Unit IV
Unit IV
3. E-Mails that are defamatory in nature are punishable under Section 500 of the Indian
Penal Code (IPC) that recommends an imprisonment of upto 2 years or a fi ne or both.
4. Threatening E -Mails are punishable u nder the provisions of the IPC pertaining to
criminal intimidation, insult and annoyance (CHAPTER XXII) and extortion (CHAPTER XVII).
5. E-Mail spoofing is covered under provisions of the IPC with regard to fraud, cheating by
personation (CHAPTER XVII) and forgery (CHAPTER XVIII).
UNIT-III Cyber Law
The Indian ITact.
Weak Areas of the ITA 2000
As mentioned before, there are limitations too in the IT Act; those are mainly due to the
following gray areas:
1. The ITA 2000 is likely to cause a conflict of jurisdiction.
2. E-Commerce is based on the system of domain names. The ITA 2000 does not even touch
the issues relating to domain names. Domain names have not been defi ned and the rights
and liabilities of domain name owners do not find any mention in the law. The law does not
address the rights and liabilities of domain name holders.
3. The ITA 2000 does not deal with issues concerning the protection of Intellectual Property
Rights (IPR) in the context of the online environment. Contentious yet very important issues
concerning online copyrights, trademarks and patents have been left untouched by the law,
thereby leaving many loopholes. Thus, the law lacks “Proper Intellectual Property Protection
for Electronic Information and Data” – the law misses out the issue of IPR, and makes no
provisions whatsoever for copyrighting, trade marking or patenting of electronic information
and data. However, the corresponding provisions are available under the Indian Copyright
Act.
UNIT-III Cyber Law
The Indian ITact.
Weak Areas of the ITA 2000
4. As the cyberlaw is evolving, so are the new forms and manifestations of cybercrimes. The
offenses defined in the ITA 2000 are by no means exhaustive. However, the drafting of the
relevant provisions of the ITA 2000 makes it appear as if the offenses detailed therein are
the only cyberoffenses possible and existing. The ITA 2000 does not cover various kinds of
cybercrimes and Internet-related crimes.
These include:
• Theft of Internet hours;
• cybertheft;
• cyberstalking;
• cyberharassment;
• cyberdefamation;
• cyberfraud;
• misuse of credit card numbers;
• chat room abuse;
• cybersquatting (not addressed directly).
UNIT-III Cyber Law
The Indian ITact.
Weak Areas of the ITA 2000
5 . The ITA 2000 has not tackled vital issues pertaining to E-Commerce sphere like privacy
and content regulation to name a few.
6. The Information Technology Act is not explicit about regulation of Electronic Payments,
and avoids applicability of IT Act to Negotiable Instruments. The Information Technology Act
stays silent over the regulation of electronic payments gateway and rather segregates the
negotiable instruments from the applicability of the IT Act. This may have major eff ect on
the growth of E-Commerce in India.
This has led to tendencies of banking and financial sectors being irresolute in their stands.
7. IT Act does not touch upon antitrust issues.
8. The most serious concern about the Indian Cyberlaw relates to its implementation. The
ITA 2000 does not lay down parameters for its implementation. Also, when Internet
penetration in India is extremely low and government and police officials, in general, are not
very computer savvy, the new Indian cyberlaw raises more questions than it answers. It
seems that the Parliament would be required to amend the ITA 2000 to remove the gray
areas mentioned above.
Challenges to Indian Law
No procedural rules: There are no separate rules of procedure for investigating cybercrime or computer
crime.
Electronic evidence is very different from traditional criminal evidence, so it is essential to establish
standardized and consistent procedures for handling electronic evidence.
Shortage of technical staff: There are minimal efforts by states to recruit technical personnel to investigate
cybercrime.
A regular police officer with a background in humanities and business administration may not understand the
nuances of how computers and the Internet work.
Additionally, the Information Technology (IT) Act of 2000 maintains that offences registered under the Act
should be investigated by police officers, not below the rank of inspector. In practice, the number of police
inspectors in the district is limited and most field investigations are conducted by deputy inspectors.
Lack of Infrastructure – Cyber labs: State cyber forensics labs need to be upgraded as new technologies
emerge. Cryptocurrency-related crime continues to be underreported due to the limited ability to solve such
crimes. Most government cyber labs are well equipped to analyze hard drives and mobile phones, but many still
employ “electronic evidence examiners” so they can provide an expert opinion on electronic records. Not
specified.
Need for localization: Most cybercrime is transnational and extraterritorial. Collecting evidence from foreign
territories is not only a difficult but time-consuming process. Other than the immediate suspension of
objectionable websites and accounts of suspects in most social media crimes, other details are not readily
available from big tech companies.
Therefore, “data localization” should be included in the proposed Personal Data Protection Act to ensure law
enforcement agencies have timely access to suspected data of Indian citizens.
Cybercrime Scenario in India
According to Joseph Aghatise, cybercrime is a crime committed on the Internet using a computer either as a
tool or as a targeted victim. It is very difficult to categorize crimes into different groups because many
crimes evolve daily. Even in the real world, crimes such as rape, murder, or theft do not necessarily need to
be separated. However, in all cybercrimes, both the computer and the person behind it are victims; it just
depends on which of the two is the main target. Therefore, the computer can be a target or a tool for
simplicity. Hacking, for example, involves attacking the computer's information and other resources. It is
important to note that in many cases, there is overlap, and it is impossible to have a perfect classification
system.
Verizon's[iv] 2016 annual report, titled "Data Breach Investigations Report," lists industry-related incidents
and security breaches. According to the report, "89 percent of data breaches had a financial or espionage-
related purpose."When individuals suffer harm, the impact is felt the most, especially when the hard road of
international enforcement is taken. The vastness of cyberspace makes enforcement even more difficult.
According to a report by the Ministry of Electronics and Information Technology (MeitY) submitted to a
parliamentary subcommittee, cybercrime and fraud cases increased more than fivefold between 2018 and
2021. According to data from India's Computer Emergency Response Team (Cert-In), the total number of
incidents increased from 208,456 in 2018 to 1,402,809 in 2021, so according to these figures, cybercrime in
India has increased by 572% in just 3 years.
Important steps were taken by the Government:
Information Act 2000: The Information Act, of 2000 is the primary law to combat cybercrime and digital
commerce in India.
National Cyber Security Policy, 2013: This policy provides a vision and strategic direction for protecting the
nation’s cyberspace.
CERT-In (Cyber Emergency Response Team – India): CERT-In has been operational since 2004. It is a national
focal point for immediate response to computer security incidents as they occur.
India’s Cyber Crime Coordination Center (I4C): A comprehensive and coordinated response to all types of
cybercrime. Cyber Swachhta Kendra: Launched in early 2017, Cyber Swachhta Kendra provides users with a
platform to analyze and clean their systems from various viruses, bots/malware, Trojans, etc.
Cyber S
uraksit Bharat: The Ministry of Electronics and Information Technology launched the Cyber Surakshit
Bharat initiative to raise awareness of cybercrime and build the security response capabilities of the Chief
Information Security Officer (CISO) of all government departments and his IT staff on the front lines.
Cyber Warrior Police: In 2018, the government announced plans to implement his CWPF. It is proposed to be
brought under the guidelines of the Central Armed Police Force (CAPF).
Cybercrime prevention programs for women and children: The program, run by the Ministry of Home Affairs,
aims to prevent and reduce cybercrime against women and children.
Digital signatures and Indian IT Act
Unveiling the Digital Handshake:
A Secure E-Seal: A DS is an encrypted fingerprint attached to your electronic document, verifying your
identity and ensuring its integrity. It's like your unique digital handshake, sealing the deal with
security and authenticity.
Legal Recognition: The IT Act, 2000 grants legal equivalence to DSs issued by licensed Certifying
Authorities (CAs), like eMudhra. This means your online signature carries the same legal weight as its
ink-stained counterpart.
Admissibility in Court: Documents signed with valid DSs are admissible as evidence in Indian courts,
making them legally binding and enforceable. So, your e-agreement stands just as tall as any
traditional contract.
o 137 out of 194 countries had put in place legislation to secure the
protection of data and privacy.
o Africa and Asia show different level of adoption with 61 and 57 per
cent of countries having adopted such legislations.
Source:
European Union (EU)
The Evolving Landscape of European Data Privacy Laws
General Data Protection Regulation (GDPR)
Data Governance Act (DGA)
ePrivacy Directives
ePrivacy Regulation
Digital Markets Act
Digital Services Act
The Draft Data Act
European Health Data Space (EHDS)
Artificial Intelligence Regulation
Council of Europe (CoE)
Guidance Note on Data Privacy, Ethics and Protection for the United Nations Development Group
(UNDG)
United Nations High Commission on Human Rights’ resolution on The Right to Privacy in the
Digital Age
US
American Data Privacy and Protection Bill,
UK
California Privacy Rights Act (2020), Consumer Data
Protection Act (Virginia), Utah Consumer Privacy Act
(UCPA), Connecticut Privacy Act, Colorado Privacy • Data Protection Act 2018
Act, (CPA), Children’s Online Privacy Protection Bill
• Online Safety Bill
China
India