Unit - I
Unit - I
Topics:
Cybercrime and information security
Cybercriminals
Classifications of cybercrimes
Need for Cyberlaws in Indian context
Legal perspectives of cybercrime
Indian perspective of cybercrimes
Cybercrime and the Indian ITA 2000
Global perspective on cybercrimes
Amendments made in Indian ITA 2000 for admissibility of e-records
Positive aspects of ITA 2000
Weak areas of ITA 2000
Intellectual property in cyberspace
Ethical dimension of cybercrimes.
Introduction
• Internet has opened a new way of exploitation known as cybercrime.
• These activities involve the use of computers, the internet,
cyberspace and the WWW.
• Total of 3286 Indian websites were hacked in 5 months- between Jan
and June 2009.
• According to Indusface’s report, Indian enterprises and government
organisations faced over 5 billion cyberattacks in 2023
• The Indian Computer Emergency Response Team (CERT-In) reported
1.12 lakh cybersecurity incidents in the first half of 2023. This figure
shows a significant decline from the 13.91 lakh incidents in 2022 and
14.02 lakh in 2021.
• Between January 2018 and September 2023, 373 central and state
government websites were hacked, the ministry of electronics and
information technology informed the parliamentary committee on
communications and information technology.
Definition
• A crime conducted in which a computer was directly and
significantly instrumental.
• Alternative definitions:
• Any illegal act where a special knowledge of computer technology
is essential for its perpetration(to commit), investigation or
prosecution.
• Any traditional crime that has acquired a new dimension or order
of magnitude through the aid of a computer, and abuses that have
come into being because of computers.
• Any financial dishonesty that takes place in computer environment.
• Any threats to computer itself, such as theft of hardware or
software, sabotage(damage) and demands for ransom.
• Cybercrime is any illegal behavior, directed by means of electronic
operations, that targets the security of computer systems and the
data processed by them.
Origin
• The term cybercrime has evolved over the past few years since the adoption
of internet connection on a global scale with hundreds of millions of users.
• Two types of attacks are prevalent:
• Techno crime:
– A premeditated act against a system or systems, with the intent of copy,
steal, prevent access, corrupt or otherwise deface or damage parts of the
complete computer system.
– The 24X7 connection to the internet makes this type of cybercrime a real
possibility of engineer from anywhere in the world, leaving few, if any,
“finger prints”
• Techno-vandalism:
– These acts of “brainless” defacement of websites and/or other activities,
such as copying files and publicizing their contents publicly, are usually
opportunistic in nature.
– Tight internal security, allied to strong technical safeguards, should
prevent the vast majority of such incidents.
• Cyberterrorism refers to the use of computer technology and networks to
perpetrate acts of terrorism. It involves attacks on information systems,
networks, and computer resources to cause fear, disruption, or harm on a
large scale. Cyberterrorism can target critical infrastructure, government
systems, financial networks, and more, posing significant threats to national
security and public safety.
2. Prevention of Cybercrime
CHAPTER XIII Miscellaneous 80. Power of police officer and other officers to
enter and search, etc
81. Act to overriding effect
82. Chairperson, Members, officers and
employees to be public servants.
83. Power to give directions
84. Protection of action taken in good faith
85. Offences by companies
86. Removal of difficulties
87. Power of central government to make rules.
88. Constitution of advisory committee
89. Power of controller to make regulations
90. Power of state government to make rules.
• Sections 65, 66, 67, 71, 72,73 and 74 in CHAPTER XI
(offences) of the Indian ITA 2000 are relevant to the
discussion of cybercrime in legal context. The relevant
portion from that is follows:
• Section 65: Tampering with computer source documents.
• Whoever knowingly or intentionally conceals, destroys or
alters or intentionally or knowingly causes another to
conceal, destroy or alter any computer source code used
for a computer, computer programme, computer system
or computer networks, when the computer source code
is required to be kept or maintained by law for the time
being in force, shall be punishable with
• 3 years imprisonment or fine-200000 or both
• Section 66: Computer-related offences
• Whoever with the intent to cause or knowing
that he is likely to cause wrongful loss or
damage to the public or any person destroys
or deletes or alters any information residing in
a computer resources or diminishes its value
or utility or affects it injuriously by any means,
commits hack.
• 3 years imprisonment or fine-500000 or both
• Section 67: punishment for publishing or
transmitting obscene material in electronic from.
• Whoever publishes or transmits or causes to be
published in the electronic form, any material
which is lascivious or appeals to the prurient
interest or if its effect is such as to tend to
deprave and corrupt person who are likely,
having regard to all relevant circumstances, to
read, see or hear the matter contained or
embodied in it, shall be punished
• 3 years imprisonment or fine-500000 or both
• Section 71: penalty for misrepresentation
• Whoever makes any misrepresentation to, or
suppresses any material fact from, the
controller or the certifying authority for
obtaining any license or digital Signature
Certificate, as the case may be, shall be
punished with imprisonment for a term which
may extend to 2 years, or with fine which may
extend to 1 lakh rupees.
• Section 72: penalty for breach of
confidentiality and privacy.
• Access to any electronic record, book, register,
correspondence, information, document or
other material without the consent of the
person concerned discloses such electronic
record, book, register, correspondence,
information, document or other material to
any other person shall be:
• 2 years imprisonment or fine-100000 or both
• Section 73: Penalty for publishing Digital Signature
Certificate false in certain particulars
• No person shall publish a Digital Signature Certificate
or otherwise make it available to any other person
with knowledge that:
– The certifying authority listed in the certificate has not
issued it or
– The subscriber listed in the certificate has not accepted it.
– The certificate has been revoked or suspended, unless
such publication is for the purpose of verifying a digital
signature created prior to such suspension or revocation.
• 2 years or 1 lakh or both.
• Section 74: publication for fraudulent purpose
• Whoever,
• Knowingly creates, publishes or otherwise
makes available a Digital Signature Certificate
for any fraudulent or unlawful purpose-
• 2 years or 1 lakh.
Summary of changes to Indian act 2000
Section No Changes Made
2 2(d) modified, and the term "Digital Signature" replaced with "Electronic Signature" in the Act
2(ta) and 2(tb) introduces the term of "Electronic Signature" and "Electronic Signature Certificate"
20 Section deleted
28,29 No change in 28. In Section 29, the powers have been restricted to contraventions under this chapter.
The clause has been re written with significant changes. Applies to all contraventions listed in Section
66
43. Fine increased to Rs 5 lakhs
New Sections added under 66A, 66B,66 C,66D, 66E and 66 F to cover new offences.
Refers to the powers of the Controller to direct Certifying Authorities for compliance. No significant
68
change. Penal powers to be applicable only on intentional violation
Scope extended from decryption to interception, monitoring also. Control will be on a designated
69
officer and not the Controller.
69A: New Section introduced to enable blocking of websites.
69B: New section that provides powers for monitoring and collecting traffic data etc.
Critical Infrastructure System defined and section restricted to only such systems. Security practices
70
to be notified.
70A: New Section added to define National Nodal Agency for Critical Information Infrastructure
protection.
70B Indian Computer Emergency Response Team to be the nodal agency for incident response.
77 77A; New Section introduced to provide for Compounding of offences with punishment upto 3 years.
77B: New Section introduced to consider all offences with 3 years imprisonment under the Act as
"Cognizable" and bailable.
Section No Changes Made
78 Power to investigate any cognizable offence vested with Inspectors instead of DSPs
Modified to slightly shift the onus of proving liability on the prosecution. Otherwise no significant
79
change.
79 A: New Section introduced to provide for the Government to designate any government body as
an Examiner of Electronic Evidence
80 The powers earlier available to DSP is now made available to Inspectors
81 Amended to keep the primacy of Copyright and Patent acts above ITA 2000