Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
When a man is denied the right to live the life he believes in, he
has no choice but to become an outlaw.
Nelson Mandela
a) White Hat Hackers They are those hackers who believe that
information sharing is good, and that it is their duty to share their
expertise by facilitating access to information. However there are
some white hat hackers who are just joy riding on computer
systems.
12. Credit Card Fraud In U.S.A. half a billion dollars have been
lost annually by consumers who have credit cards and calling card
numbers. These are stolen from on-line databases. In present world
this cyber crime is emerged as a major threat as numerous cases
had been filed in almost every major developed and developing
country.
Crime in any form adversely affects all the members of the society.
In developing economies, cyber crime has increased at rapid strides,
due to the rapid diffusion of the Internet and the digitization of
economic activities. Thanks to the huge penetration of technology in
almost all walks of society right from corporate governance and
state administration, up to the lowest level of petty shop keepers
computerizing their billing system, we find computers and other
electronic devices pervading the human life. The penetration is so
deep that man cannot spend a day without computers or a mobile.
Snatching some ones mobile will tantamount to dumping one in
solitary confinement!
Internet is the fastest technique on earth that one can find these
days and for everything it is the best solution that people consider
looking into. It has all the benefits and advantages like
communication, advertisement, online movie and songs downloads,
emailing, instant messaging and searching out the concerns and
issues there are plenty of things that internet has got wrong as well.
There are different kinds of internet scams and frauds that are
happening and one needs to be very careful. This is something that
has been bothering individuals and organizations ever since internet
was introduced and many a time, simple things could make you a
victim even when you are unaware of it.
Cyber Crime is neither defined in the IT Act 2000 nor in the I.T.
Amendment Act 2008 nor in any other legislation in India. To define
cyber crime, we can say, it is just a combination of crime and
computer. To put it in simple terms any offence or crime in which a
computer is used is a cyber crime. Interestingly even a petty
offence like stealing or pick-pocket can be brought within the
broader purview of cyber crime if the basic data or aid to such an
offence is a computer or information stored in a computer used (or
misused) by the fraudster. It could be hackers vandalizing ones site,
viewing confidential information or stealing trade secrets or
intellectual property with the use of internet. It can also include
denial of services and viruses attacks preventing regular traffic
from reaching your site.
Cyber crimes also includes criminal activities done with the use of
computers which further perpetuates crimes i.e. financial crimes,
sale of illegal articles, pornography, online gambling, intellectual
property crime, e-mail, spoofing, forgery, cyber defamation, cyber
stalking, unauthorized access to Computer system, theft of
information contained in the electronic form, e-mail bombing,
physically damaging the computer system etc. In a cyber crime,
computer or the data itself is the target or the object of offence or a
tool in committing some other offence, providing the necessary
inputs for that offence. All such acts of crime will come under the
broader definition of cyber crime.
This approach has been very effective for the criminals involved. In
2007 and 2008 the cost of cybercrime worldwide was estimated at
approximately USD 8 billion. As for corporate cyber espionage,
cyber criminals have stolen intellectual property from businesses
worldwide worth up to USD 1 trillion.
Carding: It means false ATM cards i.e. Debit and Credit cards
used by criminals for their monetary benefits through
withdrawing money from the victims bank account mala-
fidely. There is always unauthorized use of ATM cards in this
type of cyber crimes.
Cheating & Fraud: It means the person who is doing the act of
cyber crime i.e. stealing password and data storage has done
it with having guilty mind which leads to fraud and cheating.
The Information Technology Act, 2000, was thus passed as the Act
No.21 of 2000, got Presidents assent on 9 June and was made
effective from 17 October 2000.
The Act essentially deals with the following issues:
Thus the need for an amendment a detailed one was felt for the
I.T. Act almost from the year 2003-04 themselves. Major industry
bodies were consulted and advisory groups were formed to go into
the perceived lacunae in the I.T. Act and comparing it with similar
legislations in other nations and to suggest recommendations. Such
recommendations were analyzed and subsequently taken up as a
comprehensive Amendment Act and after considerable
administrative procedures; the consolidated amendment called the
Information Technology Amendment Act 2008 was placed in the
Parliament and passed without much debate, towards the end of
2008. This
Amendment Act got the President assent on 5 Feb 2009 and was
made effective from 27 October 2009.
INDIAN PERSPECTIVE
Talking about Indian scenario of cyber space crimes and cyber space
laws, there was no statute in India for governing Cyber Laws
involving privacy issues, jurisdiction issues, intellectual property
rights issues and a number of other legal questions. With the
tendency of misusing of technology, there arisen a need of strict
statutory laws to regulate the criminal activities in the cyber world
and to protect the true sense of technology IT ACT, 2000 was
enacted by Parliament of India to protect the field of e-commerce, e-
governance, e-banking as well as penalties and punishments in the
field of cyber crimes. The above Act was further amended in the
form of IT Amendment Act, 2008. Also certain sections of IPC and as
some cyber space crime are invading right to privacy, article 21 of
Indian constitution are some governing laws for cyber space crime
which imposes various liabilities in India.
CONSTITUTIONAL LIABILITY
CRIMINAL LIABILITY
Criminal liability in India for cyber crimes is defined under the Indian
Penal Code (IPC). Certain Following sections of IPC deal with the
various cyber crimes:
In India there are number of cases filed under these IPC provisions
related to the cyber crime. According to the report of Home Ministry,
in 2012 there are 601 cases filed under the various provisions of IPC.
[7]
TORTIOUS LIABILITY
(sec. 77 IT Act)
Uniform law
Mr. Vinod Kumar holds the opinion that the need of the hour is a
worldwide uniform cyber law to combat cyber crime. Cyber crime is
a global phenomenon and therefore the initiative to fight it should
come from the same level. [13]
Lack of awareness
There is a need for a well equipped task force to deal with the new
trends of hi tech crime. The government has taken a leap in this
direction by constituting cyber crime cells in all metropolitan and
other important cities. Further the establishment of the Cyber Crime
Investigation Cell (CCIC) of the Central Bureau of Investigation (CBI).
Cyber savvy judges are the need of the day. Judiciary plays a vital
role in shaping the enactment according to the order of the day. One
such stage, which needs appreciation, is the P.I.L., which the Kerala
High Court has accepted through an email.
As stated above one of the fatal drawbacks of the Act has been the
cases going unreported. One obvious reason is the non-cooperative
police force. The police are a powerful force today which can play
an instrumental role in preventing cybercrime. At the same time, it
can also end up wielding the rod and harassing innocents,
preventing them from going about their normal cyber business. For
complete realization of the provisions of this Act a cooperative
police force is required. [14]
Apart from these loopholes and problems the present form of police
system and many police officials are not familiar with the cyber
crimes and they need training to be familiar with the Modus
operandi of cyber crimes though the existing relevant act is
comprehensive legislation but from the practical point of view there
are some shortcomings in the errant form of the act. It is the need of
the hour that the efficiency of police system at all ranks should be
upgraded in terms of cyber crimes. The immoral, lethal minds of
criminals take advantages of inefficient police system.
Both bench and Bar should realize the extent of cyber crimes. They
should familiarize themselves with the intricacies of cyber law,
otherwise they would find it extremely difficult to deal with cyber
crime cases.
Court held that Section 43(a) was applicable here due to the nature
of unauthorized access involved to commit transactions.
The Bank NSP case is the one where a management trainee of the
bank was engaged to be married. The couple exchanged many
emails using the company computers. After some time the two
broke up and the girl created fraudulent email ids such as Indian
bar associations and sent emails to the boys foreign clients. She
used the banks computer to do this. The boys company lost a large
number of clients and took the bank to court. The bank was held
liable for the emails sent using the banks system.
Sony.Sambandh.Com Case
Bazee.com case
COMPARATIVE STUDY
As against the alone legislation ITA and ITAA in India, in many other
nations globally, there are many legislations governing e-commerce
and cyber crimes going into all the facets of cyber crimes. Data
Communication, storage, child pornography, electronic records and
data privacy have all been addressed in separate Acts and Rules
giving thrust in the particular area focused in the Act.
United Kingdom
In the UK, the Data Protection Act and the Privacy and Electronic
Communications Regulations etc are all regulatory legislations
already existing in the area of information security and cyber crime
prevention, besides cyber crime law passed recently in August
2011.
INTERPOLS ROLE:-
CONCLUSION
Cyber crime is a new form of crime that has emerged due to
computerization of various activities in an organization in a
networked environment. With the rapid growth of information
technology cyber crimes are a growing threat.
A person should never send his credit card number to any site
that is not secured, to guard against frauds.
[5] Ibid
[8] Ibid
[90 Ibid
[10] Ibid
[11] Pawan Duggal, Is this treaty a treat? Available at
http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
[12] Ibid
[13] Kumar Vinod, Winning the Battle against cyber Crimes available
at http://www.cyberriskinsuranceforum.com/content/are-we-losing-
battle-against-cyber-crime
[15] Ibid