devices. It refers to the
publishing of defamatory material against any person in cyberspace or with the help
of computers or the Internet. If a person publishes any kind of defamatory statement
against any other person on a website or sends E-mails containing defamatory
material to that person to whom the statement has been made would tantamount to
Cyber defamation.

Liability in Cyber Defamation


In India, a person can be made liable for defamation both under civil and criminal
law.

1. Indian Penal Code


Section 499 of Indian Penal Code says that “Whoever by words either spoken or
intended to be read or by signs and visual representations makes or publishes any
imputation concerning any person intending to harm or knowing or having reason to
believe that such imputation will harm the reputation of such person is said, except in
the cases hereinafter excepted to defame that person.”

Section 500 of IPC provides for punishment wherein “any person held liable under
section 499 will be punishable with imprisonment of two years or fine or both.”

Section 469 deals with forgery. If anyone creates a false document or fake account
by which it harms the reputation of a person. The punishment of this offence can
extend up to 3 years and fine.

Section 503 of IPC deals with the offence of criminal intimidation by use of
electronic means to damage one’s reputation in society.

2. Information Technology Act, 2000


Section 66A, Information Technology Act,2000 – This law has been struck down by
Supreme Court in the year 2015. The section defined punishment for sending
‘offensive’ messages through a computer, mobile or tablet. Since the government did
not clarify the word ‘offensive’. The government started using it as a tool to repress
freedom of speech. In 2015, the whole section was quashed by the Supreme Court.
Page: 49
Cyber laws

The International Telecommunication Union (ITU):


The International Telecommunication Union (ITU) is an agency of the United
Nations (UN) whose purpose is to coordinate telecommunication operations and
services throughout the world. Originally founded in 1865, as the International
Telegraph Union, the ITU is the oldest existing international organization. ITU
headquarters are in Geneva, Switzerland.
The ITU consists of three sectors:
 Radio communication (ITU-R) -- ensures optimal, fair and rational use of

the radio frequency (RF) spectrum


 Telecommunication Standardization ( ITU-T ) -- formulates recommendations for

standardizing telecommunication operations worldwide


 Telecommunication Development (ITU-D) -- assists countries in developing and

maintaining internal communication operations


The ITU sets and publishes regulations and standards relevant to electronic
communication and broadcasting technologies of all kinds including radio,
television, satellite , telephone and the Internet . The organization conducts working
parties, study groups and meetings to address current and future issues and to resolve
disputes.

India, International Telecommunication Union Launch Joint Cyberdrill 2021

The Department of Telecommunications (DoT) and the International


Telecommunication Union (ITU) recently launched the India-ITU Joint Cyberdrill
2021. The cyber drill is intended for Indian entities, especially critical network
infrastructure operators. It is a four-day virtual event for several high-level speakers,
panellists, and experts from ITU, the United Nations Office on Drugs and Crime
(UNODC), INTERPOL, the National Security Council Secretariat (NSCS) and the
Indian Computer Emergency Response Team (CERT-In).
ITU, an agency under the United Nations, annually conducts cyber drills worldwide
where cyberattacks, phishing, and other information security breaches are simulated
to test organisational capabilities to thwart or minimise the impact. According to
a news report by The Economic Times, the drill aims to spread awareness among
various public sector departments and agencies so that their strategies and procedures
can be validated for response mechanisms, prevention recovery and business
continuity.
During the first half of this year, more than 600,000 cyber-attacks were reported in
India that included nearly 12,000 incidents in government organisations, as per data
Page: 50
Cyber laws

from CERT-In, which tracks and monitors cyber security incidents in the country.
Last year, around 1.1 million cybersecurity incidents were reported.
Speaking at the inaugural event, the Special Secretary of DoT emphasised the need
for safe and secure cyberspace given the large networks in India. Cybersecurity is a
collective responsibility, and it calls upon all stakeholders – government, the
cybersecurity community, and businesses – to participate in building a resilient cyber
environment, she added. Panellists and experts from organisations, industries, and
agencies made presentations on best practices and highlighted the policy initiatives
of cybersecurity in India as well as across the globe. More than 400 participants
attended from critical sectors, including power, insurance, finance, industry,
academia, telecommunications and field units of DoT.
In October, the ASEAN-India Track 1.5 Dialogue on Cyber Issues was held to
enhance cooperation on cybersecurity and narrow the digital gap. Speaking at the
event, the Secretary of the Indian Ministry of External Affairs Riva pointed out that
ASEAN has been proactive in the region’s efforts to tackle cybersecurity challenges
and has undertaken various cyber confidence-building measures.
OpenGov Asia reported that she affirmed ASEAN’s emphasis on cybersecurity and
cyber connectivity following international laws that resonate deeply with India’s
approach towards cyberspace. The country has been working domestically to address
cybersecurity challenges by developing platforms to secure the country’s cyberspace
as well as by adopting comprehensive policies like the New National Cyber Security
Policy.
Cybercrime often has a transnational dimension and there is a crucial need for
international cooperation to exchange experiences and share best practices for the
protection of information infrastructures. Equitable access to cyberspace and its
benefits is another important area that India-ASEAN engagement on cyber issues
discussed. The government has stated that India is committed to bilateral and
international cooperation on cybersecurity and is dedicated to an open, secure, free,
accessible, and stable cyberspace environment. With technology initiatives such
as IndiaStack, Aadhar, and the United Payments Interface (UPI), the country has
successfully leveraged the tremendous potential of cyber technologies in
implementing Sustainable Development Goals (SDG) agenda and improving
governance.

You might also like