Sunday, June 24, 2012

Mowing the Law: Evolution of Indian Cyber Law from 2000 to 2012

Introduction :- ?

? ?The internet interprets the US congress ?as? system damage and route around it?? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ??Jeanne DeVoto.? ??

hand cuff arrested keyboard computer amendment of it act 2000, e-mail laws, indian evidence act, information technology, it act 2008, monica mishra legal awareness, offences, The Evolution of Indian Cyber Law from 2000 to 2012?Computer crime, or?cybercrime, refers to any crime that involves a computer and network. The computer may have been used in the?commission of a crime, or it may be the target. Net crime?refers to criminal exploitation of the?Internet. Cybercrimes are
defined as :- "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the?victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat?rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation?s security and financial?health. Issues surrounding this type of crime have become high-profile, particularly those surrounding?cracking,?copyright infringement,?child pornography, and?child grooming. There are? problems of?privacy?when?confidential?information is lost or intercepted, lawfully or otherwise. ? (Image taken from here.)? ? ? ? ? ? ? ? ? In simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both .Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

????? Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.?? We can categorized cyber crimes in two ways they are :-1. The Computer as a Target :- using a computer to attack other computers.e.g. ?Hacking, Virus/Worm attacks, DOS attack etc.2.The computer as a weapon :- using a computer to commit real world crimes.e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.

?Part I

(a)????????????????? Evolution of cyber law :- ?Rohas? Nagpal is the founder President of Asian School of Cyber Laws. he advises Governments and corporate around the world in cyber crime investigation and cyber law related issues. He has assisted the Government of India in drafting rules and regulations under the Information Technology Act, 2000.?The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since

3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to?discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! Today, computers have come a long way with neural networks and nanocomputing promising to turn every atom in a glass of water into a computer capable of performing a billion operations per second. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants are being run on computers, cyber crime has assumed rather sinister implications. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief. The abuse of computers has also given birth to a gamut of new age crimes such as hacking, web defacement, cyber stalking, web caking etc.

A simple yet powerful definition of cyber crime would be either a tool of ?unlawful acts wherein the computer is either a tool or target or both?.? The term computer used in this definition does not only mean the conventional desktop or laptop computer. It includes Personal Digital Assistants (PDA), cell phones, sophisticated watches, cars and a host of gadgets.(b)????????????????? Technical AspectsTechnological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as :-

?? Unauthorized access & Hacking:-Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.

The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. The name Trojan Horse is popular .Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well. (Image taken from here.)

c. Virus and Worm attack:-A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. programs that multiply like viruses but spread from computer to computer are called as worms.

d. E-mail & IRC related crimes:-Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.

Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter. (Image taken from here.)

3. Sending malicious codes through emailE-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.5. Sending threatening emails8. IRC related.? Three main ways to attack IRC are: a."verbal??8218;??#8220; .attacks, b.clone attacks, and c.flood attacks.(c)? Cyber law India ?:-? INDIA PASSES ITS FIRST CYBERLAW WITH ?DRACONIAN POWERS ?by , SHRI PAVAN DUGGAL, CYBERLAW CONSULTANT, PRESIDENT, CYBERLAWS.NET member, MAC, ICANN. ?Before the ICANN , The government of united states controlled the domain name system of internet . The original mandate ICANN came from the united state government, spanning the presidential administration of both Bill CLINTON and and George W. Bush. On January 30, 1998 The national telecommunication and information administration (NTIA), an agency of the U.S.? department of commerce , issued for comment ,? A Proposal to Improve the Technical Management of Internet Names and Addresses." The proposed rule making, or "Green Paper", was published in the Federal Register on February 20, 1998, providing opportunity for public?comment NTIA received more than 650 comments as of March 23, 1998, when the comment period closed. The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of robust competition and facilitates global participation in Internet management. The Green Paper proposed for discussion a variety of issues relating to?DNS?management including private sector creation of a new not-for-profit corporation (the "new corporation") managed by a globally and functionally representative Board of Directors ICANN was formed in response to this?policy The?IANA?function currently exists under an agreement with the?U.S. Department of Commerce ICANN was incorporated in California on September 30,1998.

The Parliament of India has passed its first Cyber law, the Information?Technology Act, 2000 which not only provides the legal infrastructure for??E-commerce in India but also at the same time, gives draconian powers to?the Police to enter and search, without any warrant , any public place? for? the? purpose? of nabbing cyber criminals and preventing cyber crime.???????????????????????? ? ? ? ? ? ? ? ? ?

The good features of the said IT Act are that? it? legally recognizes email as? a valid form of? communication in India.? Also acceptance in a electronic? form? of any offer, culminating into an electronic contract ,has also been declared legal and enforceable. The new act has recognized digital? signature for the first time in Indian law . The said new law has also?granted a hierarchy of infrastructure consisting of a Controller for?? certifying authorities, Adjudicating Officers and Cyber Appellate? Tribunal.?The? most? distressing part of the new IT Act 2000 is its absolute trampling? of cyber liberties and freedom. A police officer of the rank a Deputy?superintendent of Police has? been? granted? unheard of powers in Cyber law? history to do almost anything for the purpose of nabbing a cyber criminal. The said unrestricted power given to police officer is in the form of an absolute discretion given to the police officer to enter and search any? public place and arrest any person without? warrant? who is? "reasonably suspected" of having committed or of committing a cyber crime? or if he is? about? to commit a cyber crime. The discretion of the police officer further extends to defining as to who is going to be "reasonably suspected"? of a? cybercrime.? Also, the? Indian Cyber law talks of the arrest of any person who is about to commit a cyber crime. It is indeed alien to Cyber law jurisprudence as to how any police officer is going to decide as to whether a person is about to commit? a cybercrime.? Also, the? requirements of cyberspace are very different from the actual world. Most of the times, it is difficult to? decide? till? the? last? moment? as? to? whether? any? cybercrime? is?? about?? to?? be committed.?To top it all, the IT Act,? 2000 ?gives immunity to the? Central Government? and?? its officials including police? from any suit, prosecution and other legal proceedings for any act done in good faith in pursuance of the provisions of? the Act. Effectively , this rules out any remedy for? any? person who is made a target of abuse and misuse of discretion by the police.


?????????????????????????????????????????????????????????????? Part IITHE INFORMATION TECHNOLOGY ACT, 2000 - INDIA 'S FIRST CYBERLAW????? Aims to provide the Legal infrastructure for e-commerce in India.????? India?s codified cyber Law is the Information technology Act,2000 (act 21 of 2000)????? Based on INCITRAL model Law on electric commerce , 1996.????? IT act is divide into 13 chapter and has 94 sections.????? Administration to IPC , Indian evidence Act, bankers evidence Act and RBI act have??? been effected.? THE ACT PROVIDE FOR :-????? Legal recognition of Electronic Document.????? Legal Recognition of Electronic Commerce transition.????? Legal acceptance of digital signatures.????? Punishment for cyber obscenity and crimes.????? Establishment of Cyber regulation advisory committee and the cyber regulations? appellate tribunals.????? Facilitation of electronic filing maintenance of electronic records.?? THE IT ACT 2000 ? OBJECTIVES????? To provide for Legal recognition for transaction.????? Carried out by electronic data interchange and,????? Other means of electronic communication commonly referred to as ? electronic commerce?, involving the use of alternatives to paper- based methods of communication and storage of information,????? To facilitate electronic filing of documents with the government agencies.????? To amend the Indian Penal Code, the Indian evidence act ,1872, the banker?s book evidence act ,1981 and the Reserve bank of India act,1934.????? Aims to provide for the Legal framework so the legal sanctity is accorded ?to all electronic records and other activities carried by electronic means.??

ACCORDING TO? THE INDIAN IT ACT , 2000 THEVARIOUS CYBER OFFFENCES ARE :- ??? Tampering with computer source documents.?? Hacking with computer system.?? Publishing of information which is obscene in electronic form.?? Not to obey the direction? of controller.?? Directions of controller to a subscriber extend facilitate to decrypt information.?? Intrusion into protected instrument.?? Penal action for misrepresentation.?? Breach of confidentiality and privacy.?? Publishing digital signature certificate false in certain particular etc.?? Act to apply for offence or contravention? committed outside India andTHE IT ACT 2000 -?? POSITIVE ASPECTS ?? E-mail will now be a valid and legal form of communication in our country.?? Can be duly produced and proved in a court of law. India?s strategy for prevention of computer crimes ?? Stipulating the offence which would constitute computer crimes.?? Identification of domestic criminal law for possible amendment to meet the requirements of prevention of computer related crimes.?? Improving international collaboration.?? Effective prosecution under the existing criminal law.?? Adaption and classification of OECD (organization of economic cooperation and development) guidelines.?? ??Development of security guidelines and manuals for implementation of such guidelines.Crimes prevention under the IT Act?? Chapter IX provides for penalties and adjudication ?? Chapter XI provides for offence. The object of IT Act is to protect?? ?All electronic system for intrusion ;?? Privacy of certain messages;?? Protect the computer system for unauthorized access.The object of IT Act is to ensure:

?? Compliance ?to the provision of the act;

?? Non -publishing of obscene information;

?? Assistance in the decrypting information in the interest of state and crime control.

The act also aims at preventing misrepresentation , falsity and fraud and provides for penalty.????? IT ACT 2000 ? overall prescriptive ? The IT Act 2000 is a first step take by the government of India towards promoting the ????growth of e- commerce it is the? first historical step.?

CHANGES? BROUGHT? BY? THE AMENDMENT ACT? OF 2008:-

?? The name of Cyber Regulations Appellate Tribunal has been changed to Cyber Appellate Tribunal.?? Cyber Appellate Tribunal has been made a multi-member entity. This will provide for more expertise for the Tribunal.

?? Section 2(ta) introduces the term ?electronic signature?.?Now ?digital signature? has been made a subset of ?electronic signature?. In the definition of ?electronic signature? it has been given that it includes ?digital signature?.?? Section 3A has been introduced for electronic signature which says that a?subscriber may authenticate electronic records by electronic signature. The authentication was earlier possible only by digital signature.?? Section 2(tb) has been introduced to define the term ?electronic signature certificate?. Now ?digital signature certificate? has been made a subset of ?electronic signature certificate?.?? Definition of ?intermediary? has been modified.?As per the amendments in various sections now intermediaries are made more responsible and liable towards their acts.?New Section 67C asks intermediaries to preserve and retain certain records for a stated period. New Section 69B is also quite stringent to intermediaries.?? ??Section 6A introduced to provide for?appointment of Service Providers?by appropriate government for e-governance services.

????????? Section 7A makes?audit of electronic documents mandatory?wherever physical documents, records required audit. This provision will put considerable work load on the government

????????? Section 69A has been introduced to enable blocking of websites by the central government.????????? Section 69B provides?powers to central government to collect traffic data from any computer resource. It could be either in transit or in storage. This move by the government was necessary for national security purpose but it may lead to abuse of power by government.

Section 66A ? Sending offensive messages

Section 66B ? Receiving a stolen computer resource

Section 66C ? Identity theft

Section 66D ? Cheating by personation

Section 66E ? Violation of privacy, video voyeurism

Section 66F ? Cyber Terrorism (Life Sentence)

????????? New Sections introduced -

Section 67A ? To cover material containing ?sexually explicit act?

Section 67B ? To cover child pornography

Section 67C ? To make intermediaries preserve and retain certain records for a stated period. (Imprisonment 3 years and fine.)


????????? Section 1(4) in the Information Technology Act, 2000 contained a list of documents which were excluded from the applicability of the act. The list has now been moved to Schedule 1 of the ITA 2008. This move can be considered as a procedural simplification made by the amendment. A notification will be required to make additions or deletions to this list. Every notification issued in this regard shall be laid before each House of Parliament.????????? Some more new definitions added ? ?communication device?, ?cyber caf??, ?cyber security?.????????? Compensation limit has been removed from Section 43.????????? Section 43A introduced to make body corporate liable to pay damages by way of compensation for failure to protect sensitive personal data or information. No limit has been set for compensation.????????? Changes in Section 46 have brought Civil Court below the High Court into the cyber related disputes for the first time. The powers of the Adjudicator has been limited for claims upto Rs 5 crores.?For claims above Rs 5 crores Civil Court?s authority has been introduced.????????? In Section 66 ?dishonesty? and ?fraudulent? intention has been made necessary.????????? Section 72A has been introduced for data protection purpose. It provides for punishment for disclosure of information in breach of lawful contract. Imprisonment of 3 years or fine upto Rs 5 lakhs or both for cases relating to data breach has been provided.????????? Section 77A introduced to provide for compounding of offences with punishment upto 3 years.????????? The powers under Section 80 were earlier available to DSP is now available to Inspectors.????????? Section 81 has been amended to keep the primacy of Copyright and Patent Acts above ITA 2000.????????? New Section 84C introduced to make ?an attempt to commit an offence? punishable. The punishment will be half of the punishment meant for the offence.????????? State Governments will be exercising far more powers?under the ITAA 2008 than what was envisaged under ITA 2000.
Monica is pursuing her B.L.S/LL.B Degree from Government Law College, (Churchgate). She has great interest in Legal writing .Besides Legal Writing she also writes Poems on different subjects. She wants to be an I.A.S officer . She is ever ready to provide people in need with legal aid. She is also the founder of her own blog?Legal Awareness.

space shuttle enterprise ryan leaf ryan leaf luke kuechly brad miller chandler jones peyton hillis

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.