{"id":17752,"date":"2026-03-24T11:53:15","date_gmt":"2026-03-24T11:53:15","guid":{"rendered":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/?p=17752"},"modified":"2026-03-29T11:37:21","modified_gmt":"2026-03-29T11:37:21","slug":"cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide","status":"publish","type":"post","link":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/","title":{"rendered":"Cybercrime in India: Laws, Examples, Prevention &amp; IT Act Explained (2026 Guide)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"introduction-to-cybercrime\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span>Introduction<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cybercrime is defined as criminal activity carried out via computer networks, digital devices, or the internet. Financial fraud and data breaches, as well as cyberbullying and hacking, are examples of criminal acts. Cybercriminals utilise technology as a tool to perpetrate a variety of crimes, generally for financial gain, to cause harm, or to steal sensitive information.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0c0c0c;color:#0c0c0c\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0c0c0c;color:#0c0c0c\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Introduction\" >Introduction<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Examples_Of_Cybercrime\" >Examples Of Cybercrime<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Preventive_Measures_Against_Cybercrime\" >Preventive Measures Against Cybercrime<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Legal_Framework\" >Legal Framework<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Relevant_Sections_Under_The_IT_Act\" >Relevant Sections Under The IT Act<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Applicability_Of_IPC_To_Cybercrime\" >Applicability Of IPC To Cybercrime<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Challenges\" >Challenges<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Another_Challenge_Is_The_Ever-Evolving_Nature_Of_Technology\" >Another Challenge Is The Ever-Evolving Nature Of Technology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Furthermore_There_Are_Ethical_Considerations_Surrounding_Privacy_Invasion\" >Furthermore, There Are Ethical Considerations Surrounding Privacy Invasion<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Solutions\" >Solutions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Law_Enforcement_Agencies_Need_To_Strengthen_Their_Efforts\" >Law Enforcement Agencies Need To Strengthen Their Efforts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Another_Solution_Lies_In_Fostering_Public-Private_Partnerships\" >Another Solution Lies In Fostering Public-Private Partnerships<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Individuals_Must_Take_Personal_Responsibility_For_Their_Online_Safety\" >Individuals Must Take Personal Responsibility For Their Online Safety<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-in-india-laws-examples-prevention-it-act-explained-2026-guide\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"examples-of-cybercrime\"><span class=\"ez-toc-section\" id=\"Examples_Of_Cybercrime\"><\/span>Examples Of Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Examples of frequent cybercrimes include hacking, phishing, malware, online fraud, identity theft, data breaches, cyber-bullying, and so on. Cybercrime is a developing global phenomenon, posing substantial hurdles for law enforcement, corporations, and individuals.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hacking<\/li>\n\n\n\n<li>Phishing<\/li>\n\n\n\n<li>Malware<\/li>\n\n\n\n<li>Online Fraud<\/li>\n\n\n\n<li>Identity Theft<\/li>\n\n\n\n<li>Data Breaches<\/li>\n\n\n\n<li>Cyber-bullying<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"preventive-measures-against-cybercrime\"><span class=\"ez-toc-section\" id=\"Preventive_Measures_Against_Cybercrime\"><\/span>Preventive Measures Against Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Individuals and organisations must take precautions to safeguard their digital assets, such as adopting strong passwords, keeping software up to date, and being wary of phishing attempts. Furthermore, governments and law enforcement agencies are always working to draft and implement rules and regulations to prevent cybercrime and prosecute cybercriminals.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adopting strong passwords<\/li>\n\n\n\n<li>Keeping software up to date<\/li>\n\n\n\n<li>Being cautious of phishing attempts<\/li>\n\n\n\n<li>Implementing cybersecurity policies<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"legal-framework-for-cybercrime-in-india\"><span class=\"ez-toc-section\" id=\"Legal_Framework\"><\/span>Legal Framework<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Information Technology Act, 2000 is the primary legislation in India that addresses cybercrimes. It provides a legal framework for electronic transactions, digital signatures, and data protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"relevant-sections-under-it-act\"><span class=\"ez-toc-section\" id=\"Relevant_Sections_Under_The_IT_Act\"><\/span>Relevant Sections Under The IT Act<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Relevant sections under the IT Act include:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Section<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Section 43<\/td><td>Deals with unauthorized access and damage to computer systems.<\/td><\/tr><tr><td>Section 65<\/td><td>Addresses tampering with computer source documents.<\/td><\/tr><tr><td>Section 66<\/td><td>Pertains to computer-related offenses like hacking.<\/td><\/tr><tr><td>Section 66A (Repealed)<\/td><td>Previously covered offensive communication, but it was struck down by the Supreme Court in 2015 on grounds of vagueness and overbreadth.<\/td><\/tr><tr><td>Section 66B<\/td><td>Deals with dishonestly receiving stolen computer resources or communication devices.<\/td><\/tr><tr><td>Section 66C &amp; 66D<\/td><td>Address identity theft and cheating by personation using computer resources.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"applicability-of-ipc-to-cybercrime\"><span class=\"ez-toc-section\" id=\"Applicability_Of_IPC_To_Cybercrime\"><\/span>Applicability Of IPC To Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In addition to the IT Act, several provisions in the Indian Penal Code apply to cybercrimes, such as defamation, forgery, and fraud when committed online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"challenges-of-cybercrime\"><span class=\"ez-toc-section\" id=\"Challenges\"><\/span>Challenges<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>One of the key issues surrounding cybercrimes is the difficulty in identifying and apprehending perpetrators. Unlike traditional crimes where physical evidence can be collected, cybercrimes often leave digital footprints that can be easily manipulated or erased. This makes it challenging for investigators to trace the source and gather sufficient evidence for prosecution.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Difficulty in identifying perpetrators due to lack of physical evidence<\/li>\n\n\n\n<li>Digital footprints can be manipulated or erased<\/li>\n\n\n\n<li>Challenges in tracing source and collecting admissible evidence<\/li>\n<\/ul>\n\n\n\n<p>Moreover, cybercriminals often operate across international borders, making it even more complex to coordinate efforts across jurisdictions.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cross-border cybercrime operations<\/li>\n\n\n\n<li>Jurisdictional limitations<\/li>\n\n\n\n<li>Need for international coordination<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"technological-evolution-challenges\"><span class=\"ez-toc-section\" id=\"Another_Challenge_Is_The_Ever-Evolving_Nature_Of_Technology\"><\/span>Another Challenge Is The Ever-Evolving Nature Of Technology<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Another challenge is the ever-evolving nature of technology. As technology advances at an unprecedented pace, so do the methods employed by cybercriminals. They constantly adapt their tactics to exploit new vulnerabilities and bypass security measures put in place by individuals and organizations alike. This requires constant vigilance and up-to-date knowledge to effectively combat these crimes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rapid technological advancements<\/li>\n\n\n\n<li>Constant evolution of cybercriminal tactics<\/li>\n\n\n\n<li>Exploitation of new vulnerabilities<\/li>\n\n\n\n<li>Need for continuous updates and vigilance<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"privacy-and-ethical-concerns\"><span class=\"ez-toc-section\" id=\"Furthermore_There_Are_Ethical_Considerations_Surrounding_Privacy_Invasion\"><\/span>Furthermore, There Are Ethical Considerations Surrounding Privacy Invasion<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Furthermore, there are ethical considerations surrounding privacy invasion in cases related to cybercrime investigations. Balancing individuals\u2019 rights with the need to prevent and investigate cybercrimes is a delicate task. The use of surveillance and data collection methods raises concerns about potential abuse or misuse of personal information.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Privacy vs. security concerns<\/li>\n\n\n\n<li>Ethical challenges in surveillance<\/li>\n\n\n\n<li>Risk of misuse of personal data<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"solutions-to-cybercrime\"><span class=\"ez-toc-section\" id=\"Solutions\"><\/span>Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Raising awareness about cybercrime is crucial in preventing and reducing its occurrence. Educational campaigns should be conducted to inform individuals about the various types of cyber threats and how to protect themselves online. This includes teaching basic cybersecurity practices such as using strong passwords, being cautious of suspicious emails or links, and regularly updating software.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber awareness campaigns<\/li>\n\n\n\n<li>Education on online threats<\/li>\n\n\n\n<li>Promotion of basic cybersecurity practices<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"strengthening-law-enforcement\"><span class=\"ez-toc-section\" id=\"Law_Enforcement_Agencies_Need_To_Strengthen_Their_Efforts\"><\/span>Law Enforcement Agencies Need To Strengthen Their Efforts<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Law enforcement agencies need to strengthen their efforts in investigating and prosecuting cybercriminals. This requires specialized training for personnel to effectively handle cybercrime cases. Additionally, international cooperation among law enforcement agencies is essential as cybercriminals often operate across borders.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Specialized cybercrime training<\/li>\n\n\n\n<li>Improved investigation techniques<\/li>\n\n\n\n<li>Enhanced international cooperation<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"public-private-partnerships\"><span class=\"ez-toc-section\" id=\"Another_Solution_Lies_In_Fostering_Public-Private_Partnerships\"><\/span>Another Solution Lies In Fostering Public-Private Partnerships<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Another solution lies in fostering public-private partnerships in combating cybercrime. Collaboration between government agencies and private organizations can help in sharing information, improving technologies, and preventing cyber threats. Sharing intelligence on emerging threats can help both sectors stay ahead of criminals.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collaboration between government and private sector<\/li>\n\n\n\n<li>Information and intelligence sharing<\/li>\n\n\n\n<li>Improved cybersecurity technologies<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"individual-responsibility-cyber-hygiene\"><span class=\"ez-toc-section\" id=\"Individuals_Must_Take_Personal_Responsibility_For_Their_Online_Safety\"><\/span>Individuals Must Take Personal Responsibility For Their Online Safety<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Individuals must take personal responsibility for their online safety by adopting good cyber hygiene practices. Regularly updating antivirus software, avoiding suspicious websites or downloads, and backing up important data regularly are simple steps that everyone can take to protect themselves from becoming victims of cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use of updated antivirus software<\/li>\n\n\n\n<li>Avoidance of suspicious websites and downloads<\/li>\n\n\n\n<li>Regular data backups<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion-on-cybercrime\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cybercrime is a major threat in today\u2019s digital landscape. While the country has made progress in developing a legislative framework and combating cybercrime, issues related to jurisdiction, technological complications, and anonymity remain.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Key Issues<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Jurisdiction<\/td><td>Cross-border challenges in enforcement<\/td><\/tr><tr><td>Technology<\/td><td>Rapid evolution and complexity<\/td><\/tr><tr><td>Anonymity<\/td><td>Difficulty in identifying offenders<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>To effectively combat cybercrime, a multifaceted approach involving law enforcement agencies, the legal system, technological advancements, and public awareness programs is required. Striking a balance between cyber security and individual rights is an ongoing challenge in the battle against cybercrime.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Award-Winning Article Written By: Mr.Rupesh Chauhan<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"\/images\/certificate-excellence-legal-service-india.webp\" alt=\"Certificate of Excellence awarded by Legal Service India\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Authentication No: MAR608692182646-27-0326<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Cybercrime is defined as criminal activity carried out via computer networks, digital devices, or the internet. Financial fraud and data breaches, as well as cyberbullying and hacking, are examples of criminal acts. Cybercriminals utilise technology as a tool to perpetrate a variety of crimes, generally for financial gain, to cause harm, or to steal<\/p>\n","protected":false},"author":1291,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"_joinchat":[],"footnotes":""},"categories":[66],"tags":[5277,28],"class_list":{"0":"post-17752","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-law","7":"tag-cyber-law","8":"tag-top-news"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/17752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/users\/1291"}],"replies":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/comments?post=17752"}],"version-history":[{"count":0,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/17752\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/media?parent=17752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/categories?post=17752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/tags?post=17752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}