ABSTRACT
A new field of criminal activity known as cybercrime has emerged as a result of the quick development of digital technology. This research paper examines the Indian judicial system in depth, with an emphasis on how well it addresses the many problems that cybercrimes present. The foundation of India’s cybercrime legislation is the Information Technology Act, 2000. The Act’s relevance, breadth, and efficacy must nevertheless be critically examined, given the rapidly changing nature of technology and cyber threats. The two main goals of this study are to evaluate the effectiveness of current legal provisions in preventing different types of cybercrimes like hacking, online fraud, identity theft, and data breaches, as well as to identify the inherent difficulties and potential areas for legal framework improvement. The study examines significant revisions to the Information Technology Act, notably those that were implemented in 2008, and critically assesses their effect on countering current cyberthreats. The paper highlights the difficulties caused by the quickening rate of technical development, which frequently lags behind legal adaptation. Lack of public knowledge, the complexities of foreign jurisdiction, and the technical difficulty of investigations all contribute to the issue’s aggravation. The report identifies situations where the legal system has been successful and unsuccessful in prosecuting cybercriminals by looking at case studies and comparative analysis. This study report provides a thorough evaluation of the Indian judicial system’s efficiency in combating cybercrimes in its conclusion. The study adds to the continuing discussion about cybersecurity law and its suitability for the rapidly changing digital world by outlining its merits, limitations, and potential areas for change.
KEYWORDS
Indian legal framework, cybercrime , information technology act, cyber law, online fraud
INTRODUCTION
A computer is a device that stores and processes information according to user instructions. The Internet, or cyberspace, has made it simpler and more efficient to transfer data and information between various networks. Internet technology is used for a variety of tasks, including online business and online purchases. The bulk of computer users have been using them for years, whether for personal or professional reasons. As a result, administrators now have a lot of anxiety about security-related concerns. As a result, “Cyber Crimes” were born. Thus, crimes committed utilising computers or computer networks, which typically occur online, particularly on the Internet, can be referred to as cybercrimes. Cybercrimes are, in the simplest sense, offences committed through electronic communications or information systems. Cybercrime, which encompasses a wide range of illegal activities, is characterised by the utilisation of digital technologies, computer networks, and the internet. Criminals exploit these tools as instruments, targets, or platforms to facilitate their unlawful endeavours. The term encompasses offences committed through the use of computers, networks, or electronic devices, thus creating a broad scope for unlawful behaviour in the digital realm. A cybercriminal possesses the ability to utilise a device in order to either render another device inoperable or gain unauthorised access to personal information, sensitive corporate data, and even government data included within the realm of cybercrime is the illicit sale of private data or information without the explicit consent of its owner. Individuals who engage in such illegal activities are commonly known as hackers. In addition to the classification of cybercrimes, other terms used to describe electronic crimes encompass e-crimes, computer-related crimes, high-tech crimes, digital crimes, and crimes of the new age. It must be acknowledged that cybercrime has inflicted significant harm upon individuals, businesses, and even governmental entities in the contemporary era.
RESEARCH METHODOLOGY
For the purpose of this study, a comprehensive review of existing materials was conducted, primarily relying on secondary sources. These sources, gathered from various web platforms, provided valuable data for the descriptive nature of the research. By delving into these pre-existing materials, the study was able to obtain a thorough understanding of the topic at hand.
REVIEW OF LITERATURE
A new field of criminal activity known as cybercrime has emerged as a result of the quick development of digital technology. The two main goals of this study are to evaluate the effectiveness of current legal provisions in preventing different types of cybercrimes like hacking, online fraud, identity theft, and data breaches, as well as to identify the inherent difficulties and potential areas for legal framework improvement. The study examines significant revisions to the Information Technology Act, notably those that were implemented in 2008, and critically assesses their effect on countering current cyberthreats. This study report provides a thorough evaluation of the Indian judicial system’s efficiency in combating cybercrimes in its conclusion. The paper emphasises the challenges brought on by the accelerating pace of technological advancement, which frequently lags behind legislative adaptation. By using case studies and comparative research, the paper pinpoints instances when the judicial system has succeeded and failed in bringing cybercriminals to justice. In its conclusion, this study report offers a complete assessment of the Indian legal system’s effectiveness in preventing cybercrimes. By highlighting its benefits, drawbacks, and potential areas for improvement, the report contributes to the ongoing debate concerning cybersecurity law and its applicability in the continuously evolving digital world.
WHAT DO YOU MEAN BY CYBER CRIME ?
Cybercrimes can be defined as: “Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including chat rooms, emails, notice
boards and groups) and mobile phones”. Cybercrime can be characterised as any illicit activity involving a computer and a network. These offences exploit the capabilities of modern technology and with the emergence of the Internet, a new era of criminal activity was introduced as criminals began utilising the digital space to carry out their illicit actions. Internet crime, which manifests in various forms, has become increasingly prevalent due to the widespread accessibility of the Internet to individuals from diverse backgrounds. Unlike the older generation of Internet users, some criminals have grown up with a deep understanding of this information superhighway. While some online crimes are widely reported, others remain concealed until they are perpetrated against individuals or businesses. This highlights the multifaceted nature of Internet crime and its challenges to law enforcement agencies and individuals alike. Thus the term cybercrime cannot be described in a single definition. It is a crime that involves commission through a computer and a network. “It constitutes committing a crime such as hacking, phishing, child pornography, spoofing, and web jacking, etc. in simple terms we can delineate that “cybercrime” as the crimes and offences that occur over electronic communications or information systems”[1]. “The term “cyber law” refers to the body of law that addresses concerns arising out of the use of digital technologies such as the internet, computers, software, hardware, and information systems”[2].
TYPES OF CYBER CRIME:
- CYBERSTALKING: “Cyberstalking is a crime committed when someone uses the internet and other technologies to harass or stalk another person online”[3]. Although the word “cyberstalking” is used broadly to refer to online harassment, it can also involve serious threats, defamation, and false charges. Even when the receiver asks the individual to stop, these connections frequently continue. The target is regularly given inappropriate and even upsetting stuff, which makes them start to feel afraid.
- CYBER PORNOGRAPHY: It poses a serious risk to the safety of women and children since it entails posting or sending pornographic content online that can be promptly replicated on a variety of different technological devices. It alludes to how sexual content is portrayed online.
- CYBER MORPHING: This type of crime involves the alteration of the original image by an unauthorised user or someone using a false identity. Female users’ profile photos are obtained, edited, and then uploaded by bogus identities on other websites for sexual reasons. Criminals are encouraged to perpetrate such horrible acts since consumers are not aware of the situation. “Cyber morphing or Cyber obscenity is punishable under section 43 and 66 of Information Act 2000”
- CYBER BULLYING: Cyberbullying is the use of the internet to humiliate or shame someone by sending, uploading, or distributing damaging or deceptive material using digital devices such computers, tablets, laptops, and mobile phones. It can occur through social media platforms, online forums, online gaming groups, SMS, or other online information exchange channels that are accessible to a wide audience. The online reputation of not just the victim but also the persons involved can be harmed by cyberbullying since it is persistent and lasting.
- ONLINE TROLLING: It is a type of cyberbullying that takes place on public social media sites where users are free to express themselves. Targets of online harassment are frequently those who disagree with the established society standards and voice their ideas. The majority of the women in this section are the victims of cyberbullying.
DIFFERENT CYBER LAWS IN INDIA
Cyberspace must be governed by rigorous laws that can deter illegal activity, slow down the growth of the internet, and punish offenders. By ensuring maximum connection and reducing security concerns, India’s cyber laws have contributed to the country’s success in electronic commerce and government. To handle different facets of cybersecurity and cybercrime, India has passed a number of laws. These laws set down the guidelines, sanctions, and processes for handling cyber-related offences. Among India’s most important cyber laws are:
- The Information Technology Act (IT Act), which was passed in 2000, is the main piece of law in India that addresses cybercrimes. It covers a range of offences relating to internet fraud, identity theft, hacking, unauthorised access, and data breaches. A complete framework for regulating digital transactions and communications, it also offers legal recognition for electronic signatures and digital documents.
- Act of 2008 amending the IT: The purpose of this modification is to strengthen the requirements of the IT Act to confront new cyber threats. It also enhanced punishments for several cybercrimes and established new offences such as cyberterrorism, the dissemination of sexually explicit content, and unauthorized electronic communication interception.
- Indian Penal Code, 1860 (IPC): The IPC has various sections that deal with offences connected to cyber activity, albeit they are not only focused on cybercrimes. Sections 419, 420, 465, 468, and 471, for instance, deal with fraud, forgery, and counterfeiting, which may also happen in cyberspace.
- The Copyright Act of 1957: This legislation safeguards intellectual property, including copyrighted content in digital form. It tackles problems with online copyright infringement, digital piracy, and unlicensed copying and distribution of protected works.
- National Cyber Security Policy of 2013: This policy, which does not constitute law in and of itself, describes how the Indian government intends to deal with cyber threats and improve cybersecurity measures. It places a strong emphasis on spreading cybersecurity awareness and protecting vital information infrastructure.
- Draught 2019 Personal Data Protection Bill: This measure, which has not yet taken effect as of my most recent update in September 2021, attempts to control how personal data is gathered, stored, and used in India. It places demands on businesses managing personal data and focuses on protecting the privacy of people’ data.
The combination of these laws creates India’s legal framework for combating cybercrimes and safeguarding cybersecurity. It’s crucial to keep in mind that the legal system is subject to change.
THE INFORMATION TECHNOLOGY ACT, 2000
The Indian Parliament’s two chambers approved the Information Technology Bill in May 2000. The IT Act of 2000 was created after the President gave his approval to the bill in August 2000. The IT Act, 2000, and its amendments contain provisions for cyber legislation. The purpose of this Act is to set up the legal framework for online shopping in India. Additionally, the cyber regulations significantly affect India’s new economy and e-businesses. Therefore, it’s critical to comprehend the IT Act of 2000’s many views and what it has to offer. The legislation offers a regulatory framework for online trade in India. It focuses on and addresses electronic commerce and digital crimes, sometimes known as cybercrimes. The legislation was put into effect to update certain outdated rules and expand the scope of what constitutes criminal activity online. These laws have addressed a number of issues, including network service provider liability, digital (electronic) signatures, cybercrimes, and electronic authentication. The Information Technology Amendment Bill of 2008 also amended the law. The Indian Penal Code of 1860 and the Indian Evidence Act of 1872 were amended by the IT Act of 2000 to take into account the rapidly advancing technological advances.
ADVANTAGES OF CYBER LAWS
The IT Act of 2000 aims to update outmoded legislation and provide countermeasures for cybercrimes. Such restrictions are required so that individuals may safely use their credit cards to make purchases online. In order to prevent information from being denied legal effect, validity, or enforceability only because it is in the form of electronic records, the Act provides the crucial legal foundation.In view of the advancement of transactions and interactions done through electronic records, the Act is aimed at giving government agencies the right to accept filing, creating, and maintaining official documents in digital format. The Act additionally suggests a framework for the legal authentication and provenance of electronic documents and communications through the use of digital signatures.
The IT Act, 2000, and its provisions have several advantages from an Indian e-commerce standpoint. First, these laws would make email a legitimate and legal form of communication in our nation, one that can be properly produced and authorised in a court of law, which would have repercussions for e-businesses. Using the framework set up by the Act’s legal provisions, businesses will now be permitted to conduct electronic commerce. In the Act, legal legitimacy and sanction are granted to digital signatures. The Act makes it possible for corporate entities to enter the field of becoming a Certifying Authority for the purpose of providing Digital Signature Certificates.
THE LEGAL FRAMEWORK
The Internet has two distinguishing qualities. The first is that it is not geographically limited and that a cybercriminal may operate from anywhere in the world. Its users’ ability to remain anonymous, which has benefits and drawbacks of its own, is the second distinctive attribute. It’s a blessing for those who utilise anonymity to express their opinions to the world, but it’s a curse for those who commit crimes while hiding their identities. Due to these characteristics, law enforcement and crime prevention are both made more difficult. Cybercrime against women is currently not covered by any specific laws. Most women are unaware of additional laws that may apply in this particular circumstance. Women do not understand their rights or that they even exist. Cybercrime is punishable by a number of laws and regulations. The Information Technology Act (IT Act), 2000, and the Indian Penal Code (IPC), however, make up the majority of the legislation. The IPC is India’s general criminal law, which outlines offences as well as their associated penalties. The IPC, which has been legally modified and wisely construed to apply to cybercriminals, deals with laws and punishments related to the physical world. The IT Act, on the other hand, is a particular code that deals with the use of technology and crimes committed with it. The IT Amendment Act, which includes several offences relating to the internet realm, was passed in 2008.
SUGGESTIONS
Being completely anonymous when utilising an online platform is very impossible, thus one should use caution when disclosing any personal information online. It is crucial to keep an eye out for phoney email communications and to avoid responding to emails that request personal information. Additionally, email addresses need to be protected. While engaging in online activities, it is essential to pay attention to privacy regulations on websites and avoid shady websites that are used to steal personal information. Responses to online harassment and abuse of women must be viewed as part of the larger fight against these misdeeds. It is ultimately an issue for the people; hence, broader initiatives should be started. The current need is to keep up with the rate of change. The majority of online crimes occur because consumers are unaware of them and lack the information and awareness to prevent them; therefore, keeping up with technological changes is a problem that must be solved. Media, clubs, groups, and networks must work together to promote women’s leadership and decision-making. This effort must include effective online due diligence, monitoring, and reporting cybercrime.
CONCLUSION
To sum up, we may infer that a rise in cybercrime in recent years has been caused by the development of computer networking and new technology. Knowing the target, the attacker acts maliciously to damage the computer system, steal or destroy data from it, and change the password, hack bank account numbers and credit card numbers, among other crimes, by knowing the victim’s identity, Cybercrimes of all types, such as cyberterrorism, cyber pornography, morphing, forgery, email spoofing, identity theft, etc., have a profoundly harmful impact on society.
Many different internet networking services are used by people nowadays. The protection of such users’ privacy should receive the majority of the focus. Cyberlaw’s main objective is to protect users’ personal information from unauthorised third parties. As the internet has become a necessary component of daily life, many legal and illegal acts have been carried out on computers or other digital sources. The governing body has to adapt by passing new laws that reflect the realities of the digital age as cybercrime gets worse in frequency. What is allowed and prohibited online is governed by cyberlaw. The IT Act of 2000 established a set of laws and guidelines that control cybercrime.
REFERENCES
- A study on cyber crime and its legal framework in India
- Analysis of Indian legal framework for cyber crimes. By Sushmita Anand
https://lawdocs.in/blog/analysis-of-indian-legal-framework-for-cyber-crimes .
3. What is Cyberstalking & How to Prevent it? By Anshuman Singh
https://www.shiksha.com/online-courses/articles/cyberstalking-how-to-prevent-it/ (LAST VISITED – AUGUST 2023)
4. A Study on Cyber Crime and its Legal Framework in India. By Apoorva Bhangla and Jahanvi Tuli.
https://www.ijlmh.com/paper/a-study-on-cyber-crime-and-its-legal-framework-in-india/
Surabhi Jain
CMR University School of Legal Studies
[1] Anand, S., Analysis of Indian Legal Framework for Cyber-Crimes, INRI 2019
[2] Bajaj, A. Analysis of Cyber Law in India, Prime Legal, 2020
[3] Singh, What is Cyberstalking & How to Prevent it? , LexiNexis, 2018
