{"id":21868,"date":"2026-04-12T08:25:08","date_gmt":"2026-04-12T08:25:08","guid":{"rendered":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/?p=21868"},"modified":"2026-04-12T08:27:43","modified_gmt":"2026-04-12T08:27:43","slug":"cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained","status":"publish","type":"post","link":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/","title":{"rendered":"Cybercrime and Cyber Laws in India: IT Act, Offences, Cases &amp; Legal Framework Explained"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"introduction\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span>Introduction<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A man was discovered from a fauna creature that further evolved to be a human being. From fire to ovens, from animal skins to passable clothing, we are the revolutionaries of materialized things turning coal into diamonds with our cognitive capabilities. From advancing as an ape to a human, time passed by with the evolution of creativity.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0c0c0c;color:#0c0c0c\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0c0c0c;color:#0c0c0c\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Introduction\" >Introduction<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Evolution_Of_Human_Society\" >Evolution Of Human Society<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Social_Norms_And_Regulation\" >Social Norms And Regulation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Human_Desires_And_Crime\" >Human Desires And Crime<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Rise_Of_Cybercrime\" >Rise Of Cybercrime<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Legal_Framework_For_Cyber_Laws\" >Legal Framework For Cyber Laws<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Impact_Of_Cybercrime\" >Impact Of Cybercrime<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#What_Is_Cybercrime\" >What Is Cybercrime?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Definition_And_Scope_Of_Cybercrime\" >Definition And Scope Of Cybercrime<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Types_Of_Cybercrimes\" >Types Of Cybercrimes<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Need_For_Cyber_Laws\" >Need For Cyber Laws<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Scope_Of_Cyber_Laws\" >Scope Of Cyber Laws<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Key_Components_Of_Cyber_Laws\" >Key Components Of Cyber Laws<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Information_Technology_Act_2000_IT_Act_Overview_of_the_Act\" >Information Technology Act, 2000 (IT Act): Overview of the Act<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Important_Provisions_of_the_Act\" >Important Provisions of the Act<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_43_Cybercrime_and_Compensation\" >Section 43: Cybercrime and Compensation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_66_Computer-Related_Offences\" >Section 66: Computer-Related Offences<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_66B_Receiving_Stolen_Computer_Resources\" >Section 66B: Receiving Stolen Computer Resources<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_66C_Identity_Theft\" >Section 66C: Identity Theft<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_66D_Cheating_by_Impersonation\" >Section 66D: Cheating by Impersonation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_66E_Violation_of_Privacy\" >Section 66E: Violation of Privacy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_67_Publishing_Obscene_Content\" >Section 67: Publishing Obscene Content<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Summary_Table_of_Key_Sections\" >Summary Table of Key Sections<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#IPC_BNS_2023_Provisions_Applicable_To_Cybercrime\" >IPC (BNS 2023) Provisions Applicable To Cybercrime<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_292_Section-294_Of_BNS\" >Section 292 (Section-294 Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_354C_Section-77_Of_BNS\" >Section 354C (Section-77 Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_354D_Section-78_Of_BNS\" >Section 354D (Section-78 Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_379_Section-303_Of_BNS\" >Section 379 (Section-303 Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_420_Section-3184_Of_BNS\" >Section 420 (Section-318(4) Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_463_Section-3361_Of_BNS\" >Section 463 (Section-336(1) Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_465_Section-3362_Of_BNS\" >Section 465 (Section-336(2) Of BNS)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Section_468_Section-3363_Of_BNS\" >Section 468 (Section-336(3) Of BNS)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Overlap_Between_IPC_BNS_2023_And_IT_Act\" >Overlap Between IPC (BNS 2023) And IT Act<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Key_Differences\" >Key Differences<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Lacunae_In_Cyber_Law\" >Lacunae In Cyber Law<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Landmark_Cases\" >Landmark Cases<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#An_Overview_Of_Cybercrime\" >An Overview Of Cybercrime<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Webs_Inception_And_The_Commencement_Of_A_New_Era_For_Cybercrime\" >Web&#8217;s Inception And The Commencement Of A New Era For Cybercrime<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Rise_Of_Phishing_Attacks\" >Rise Of Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Growth_Of_Identity_Theft\" >Growth Of Identity Theft<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Cybercrime_In_A_Quick-Changing_Technological_Environment\" >Cybercrime In A Quick-Changing Technological Environment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Evolving_Nature_Of_Cyber_Threats\" >Evolving Nature Of Cyber Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-43\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Cybercrime_Statistics_In_India\" >Cybercrime Statistics In India<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-44\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Year-Wise_Cyber_Security_Incidents_In_India\" >Year-Wise Cyber Security Incidents In India<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-45\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Types_Of_Cyber_Attacks\" >Types Of Cyber Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-46\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Web-Based_Attacks\" >Web-Based Attacks<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-47\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Injection_Attacks\" >Injection Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-48\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#DNS_Spoofing\" >DNS Spoofing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-49\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Session_Hijacking\" >Session Hijacking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-50\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Phishing\" >Phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-51\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Brute_Force\" >Brute Force<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-52\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Denial_Of_Service\" >Denial Of Service<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-53\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Dictionary_Attacks\" >Dictionary Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-54\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#URL_Interpretation\" >URL Interpretation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-55\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#File_Inclusion_Attacks\" >File Inclusion Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-56\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Man_In_The_Middle_Attacks\" >Man In The Middle Attacks<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-57\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#System-Based_Attacks\" >System-Based Attacks<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-58\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Virus\" >Virus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-59\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Worm\" >Worm<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-60\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Trojan_Horse\" >Trojan Horse<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-61\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Backdoors\" >Backdoors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-62\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Bots\" >Bots<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-63\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Vulnerability_Threat_Harmful_Acts\" >Vulnerability, Threat, Harmful Acts<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-64\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Cyber_Threats_Vs_Vulnerabilities\" >Cyber Threats Vs Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-65\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Examples_Of_Cyber_Threats\" >Examples Of Cyber Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-66\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Types_Of_Vulnerabilities_In_Network_Security\" >Types Of Vulnerabilities In Network Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-67\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Cyber_Risk_Definition\" >Cyber Risk Definition<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-68\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Computer_Criminals\" >Computer Criminals<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-69\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#CIA_Triad\" >CIA Triad<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-70\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#CIA_Triad_Broken_Down\" >CIA Triad Broken Down<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-71\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Confidentiality\" >Confidentiality<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-72\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Common_Methods_To_Manage_Confidentiality\" >Common Methods To Manage Confidentiality<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-73\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Assets_And_Threat\" >Assets And Threat<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-74\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#What_Is_An_Asset\" >What Is An Asset<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-75\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Examples_Of_Assets\" >Examples Of Assets<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-76\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#What_Is_A_Threat\" >What Is A Threat<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-77\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Types_Of_Threats\" >Types Of Threats<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-78\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Measures_To_Prevent_Cyber_Crimes\" >Measures To Prevent Cyber Crimes<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-79\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Cyber_Awareness_And_Education\" >Cyber Awareness And Education<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-80\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Financial_Security_Measures\" >Financial Security Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-81\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#System_And_Software_Protection\" >System And Software Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-82\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Password_Security_Best_Practices\" >Password Security Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-83\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Two-Step_Authentication\" >Two-Step Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-84\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Summary_Of_Preventive_Measures\" >Summary Of Preventive Measures<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-85\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Conclusion\" >Conclusion<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-86\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#Bibliography\" >Bibliography<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-87\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/cybercrime-and-cyber-laws-in-india-it-act-offences-cases-legal-framework-explained\/#End-Notes\" >End-Notes:<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"evolution-of-human-society\"><span class=\"ez-toc-section\" id=\"Evolution_Of_Human_Society\"><\/span>Evolution Of Human Society<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Humans formed a group and started to reside together, with arising needs they realized that working and staying together is the only way that can survive in this rough environment.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Group living ensured survival<\/li>\n\n\n\n<li>Cooperation became essential<\/li>\n\n\n\n<li>Communities gradually developed<\/li>\n<\/ul>\n\n\n\n<p>Hence a group of people staying together formed villages and later developed into society. With society, further comes certain norms that needed to be followed to regulate society peacefully and harmoniously.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"social-norms-and-regulation\"><span class=\"ez-toc-section\" id=\"Social_Norms_And_Regulation\"><\/span>Social Norms And Regulation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These norms are constructed to avoid any illicit conduct and wrong in society, and when these rules aren&#8217;t followed then it leads to violation of righteous conduct.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Aspect<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Norms<\/td><td>Rules for peaceful coexistence<\/td><\/tr><tr><td>Violation<\/td><td>Leads to unlawful conduct<\/td><\/tr><tr><td>Purpose<\/td><td>Maintain harmony in society<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Therefore, crime arose out of this non-fulfillment of norms out of unsatisfactory standards of living. Originally, the unfolding of human capabilities to change raw into usage arose out of needs and necessities but later, resultant of human tendency, humans always want more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"human-desires-and-crime\"><span class=\"ez-toc-section\" id=\"Human_Desires_And_Crime\"><\/span>Human Desires And Crime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The aversion inside us of never getting satisfied in what we have desired to live a luxurious life irrespective of limited means. Thus, the gaze of having fairytale lifestyles sometimes lands us into bad perspectives of earning, involving criminal activities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unlimited wants<\/li>\n\n\n\n<li>Limited resources<\/li>\n\n\n\n<li>Desire for luxury<\/li>\n\n\n\n<li>Shift towards unlawful means<\/li>\n<\/ul>\n\n\n\n<p>Crime is an act or omission forbidden by law that is harmful to the people living in society resulting in fines or punishment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"rise-of-cybercrime\"><span class=\"ez-toc-section\" id=\"Rise_Of_Cybercrime\"><\/span>Rise Of Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>And now a day\u2019s cybercrimes are increasing at an alarming rate due to the above-mentioned reasons which are unlimited wants in limited means for which they chose to disgrace the dignity of society to gain their own good, but it can protect or prevent by cyber laws.<\/p>\n\n\n\n<p>Because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web, and cyberspace.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"legal-framework-for-cyber-laws\"><span class=\"ez-toc-section\" id=\"Legal_Framework_For_Cyber_Laws\"><\/span>Legal Framework For Cyber Laws<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A firm legal infrastructure has been defined to encounter the daily emerging cybercrimes. Therefore, the illegal activities taking place have a reaction in legal form by producing strict cyber laws in retaliation to the crimes committed.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Component<\/th><th>Role<\/th><\/tr><\/thead><tbody><tr><td>Cyber Laws<\/td><td>Prevent and regulate cybercrimes<\/td><\/tr><tr><td>Legal Infrastructure<\/td><td>Framework for enforcement<\/td><\/tr><tr><td>Enforcement<\/td><td>Penalties and legal action<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Cybercrimes are encountered via computers and other electronic devices disapproved by society. This paper will focus on the e-crimes and laws implemented to deflate these activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"impact-of-cybercrime\"><span class=\"ez-toc-section\" id=\"Impact_Of_Cybercrime\"><\/span>Impact Of Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Crimes taking place via the Internet is the biggest bane of technological advancement lagging behind our country in development and forefront growth.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-cybercrime\"><span class=\"ez-toc-section\" id=\"What_Is_Cybercrime\"><\/span>What Is Cybercrime?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>An action or omission that constitutes an associate offence and is punishable by law is called a crime. Each crime and criminal are indeed looked upon with the greatest hatred by all the sections of the individuals in society, however, it is conjointly true that the study and analysis of the law of crimes have forever been one of the foremost engaging branches of jurisprudence since the first years of human civilization. After all the law of crimes has been as recent because of the civilization itself.<\/p>\n\n\n\n<p>Where people organized themselves into groups or associations the necessity for few forms of rules to control the behavior of the members of that cluster repose has been felt, where there have been rules of society, its violation was inevitable. And there lies the requirement of fashioning some ways in which and suggest to curb such tendencies within the society in the society that lead to violation of its rules.<\/p>\n\n\n\n<p>In each organized society sure acts are impressible on the pain of punishment. Wherever one person harmed another and also the injury might adequately be remunerated by cash value, the wrongdoer was needed to pay damages or compensation to the wronged individual. However, in certain the liability to pay compensation the state imposes certain penalties upon the wrongdoer with the object of protective peace within the society and promoting smart behavior towards one another and towards the community at large.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"definition-and-scope-of-cybercrime\"><span class=\"ez-toc-section\" id=\"Definition_And_Scope_Of_Cybercrime\"><\/span>Definition And Scope Of Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cybercrime is characterized as crimes conducted online that use a computer as a tool or a specific target. It is very difficult to classify crimes in general into distinct groups as many crimes evolve on daily basis. The emergence of cybercrime rationalizes the fact that people are technologically expanding their vision and coming on modern criteria of committing crimes which are growing in the country leaving a terrible impact.<\/p>\n\n\n\n<p>The Internet is a powerful tool to influence people from both perspectives and hence the varied aspects of people having expert knowledge use this to target the audience in illicit conduct disgracing one&#8217;s reputation. The dependency of people on the internet and their addiction to using it for feature grants is the main reason for cybercrime evolution in today\u2019s world.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"types-of-cybercrimes\"><span class=\"ez-toc-section\" id=\"Types_Of_Cybercrimes\"><\/span>Types Of Cybercrimes<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Some of the cyber crimes that disgrace human integrity and societal safety are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber Stalking<\/li>\n\n\n\n<li>Cyber Terrorism<\/li>\n\n\n\n<li>Phishing<\/li>\n\n\n\n<li>Cyber Bullying<\/li>\n\n\n\n<li>Cyber Pornography<\/li>\n\n\n\n<li>Cyber Defamation<\/li>\n\n\n\n<li>Email Bombing<\/li>\n\n\n\n<li>Email Spoofing<\/li>\n<\/ul>\n\n\n\n<p>To monitor these crimes laws came into effect to lower the crime rate growing in modern India via the internet through the information technology act taking an Initiative to monitor criminal activities and signifying the law.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"need-for-cyber-laws\"><span class=\"ez-toc-section\" id=\"Need_For_Cyber_Laws\"><\/span>Need For Cyber Laws<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With the increasing use of technology and Internet variations, the bad side also started to emerge growingly. The Internet crimes happening via cyberspace were not getting under control and hence the intensity of crimes was unstoppable and evitable, the existing laws weren&#8217;t able to curtail the problem and hence the need arise to stop this act immediately by passing the information technology act.<\/p>\n\n\n\n<p>To tune in with the increasing cyber crimes, we needed a firm legal infrastructure to match the parallel needs of society signifying the lowering of the crimes. Hence, cyber laws came Into effect in order to stop these crimes and match the pace of illegal activities.<\/p>\n\n\n\n<p>Cyber laws in India were implemented in order to show a red flag to emerging cyber crimes. The hour of emergency was demanding some firm legal infrastructure in order to lower the crime rate surrounding cyberspace.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"scope-of-cyber-laws\"><span class=\"ez-toc-section\" id=\"Scope_Of_Cyber_Laws\"><\/span>Scope Of Cyber Laws<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cyberspace includes computers, emails, networks, phones, electronic devices, Atm, data storage devices, etc. Cyber law deals with cyber crimes, electronic or digital signatures, intellectual property, and data protection and privacy. In cybercrime, the computer is used as a tool for committing these crimes with the help of telecommunication technology.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"key-components-of-cyber-laws\"><span class=\"ez-toc-section\" id=\"Key_Components_Of_Cyber_Laws\"><\/span>Key Components Of Cyber Laws<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Component<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Cyber Crimes<\/td><td>Illegal activities conducted using computers and the internet<\/td><\/tr><tr><td>Digital Signatures<\/td><td>Authentication of electronic records and transactions<\/td><\/tr><tr><td>Intellectual Property<\/td><td>Protection of digital content and online creations<\/td><\/tr><tr><td>Data Protection<\/td><td>Safeguarding personal and sensitive information online<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"information-technology-act-2000-overview\"><span class=\"ez-toc-section\" id=\"Information_Technology_Act_2000_IT_Act_Overview_of_the_Act\"><\/span>Information Technology Act, 2000 (IT Act): Overview of the Act<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"important-provisions-of-the-act\"><span class=\"ez-toc-section\" id=\"Important_Provisions_of_the_Act\"><\/span>Important Provisions of the Act<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is the first cyber law that the Indian Parliament has approved. &#8220;To facilitate electronic filing of documents with Government agencies, to supply legal recognition for transactions carried out by electronic data interchange and other means of electronic communication, commonly mentioned as electronic methods of communication and storage of information, and further to amend the Indian legal code, the Indian Evidence Act, 1872[1], and therefore the Banker&#8217;s Book Evidence Act, 1891[2].<\/p>\n\n\n\n<p>The IT Act may be a significant part of the overall Indian legal system since it governs how cybercrimes are investigated and prosecuted. The acceptable sections are as follows:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-43-cybercrime-and-compensation\"><span class=\"ez-toc-section\" id=\"Section_43_Cybercrime_and_Compensation\"><\/span>Section 43: Cybercrime and Compensation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This section of the IT Act applies to anyone who commits cybercrimes, like harming the victim&#8217;s computer without the victim&#8217;s express authorization.<\/li>\n\n\n\n<li>If a computer is broken in such a case without the owner&#8217;s permission, the owner is totally entitled to our funds for the whole damage.<\/li>\n<\/ul>\n\n\n\n<p>Rajesh Aggarwal of Maharashtra&#8217;s IT department, who served because the case&#8217;s representative, ordered Punjab commercial bank to pay Rs 45 lakh to Manmohan Singh Matharu, the MD of Pane-based company Poona Auto Ancillaries, in Poona Auto Ancillaries Pvt. Ltd., Pune v Punjab commercial bank, HO New Delhi &amp; Others (2018).<\/p>\n\n\n\n<p>In one instance, a fraudster used Matharu&#8217;s account at PNB, Pune, to transfer Rs 80.10 lakh after the latter skilled a phishing email. The complainant has requested to touch the liability because they opened the phishing email. However, it had been determined that the bank was incompetent because no security checks were made against accounts that had been formed fraudulently to mislead the complainant.<\/p>\n\n\n\n<p>Any dishonest or fraudulent behavior covered by Section 43 is roofed by Section 66. In such cases, the utmost penalty is three years in prison or a fine of Rs. 5 lakh.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-66-computer-related-offences\"><span class=\"ez-toc-section\" id=\"Section_66_Computer-Related_Offences\"><\/span>Section 66: Computer-Related Offences<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Applies to any conduct described in Section 43 that&#8217;s dishonest or fraudulent.<\/li>\n\n\n\n<li>There are often up to three years of imprisonment in such instances, or a fine of up to Rs. 5 lakh.<\/li>\n<\/ul>\n\n\n\n<p>In Kumar v Whiteley (1991)[3], the accused acquired illegal access to the Joint Academic Network (JANET) throughout the investigation and modified, added, and removed files.<\/p>\n\n\n\n<p>Investigations revealed that Kumar had been accessing BSNL broadband Internet connections under the guise of a legitimate authorized user and altering computer records relevant to subscribers&#8217; broadband Internet user accounts. The CBI launched an inquiry into Kumar after discovering unlawful use of broadband Internet on his computer, which was the inspiration of an anonymous allegation. The subscribers also lost Rs 38,248 as a result of Kumar&#8217;s wrongdoing.<\/p>\n\n\n\n<p>The extra Chief Metropolitan Magistrate condemned N G Arun Kumar. Following Sections 420 of the IPC (BNS 2023) 12 and 66 of the IT Act 13, the magistrate sentenced him to a stern year in prison and a fine of Rs 5,000.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-66b-receiving-stolen-computer-resources\"><span class=\"ez-toc-section\" id=\"Section_66B_Receiving_Stolen_Computer_Resources\"><\/span>Section 66B: Receiving Stolen Computer Resources<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This section outlines the results of receiving computer or communication equipment that has been unlawfully obtained.<\/li>\n\n\n\n<li>It confirms a possible three-year jail sentence.<\/li>\n\n\n\n<li>A fine of up to Rs. 1 lakh can also be imposed, counting on the severity.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-66c-identity-theft\"><span class=\"ez-toc-section\" id=\"Section_66C_Identity_Theft\"><\/span>Section 66C: Identity Theft<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Digital signatures, password hacking, and other sorts of identity theft are the main topics of this section.<\/li>\n\n\n\n<li>This section carries a fine of 1 lakh rupees and a maximum sentence of three years in prison.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-66d-cheating-by-impersonation\"><span class=\"ez-toc-section\" id=\"Section_66D_Cheating_by_Impersonation\"><\/span>Section 66D: Cheating by Impersonation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This section deals with impersonating somebody else while using computer resources to cheat.<\/li>\n\n\n\n<li>If found guilty, the penalty carries a maximum three-year prison sentence also as a maximum fine of Rs. 1 lakh.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-66e-violation-of-privacy\"><span class=\"ez-toc-section\" id=\"Section_66E_Violation_of_Privacy\"><\/span>Section 66E: Violation of Privacy<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Violations of this section include publishing or transmitting images of personal spaces without the owner&#8217;s permission.<\/li>\n\n\n\n<li>If found guilty, the penalty carries a maximum three-year prison sentence also as a maximum fine of Rs. 1 lakh.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-67-publishing-obscene-content\"><span class=\"ez-toc-section\" id=\"Section_67_Publishing_Obscene_Content\"><\/span>Section 67: Publishing Obscene Content<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This deals with publishing obscenities online.<\/li>\n\n\n\n<li>If found guilty, the utmost sentence is three years in prison, and there&#8217;s also a potential fine of Rs 2 lakh.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"summary-table-of-key-sections\"><span class=\"ez-toc-section\" id=\"Summary_Table_of_Key_Sections\"><\/span>Summary Table of Key Sections<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Section<\/th><th>Offence<\/th><th>Punishment<\/th><\/tr><\/thead><tbody><tr><td>Section 43<\/td><td>Unauthorized access, damage to computer<\/td><td>Compensation for damage<\/td><\/tr><tr><td>Section 66<\/td><td>Computer-related offences (fraud\/dishonesty)<\/td><td>Up to 3 years imprisonment or Rs. 5 lakh fine<\/td><\/tr><tr><td>Section 66B<\/td><td>Receiving stolen computer resources<\/td><td>Up to 3 years imprisonment or Rs. 1 lakh fine<\/td><\/tr><tr><td>Section 66C<\/td><td>Identity theft<\/td><td>Up to 3 years imprisonment or Rs. 1 lakh fine<\/td><\/tr><tr><td>Section 66D<\/td><td>Cheating by impersonation<\/td><td>Up to 3 years imprisonment or Rs. 1 lakh fine<\/td><\/tr><tr><td>Section 66E<\/td><td>Violation of privacy<\/td><td>Up to 3 years imprisonment or Rs. 1 lakh fine<\/td><\/tr><tr><td>Section 67<\/td><td>Publishing obscene content<\/td><td>Up to 3 years imprisonment or Rs. 2 lakh fine<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ipc-bns-provisions-for-cybercrime\"><span class=\"ez-toc-section\" id=\"IPC_BNS_2023_Provisions_Applicable_To_Cybercrime\"><\/span>IPC (BNS 2023) Provisions Applicable To Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The following IPC (BNS 2023) sections may be used by law enforcement agencies if the IT Act is insufficient to address particular cybercrimes:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-292-bns\"><span class=\"ez-toc-section\" id=\"Section_292_Section-294_Of_BNS\"><\/span>Section 292 (Section-294 Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Although the first intent of this clause was to combat the sale of pornographic materials, it&#8217;s since developed to cover a variety of cyber offenses as well. This clause also applies to how pornographic or sexually explicit activities or exploits of kids are publicized or distributed electronically. Such offenses are punishable by up to 2 years in jail and fines of Rs. 2000. For repeat (second-time) offenders, any of the aforementioned crimes may end in a sentence of up to five years in jail and a fine of up to Rs. 5000.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-354c-bns\"><span class=\"ez-toc-section\" id=\"Section_354C_Section-77_Of_BNS\"><\/span>Section 354C (Section-77 Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>According to this law, photographing or publishing images of a woman&#8217;s private or intimate acts without her agreement constitutes cybercrime. Voyeurism is the only topic covered in this section because it is illegal to watch a woman engage in sexual activity. Sections 292 of the IPC (BNS 2023) and Section 66E of the IT Act are broad enough to include offenses of a similar character in the absence of this section&#8217;s essential components. First-time offenders may receive a sentence of up to three years in jail, while repeat offenders may receive a sentence of up to seven years.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-354d-bns\"><span class=\"ez-toc-section\" id=\"Section_354D_Section-78_Of_BNS\"><\/span>Section 354D (Section-78 Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This chapter describes and penalizes stalking, including both physical and online stalking. Cyberstalking is the practice of following a woman through technology, such as the internet or email, or making contact with her despite her lack of interest. For the first offense, this crime carries a maximum sentence of 3 years in jail; for the second offense, it carries a maximum sentence of 5 years in prison and a fine.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-379-bns\"><span class=\"ez-toc-section\" id=\"Section_379_Section-303_Of_BNS\"><\/span>Section 379 (Section-303 Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In addition to a fine, theft is punishable by up to three years in prison under this section. The IPC (BNS 2023) Section is relevant in part because many cybercrimes involve stolen computers, data, or electronic equipment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-420-bns\"><span class=\"ez-toc-section\" id=\"Section_420_Section-3184_Of_BNS\"><\/span>Section 420 (Section-318(4) Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In this section, it is discussed how to induce the delivery of property dishonestly and through deceit. Under this clause, cybercriminals who commit offenses including fabricating websites and conducting online fraud face a seven-year prison sentence in addition to a fine. This part of the IPC (BNS 2023) deals with offenses including creating phony websites or stealing passwords for financial gain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-463-bns\"><span class=\"ez-toc-section\" id=\"Section_463_Section-3361_Of_BNS\"><\/span>Section 463 (Section-336(1) Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This section deals with electronically fabricating documents or records. Under this clause, spoofing emails is punishable by up to 7 years in prison and\/or a fine.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-465-bns\"><span class=\"ez-toc-section\" id=\"Section_465_Section-3362_Of_BNS\"><\/span>Section 465 (Section-336(2) Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This clause often addresses how forgery is punished. Under this section, offenses like email spoofing and creating false documents online are dealt with and punished with up to two years in prison, fines, or both.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"section-468-bns\"><span class=\"ez-toc-section\" id=\"Section_468_Section-3363_Of_BNS\"><\/span>Section 468 (Section-336(3) Of BNS)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A seven-year prison term and a fine may be imposed for fraud committed with the purpose to defraud. This section also punishes email spoofing. In the 2005 case of Anil Kumar Srivastava v Addl Director, MHFW, the petitioner falsely signed the AD&#8217;s signature before filing a case that contained untrue accusations against the same person. The Court determined that the petitioner was accountable under Sections 465 and 471 of the IPC since he also tried to pass it off as a legitimate document.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"comparison-ipc-it-act\"><span class=\"ez-toc-section\" id=\"Overlap_Between_IPC_BNS_2023_And_IT_Act\"><\/span>Overlap Between IPC (BNS 2023) And IT Act<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Due to the overlap between the provisions of the IPC (BNS 2023) and the IT Act, certain offenses may wind up being bailable under the IPC (BNS 2023) but not under the IT Act and vice versa, or perhaps compoundable under the IPC (BNS 2023) but not under the IT Act and vice versa.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"key-differences\"><span class=\"ez-toc-section\" id=\"Key_Differences\"><\/span>Key Differences<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Provision<\/th><th>Nature<\/th><th>Bailability \/ Compoundability<\/th><\/tr><tr><td>Sections 43 &amp; 66 IT Act<\/td><td>Hacking \/ Data Theft<\/td><td>Bailable and compoundable<\/td><\/tr><tr><td>Sections 378 &amp; 425 IPC (BNS 2023)<\/td><td>Theft \/ Mischief<\/td><td>Not bailable, not compoundable<\/td><\/tr><tr><td>Section 66B IT Act<\/td><td>Receiving stolen goods<\/td><td>Overrides IPC Section 411<\/td><\/tr><tr><td>Sections 66C &amp; 66D IT Act<\/td><td>Identity theft &amp; cheating by personation<\/td><td>Punishable but not equivalent to IPC forgery provisions<\/td><\/tr><tr><td>Sections 463, 465, 468 IPC<\/td><td>Forgery<\/td><td>Not subject to bail<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The Bombay High Court addressed the dispute between offenses that are not bailable and not compoundable under Sections 408 and 420 of the IPC (BNS 2023) and those that are under Sections 43, 65, and 66 of the IT Act in Gagan Harsh Sharma v The State of Maharashtra[4].<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"lacunae-in-cyber-law\"><span class=\"ez-toc-section\" id=\"Lacunae_In_Cyber_Law\"><\/span>Lacunae In Cyber Law<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The entire workforce has gone digital with the advent of the twenty-first century, including, among other things, banking, online shopping, and purchases. But one crime is quickly gaining ground in this digitally advanced society: cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybercrime is a type of criminal activity where hackers utilize computers as their main tool.<\/li>\n\n\n\n<li>They use the private information of consumers for evil reasons.<\/li>\n\n\n\n<li>Cybercrime is sometimes referred to as hacking, phishing, or spamming.<\/li>\n<\/ul>\n\n\n\n<p>The Indian Cybercrime Act (ITA-2000), which addresses e-commerce and cybercrime, has many flaws. Since the adoption of the cyber law, cybercrime has increased in India but has not decreased.<\/p>\n\n\n\n<p>An Act of India (No 21 of 2000) was notified on October 17, 2000, and that Act is known as the Information Technology Act of 2000.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"landmark-cases\"><span class=\"ez-toc-section\" id=\"Landmark_Cases\"><\/span>Landmark Cases<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The CEO of Bazee.com was detained in December 2004 after a CD with questionable content was sold on the website. Additionally, the CD was accessible in Delhi&#8217;s markets. The police forces from Mumbai and Delhi were dispatched to the area. The CEO eventually received a parole discharge. The issue of how to distinguish between Internet Service Providers and Content Providers was brought up by this. The onus is on the accused to demonstrate that he was indeed the service provider and not the content provider. It also raises several issues regarding how law enforcement should handle cybercrime situations.<\/p>\n\n\n\n<p>The detainee filed a bail appeal with the learned Principal Sessions Judge in Cr.M.P.No. 1772 of 2019; the equivalent was dismissed on August 8, 2019. The Detaining Authority marked him as a Cyber Law Offender and imprisoned him under the provisions of the Tamil Nadu Act 14 of 1982, by cinching the reproved request of detention and testing the legitimacy of the equivalent, the present Habeas Corpus Petition is documented. The Detaining Authority, on scrutiny and thought of the materials, has inferred the abstract fulfillment that the detenu&#8217;s activities were biased to the upkeep of the public request.<\/p>\n\n\n\n<p>The petitioner then proved that Thiru Saravanan, a child of Chinnathambi, is breaking the law and operating in a way that is biassed against maintaining public demand, and as a result, he (Thiru Saravanan) is a &#8220;Digital Law Offender&#8221; as considered under section 2(bb) of the Tamil Nadu Act 14\/82. He has caused fear, alertness, and a sense of weakness in the characters of those in the area by committing the infractions shown above, and as a result, he has acted in a way that is biased against maintaining public order.<\/p>\n\n\n\n<p>The lawyer is accused in connection with Jamshedpur Cyber Crime P. S. Case No. 01 of 2020 in comparison to Cyber Crime Case No. 18 of 2020, both of which are filed under Sections 419, 420, 467, 468, 471, 34, and 66(C), (D) of the Information Technology Act and are scheduled to be heard by Additional Sessions Judge-II, Jamshedpur.<\/p>\n\n\n\n<p>However, I have now discovered that the A.P.P. has rejected the bail petition. Given the information in the file, the pre-conviction period of custody, and the fact that other co-accused have successfully been granted bail, the candidate is scheduled to be released on bail upon furnishing a bail obligation of Rs. 10,000\/- (Ten Thousand specifically), with two guarantees of the same sum each, under the general preference of took in Additional Sessions. Regarding Jamshedpur Cyber Crime P. S. Case No. 01 of 2020 about Cyber Crime Case No. 18 of 2020, Judge-II, Jamshedpur, subject to the conditions that:<br><\/p>\n\n\n\n<ol style=\"list-style-type:lower-roman\" class=\"wp-block-list\">\n<li>One of the bailors ought to be his direct relations, and<\/li>\n\n\n\n<li>The applicant will report to the concerned police headquarters once every month until the conclusion of the Trial and<\/li>\n\n\n\n<li>Under the watching eye of the learned court, the attorney will provide a self-confirmed copy of his Aadhar Card and also provide his mobile number.<\/li>\n<\/ol>\n\n\n\n<p>Right now, there is still time to address the problem that is making news due to misconduct. If we start airing news stories about cybercrime, start treating it seriously, and start educating people about it as well as advising them to make their records private and secured by the security software, this would also help to reduce the number of incidents.<\/p>\n\n\n\n<p>If we were to make our discipline more grounded and instill fear in programmers&#8217; minds, these programmers could think twice before engaging in this transgression. Making it mandatory to educate children about information security is important because it will help them develop the skills essential to fight cybercrime and make good decisions in the future. One additional thing that needs to be kept in mind is that we need to deal with information security escape clauses and fill out these conditions so that it can gradually recover.<\/p>\n\n\n\n<p>In the instant case, the validity of Section 66A of the IT Act was challenged before the Supreme Court.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Two women were arrested under Section 66A of the IT Act after they posted allegedly offensive and objectionable comments on Facebook concerning the complete shutdown of Mumbai after the demise of a political leader.<\/li>\n\n\n\n<li>Section 66A of the IT Act provides punishment if any person using a computer resource or communication, such information which is offensive, false, or causes annoyance, inconvenience, danger, insult, hatred, injury, or ill will.<\/li>\n<\/ul>\n\n\n\n<p>The women, in response to the arrest, filed a petition challenging the constitutionality of Section 66A of the IT Act on the ground that it is violative of the freedom of speech and expression.<\/p>\n\n\n\n<p>In this case, the accused preferred an appeal before the Supreme Court after the High Court rejected the application of the accused to exhibit the Compact Disc filed in defence and to get it proved from the Forensic Science Laboratory.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Supreme Court held that a Compact Disc is also a document.<\/li>\n\n\n\n<li>It further observed that it is not necessary to obtain admission or denial concerning a document under Section 294 (1) of BNSS personally from the accused, the complainant, or the witness.<\/li>\n<\/ul>\n\n\n\n<p>The Complainant, a luxury shoes manufacturer filed a suit seeking an injunction against an e-commerce portal www.darveys.com for indulging in a Trademark violation with the seller of spurious goods.<\/p>\n\n\n\n<p><strong>Key Issue:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Whether the defendant\u2019s use of the plaintiff\u2019s mark, logos, and image are protected under Section 79 of the IT Act.<\/li>\n<\/ul>\n\n\n\n<p>The Court observed that the defendant is more than an intermediary on the ground that the website has full control over the products being sold via its platform. It first identifies and then promotes third parties to sell their products. The Court further said that active participation by an e-commerce platform would exempt it from the rights provided to intermediaries under Section 79 of the IT Act.<\/p>\n\n\n\n<p>The instant case is a landmark case in the Cyber Law regime for its efficient handling made the conviction possible within 7 months from the date of filing the FIR.<\/p>\n\n\n\n<p>The accused was a family friend of the victim and wanted to marry her but she married another man which resulted in a Divorce. After her divorce, the accused persuaded her again and, on her reluctance, to marrying him, he took the course of harassment through the Internet. The accused opened a false e-mail account in the name of the victim and posted defamatory, obscene, and annoying information about the victim.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Legal Provision<\/th><th>Outcome<\/th><\/tr><\/thead><tbody><tr><td>Section 67 of IT Act<\/td><td>Rigorous Imprisonment of 2 years + Fine Rs. 4,000<\/td><\/tr><tr><td>Section 336 BNS, 2023<\/td><td>Simple Imprisonment of 1 year + Fine Rs. 500<\/td><\/tr><tr><td>Section 469 IPC<\/td><td>Rigorous Imprisonment of 2 years + Fine Rs. 500<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>A charge-sheet was filed against the accused person under Section 67 of the IT Act and Section 336 and 78 of the BNS, 2023. The Additional Chief Metropolitan Magistrate, Egmore convicted the accused person under Section 336 and 78 of the BNS, 2023 and Section 67 of the IT Act.<\/p>\n\n\n\n<p>The accused was subjected to the Rigorous Imprisonment of 2 years along with a fine of Rs. 500 under Section 469 of the IPC, Simple Imprisonment of 1 year along with a fine of Rs. 500 under Section 336 of the BNS, and Rigorous Imprisonment of 2 years along with a fine of Rs. 4,000 under Section 67 of the IT Act.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"overview-of-cybercrime\"><span class=\"ez-toc-section\" id=\"An_Overview_Of_Cybercrime\"><\/span>An Overview Of Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Since computer systems have become a crucial component of businesses, organizations, governments, and people&#8217;s daily lives, we have learned to put a lot of reliance on them. We&#8217;ve given them access to highly important and priceless information as a result.<\/p>\n\n\n\n<p>History has shown that valuable items have always been a target for criminals. Cybercrime is no different. Consumers give a target for thieves to aim at to profit from the activity as they load their personal computers, phones, and other gadgets with valuable information.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Increased reliance on digital systems<\/li>\n\n\n\n<li>Storage of sensitive personal and financial data<\/li>\n\n\n\n<li>Growing use of connected devices<\/li>\n<\/ul>\n\n\n\n<p>In the past, a criminal would need to carry out some sort of robbery to gain access to a person&#8217;s belongings. When data is stolen, the criminal must break into the facility and look through the files for the most precious and lucrative information.<\/p>\n\n\n\n<p>Because of the nature of the internet, criminals may now assault their victims from a distance, and these actions are unlikely to result in punishment today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-inception-and-cybercrime-era\"><span class=\"ez-toc-section\" id=\"Webs_Inception_And_The_Commencement_Of_A_New_Era_For_Cybercrime\"><\/span>Web&#8217;s Inception And The Commencement Of A New Era For Cybercrime<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In the 1990s, email and the web browser became extensively used, giving hackers additional tools to use. As a result, the cybercriminal was able to significantly expand their reach.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Period<\/th><th>Development<\/th><th>Impact On Cybercrime<\/th><\/tr><\/thead><tbody><tr><td>Pre-1990s<\/td><td>Physical data transfer (e.g., floppy disks)<\/td><td>Limited reach of cybercriminals<\/td><\/tr><tr><td>1990s<\/td><td>Email and web browsers became widespread<\/td><td>Expanded reach and new attack vectors<\/td><\/tr><tr><td>2000s<\/td><td>Rise of social networking and databases<\/td><td>Growth in identity theft and financial fraud<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Until the cybercriminal had to make a physical transaction, like giving a floppy disc, for example. These modern, highly vulnerable web browsers could now be used by cybercriminals to spread virus code online.<\/p>\n\n\n\n<p>Cybercriminals used their previous knowledge to operate online, which had terrible effects.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"rise-of-phishing-attacks\"><span class=\"ez-toc-section\" id=\"Rise_Of_Phishing_Attacks\"><\/span>Rise Of Phishing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cybercriminals were also able to con people from a distance thanks to phishing attacks. One-on-one interactions with people were no longer necessary.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mass targeting of users<\/li>\n\n\n\n<li>Remote deception techniques<\/li>\n\n\n\n<li>Low risk with high potential reward<\/li>\n<\/ul>\n\n\n\n<p>You may try to deceive millions of users at once. You may still earn a sizable sum of money as a cybercriminal even if just a small proportion of people fell for the trap.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"growth-of-identity-theft\"><span class=\"ez-toc-section\" id=\"Growth_Of_Identity_Theft\"><\/span>Growth Of Identity Theft<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Identity theft and social networking both began to take off in the 2000s. Due to the development of databases containing millions of users&#8217; personal identifying information, identity theft has evolved into the new financial piggy bank for criminal organizations around the world (PII).<\/p>\n\n\n\n<p>Due to this information and the general public&#8217;s ignorance of cybersecurity, hackers were able to commit several financial crimes, including opening credit cards and bank accounts in other people&#8217;s identities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybercrime-quick-changing-technological-environment\"><span class=\"ez-toc-section\" id=\"Cybercrime_In_A_Quick-Changing_Technological_Environment\"><\/span>Cybercrime In A Quick-Changing Technological Environment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In recent years, cybercrime has only gotten worse. As computer systems have become faster and more complex, we have observed that cybercriminals have become more skilled and challenging to catch.<\/p>\n\n\n\n<p>To control millions of infected computer systems around the world, criminals have already become accustomed to using botnets, which are networks of private computers that have been infected with malicious software.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>These botnets give hackers the ability to overwhelm corporate networks while hiding their origins.<\/li>\n\n\n\n<li>Ransomware attacks are ongoing in every sphere of the economy.<\/li>\n\n\n\n<li>People are always on the watch for financial fraud and identity theft.<\/li>\n\n\n\n<li>The most recent point-of-sale attack against large merchants and hospitality groups has been the subject of ongoing news headlines.<\/li>\n<\/ul>\n\n\n\n<p>Globally, organizations are trying to thwart these attacks in some way.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"evolving-nature-of-cyber-threats\"><span class=\"ez-toc-section\" id=\"Evolving_Nature_Of_Cyber_Threats\"><\/span>Evolving Nature Of Cyber Threats<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>On the other hand, hackers are one step ahead of the game because of their always-evolving and innovative approaches.<\/p>\n\n\n\n<p>Future information security specialists, however, will defend us and help us create a safer online environment.<\/p>\n\n\n\n<p>Internet users need to supply a few necessities to be ready for the upcoming wave of cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Antivirus software is a useful first step in keeping computers secure.<\/li>\n\n\n\n<li>Recognizing current threat trends may also help you prevent your data from being viewed by unauthorized people[8].<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybercrime-statistics-india\"><span class=\"ez-toc-section\" id=\"Cybercrime_Statistics_In_India\"><\/span>Cybercrime Statistics In India<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With over 6.7 lakh cases already documented in 2022, the Center claimed that there has been a significant increase in cybersecurity-related risks in India.<\/p>\n\n\n\n<p>A total of 6,74,021 cyber security incidents have been registered this year, the administration informed the Lok Sabha on Wednesday.<\/p>\n\n\n\n<p>Ajay Kumar Mishra, the Union Minister of State for Home, informed the Lok Sabha that the government issues alerts and advisories regarding the most recent cyber threats and runs an automated cyber threat exchange platform for proactively gathering, analyzing, and sharing tailored alerts with organizations across sectors for proactive threat mitigation actions.<\/p>\n\n\n\n<p>Before being hosted, all government websites and applications are subject to a cyber security audit.<\/p>\n\n\n\n<p>The Cyber Swachhta Kendra, which alerts the government to harmful software and free tools, is also run by the government.<\/p>\n\n\n\n<p>According to the minister, the government has provided chief information security officers (CISOs) with instructions regarding their primary tasks and duties for securing applications, infrastructure, and compliance.<\/p>\n\n\n\n<p>In 2019, 2020, and 2021, respectively, there were reported 3,94,499, 11,58,208, and 14,02,809 cyber security incidents, according to data compiled by the Indian Computer Emergency Response Team (CERT-In)[9].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"year-wise-cyber-incidents-india\"><span class=\"ez-toc-section\" id=\"Year-Wise_Cyber_Security_Incidents_In_India\"><\/span>Year-Wise Cyber Security Incidents In India<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Year<\/th><th>Number Of Incidents<\/th><\/tr><\/thead><tbody><tr><td>2019<\/td><td>3,94,499<\/td><\/tr><tr><td>2020<\/td><td>11,58,208<\/td><\/tr><tr><td>2021<\/td><td>14,02,809<\/td><\/tr><tr><td>2022<\/td><td>6,74,021<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-cyber-attacks\"><span class=\"ez-toc-section\" id=\"Types_Of_Cyber_Attacks\"><\/span>Types Of Cyber Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to alter computer code, logic or data and lead to cybercrimes, such as information and identity theft.<\/p>\n\n\n\n<p>Cyber-attacks can be classified into the following categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Web-Based Attacks<\/strong><\/li>\n\n\n\n<li><strong>System-Based Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-based-attacks\"><span class=\"ez-toc-section\" id=\"Web-Based_Attacks\"><\/span>Web-Based Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>These are the attacks which occur on a website or web applications. Some of the important web-based attacks are as follows-<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"injection-attacks\"><span class=\"ez-toc-section\" id=\"Injection_Attacks\"><\/span>Injection Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Example- SQL Injection, Code Injection, Log Injection, XML Injection etc.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-spoofing\"><span class=\"ez-toc-section\" id=\"DNS_Spoofing\"><\/span>DNS Spoofing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver&#8217;s cache causing the name server to return an incorrect IP address, diverting traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"session-hijacking\"><span class=\"ez-toc-section\" id=\"Session_Hijacking\"><\/span>Session Hijacking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"phishing\"><span class=\"ez-toc-section\" id=\"Phishing\"><\/span>Phishing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"brute-force\"><span class=\"ez-toc-section\" id=\"Brute_Force\"><\/span>Brute Force<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a type of attack which uses a trial and error method. This attack generates a large number of guesses and validates them to obtain actual data like user password and personal identification number. This attack may be used by criminals to crack encrypted data, or by security, analysts to test an organization&#8217;s network security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"denial-of-service\"><span class=\"ez-toc-section\" id=\"Denial_Of_Service\"><\/span>Denial Of Service<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server. It can be classified into the following-<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Type of Attack<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Volume-Based Attacks<\/td><td>Its goal is to saturate the bandwidth of the attacked site, and is measured in bit per second.<\/td><\/tr><tr><td>Protocol Attacks<\/td><td>It consumes actual server resources, and is measured in a packet.<\/td><\/tr><tr><td>Application Layer Attacks<\/td><td>Its goal is to crash the web server and is measured in request per second.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dictionary-attacks\"><span class=\"ez-toc-section\" id=\"Dictionary_Attacks\"><\/span>Dictionary Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This type of attack stored the list of a commonly used password and validated them to get original password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"url-interpretation\"><span class=\"ez-toc-section\" id=\"URL_Interpretation\"><\/span>URL Interpretation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web pages for which he is not authorized to browse.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"file-inclusion-attacks\"><span class=\"ez-toc-section\" id=\"File_Inclusion_Attacks\"><\/span>File Inclusion Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a type of attack that allows an attacker to access unauthorized or essential files which is available on the web server or to execute malicious files on the web server by making use of the include functionality.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"man-in-the-middle-attacks\"><span class=\"ez-toc-section\" id=\"Man_In_The_Middle_Attacks\"><\/span>Man In The Middle Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"system-based-attacks\"><span class=\"ez-toc-section\" id=\"System-Based_Attacks\"><\/span>System-Based Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>These are the attacks which are intended to compromise a computer or a computer network. Some of the important system-based attacks are as follows-<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"virus\"><span class=\"ez-toc-section\" id=\"Virus\"><\/span>Virus<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"worm\"><span class=\"ez-toc-section\" id=\"Worm\"><\/span>Worm<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders[10].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"trojan-horse\"><span class=\"ez-toc-section\" id=\"Trojan_Horse\"><\/span>Trojan Horse<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened\/executed some malicious code will run in the background.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"backdoors\"><span class=\"ez-toc-section\" id=\"Backdoors\"><\/span>Backdoors<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"bots\"><span class=\"ez-toc-section\" id=\"Bots\"><\/span>Bots<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A bot (short for &#8220;robot&#8221;) is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"vulnerability-threat-harmful-acts\"><span class=\"ez-toc-section\" id=\"Vulnerability_Threat_Harmful_Acts\"><\/span>Vulnerability, Threat, Harmful Acts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As the recent epidemic of data breaches illustrates, no system is immune to attacks. Any company that manages, transmits, stores, or otherwise handles data has to institute and enforce mechanisms to monitor their cyber environment, identify vulnerabilities, and close up security holes as quickly as possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-threats-vs-vulnerabilities\"><span class=\"ez-toc-section\" id=\"Cyber_Threats_Vs_Vulnerabilities\"><\/span>Cyber Threats Vs Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Before identifying specific dangers to modern data systems, it is crucial to understand the distinction between cyber threats and vulnerabilities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cyber threats<\/strong> are security incidents or circumstances with the potential to have a negative outcome for your network or other data management systems.<\/li>\n\n\n\n<li><strong>Vulnerabilities<\/strong> are the gaps or weaknesses in a system that make threats possible and tempt threat actors to exploit them.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"examples-of-cyber-threats\"><span class=\"ez-toc-section\" id=\"Examples_Of_Cyber_Threats\"><\/span>Examples Of Cyber Threats<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing attacks that result in the installation of malware that infects your data<\/li>\n\n\n\n<li>Failure of a staff member to follow data protection protocols that cause a data breach<\/li>\n\n\n\n<li>A tornado that takes down your company\u2019s data headquarters, disrupting access<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"types-of-vulnerabilities\"><span class=\"ez-toc-section\" id=\"Types_Of_Vulnerabilities_In_Network_Security\"><\/span>Types Of Vulnerabilities In Network Security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SQL injections<\/li>\n\n\n\n<li>Server misconfigurations<\/li>\n\n\n\n<li>Cross-site scripting<\/li>\n\n\n\n<li>Transmitting sensitive data in a non-encrypted plain text format<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-risk-definition\"><span class=\"ez-toc-section\" id=\"Cyber_Risk_Definition\"><\/span>Cyber Risk Definition<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When threat probability is multiplied by the potential loss that may result, cyber security experts refer to this as a risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"computer-criminals\"><span class=\"ez-toc-section\" id=\"Computer_Criminals\"><\/span>Computer Criminals<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Computer criminals have access to enormous amounts of hardware, software, and data; they have the potential to cripple much of effective business and government throughout the world. In a sense, the purpose of computer security is to prevent these criminals from doing damage.<\/p>\n\n\n\n<p>We say computer crime is any crime involving a computer or aided by the use of one. Although this definition is admittedly broad, it allows us to consider ways to protect ourselves, our businesses, and our communities against those who use computers maliciously.<\/p>\n\n\n\n<p>One approach to prevention or moderation is to understand who commits these crimes and why. Many studies have attempted to determine the characteristics of computer criminals. By studying those who have already used computers to commit crimes, we may be able in the future to spot likely criminals and prevent the crimes from occurring.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cia-triad\"><span class=\"ez-toc-section\" id=\"CIA_Triad\"><\/span>CIA Triad<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The CIA Triad is actually a security model that has been developed to help people think about various parts of IT security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cia-triad-breakdown\"><span class=\"ez-toc-section\" id=\"CIA_Triad_Broken_Down\"><\/span>CIA Triad Broken Down<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Component<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Confidentiality<\/td><td>Protects sensitive information from unauthorized access<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"confidentiality\"><span class=\"ez-toc-section\" id=\"Confidentiality\"><\/span>Confidentiality<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It&#8217;s crucial in today&#8217;s world for people to protect their sensitive, private information from unauthorized access.<\/p>\n\n\n\n<p>Protecting confidentiality is dependent on being able to define and enforce certain access levels for information.<\/p>\n\n\n\n<p>In some cases, doing this involves separating information into various collections that are organized by who needs access to the information and how sensitive that information actually is &#8211; i.e. the amount of damage suffered if the confidentiality was breached.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"methods-to-manage-confidentiality\"><span class=\"ez-toc-section\" id=\"Common_Methods_To_Manage_Confidentiality\"><\/span>Common Methods To Manage Confidentiality<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access control lists<\/li>\n\n\n\n<li>Volume and file encryption<\/li>\n\n\n\n<li>Unix file permissions<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"assets-and-threats\"><span class=\"ez-toc-section\" id=\"Assets_And_Threat\"><\/span>Assets And Threat<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-an-asset\"><span class=\"ez-toc-section\" id=\"What_Is_An_Asset\"><\/span>What Is An Asset<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>An asset is any data, device or other component of an organization\u2019s systems that is valuable \u2013 often because it contains sensitive data or can be used to access such information.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"asset-examples\"><span class=\"ez-toc-section\" id=\"Examples_Of_Assets\"><\/span>Examples Of Assets<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An employee\u2019s desktop computer<\/li>\n\n\n\n<li>Laptop or company phone<\/li>\n\n\n\n<li>Applications on those devices<\/li>\n\n\n\n<li>Servers and support systems<\/li>\n\n\n\n<li>Databases and physical files \u2013 i.e. the sensitive data that you store<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-a-threat\"><span class=\"ez-toc-section\" id=\"What_Is_A_Threat\"><\/span>What Is A Threat<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A threat is any incident that could negatively affect an asset \u2013 for example, if it\u2019s lost, knocked offline or accessed by an unauthorized party.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"types-of-threats\"><span class=\"ez-toc-section\" id=\"Types_Of_Threats\"><\/span>Types Of Threats<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Threat Type<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Intentional Threats<\/td><td>Criminal hacking or a malicious insider stealing information<\/td><\/tr><tr><td>Accidental Threats<\/td><td>Employee error, technical malfunction, fire, or natural disaster<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Threats can be categorized as circumstances that compromise the confidentiality, integrity or availability of an asset, and can either be intentional or accidental.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"measures-to-prevent-cyber-crimes\"><span class=\"ez-toc-section\" id=\"Measures_To_Prevent_Cyber_Crimes\"><\/span>Measures To Prevent Cyber Crimes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Due to the transnational character of cybercrimes, creative solutions are needed to address the problem of technological crime. Therefore, in addition to respecting the Cyber Laws, one should bear in mind the following things to ensure their safety when using the Internet:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-awareness-and-education\"><span class=\"ez-toc-section\" id=\"Cyber_Awareness_And_Education\"><\/span>Cyber Awareness And Education<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Every person should become more knowledgeable about cybercrimes and cyber laws and should be made aware of them.<\/li>\n\n\n\n<li>Students in computer centers, schools, colleges, and universities should also receive instruction in cyber literacy.<\/li>\n\n\n\n<li>Any educational institution can host a cyber law awareness workshop to teach students the fundamentals of the internet and its security.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"financial-security-measures\"><span class=\"ez-toc-section\" id=\"Financial_Security_Measures\"><\/span>Financial Security Measures<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In order to lessen the effects of identity theft and crimes committed online, it is advisable to regularly monitor bank and credit card statements.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"system-and-software-protection\"><span class=\"ez-toc-section\" id=\"System_And_Software_Protection\"><\/span>System And Software Protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep your operating system updated to deter hackers from accessing your computer.<\/li>\n\n\n\n<li>By keeping your computer updated, you can stop attackers from taking advantage of software flaws that could otherwise give them access to your system and allow them to hack it for illegal purposes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"password-security-best-practices\"><span class=\"ez-toc-section\" id=\"Password_Security_Best_Practices\"><\/span>Password Security Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For online activities like online banking, it is best to use eight-character strong passwords that are both unique and secure.<\/li>\n\n\n\n<li>Avoid using passwords that are easily traceable, such as your email address, login name, last name, date of birth, or month of birth.<\/li>\n\n\n\n<li>You shouldn&#8217;t use the same password for each online service you use.<\/li>\n\n\n\n<li>Keep various passwords on hand for various internet activities.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"two-factor-authentication\"><span class=\"ez-toc-section\" id=\"Two-Step_Authentication\"><\/span>Two-Step Authentication<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To secure your webmail or social media account, enable two-step authentication in the webmail.<\/li>\n\n\n\n<li>Add your cell phone number to your email account so you can be alerted if someone tries to access your account.<\/li>\n\n\n\n<li>Your username and password are necessary to open your account with two-step authentication.<\/li>\n\n\n\n<li>However, for your personal protection, a verification code is sent to your listed mobile number if you forget your password.<\/li>\n\n\n\n<li>Even if a hacker is able to guess your password, he or she will be unable to access your account without the temporary verification code.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"summary-of-preventive-measures\"><span class=\"ez-toc-section\" id=\"Summary_Of_Preventive_Measures\"><\/span>Summary Of Preventive Measures<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Category<\/th><th>Key Action<\/th><\/tr><\/thead><tbody><tr><td>Awareness<\/td><td>Educate individuals about cyber laws and cybercrimes<\/td><\/tr><tr><td>Financial Safety<\/td><td>Monitor bank and credit card statements regularly<\/td><\/tr><tr><td>System Security<\/td><td>Keep operating systems updated<\/td><\/tr><tr><td>Password Protection<\/td><td>Use strong and unique passwords<\/td><\/tr><tr><td>Authentication<\/td><td>Enable two-step verification<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>India is one of the most densely populated countries in the world with accumulating wealth and a firm base in the development era. To accommodate peace and harmony in this emerging population a well-defined legal system is to be defined in the place. Many laws have been enacted and then amended to the arising need of the crimes prevailing in society.<\/p>\n\n\n\n<p>The foremost law is the constitution of India. Every law made in India is discussed with the relevance of social, political, economic, and cultural scenarios of the ongoing time. However, the beginning of the internet led to the arrival of new, unexpected, and complex legal issues. Nobody could anticipate the arrival of internet crimes and thus it was impossible for the draftsmen of our laws to visualize the need of cyber laws in the country.<\/p>\n\n\n\n<p>Despite having acumen brains and cognitive abilities they were not aware of the idea that the internet invention we all are proud of can also turn into a disadvantaged face of society leading to crimes and illegal activity happening via the computer and electronic devices. Hence enactment of new relevant laws was in need to cope up with the emerging cyberspace. The information technology act was made to give legal recognition to the laws pertaining to internet misconduct and provide protection to the victims of computer-based crimes. This internet technology is widely used in different parts of the world and this law ensures security procedures for the citizens of India.<\/p>\n\n\n\n<p>This paper focuses on the evolution of cyber laws to provide legal security and put a stop to the steady growth of these crimes. Cybercrimes touch all aspects of illegal transactions, unauthorized computer trespassing, stealing secret information and data, the transmission of obscene material, and computer vandalism, and also cybercrimes are done against persons, property, and government.<\/p>\n\n\n\n<p>India is turning into a digitalized world now and everybody is getting dependent on computers and internet devices to keep their valuable data. Technology is like 2 sides o the coin but now the evil side is what coming to notice; hence it is the duty of governing law-making bodies should ensure that technological advancement over the internet should run in a healthy manner and divert the invention into legal as well as a right entity. Cyber laws came into being for the surreal running of our country in good deeds.<\/p>\n\n\n\n<p>It\u2019s very important for our country to have control over the increasing crime rate to ensure safety and a protective environment where citizens feel proud to live but not in a fear of getting trapped in this vicious circle of criminal conduct. Laws are made with the view that citizens of our country can sleep peacefully and hence observe the destructive activities in the ongoing state. Evolution is very important in every aspect either law, technology, etc to match the growing needs of society as time changes everything.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bibliography\"><\/span>Bibliography<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mishra J.P., An Introduction to Cyber Laws, Central Law Publications: First Edition: 2012<\/li>\n\n\n\n<li>Pavan Duggal, Textbook on Cyber Laws, Universal Law Publishers, 2014 Edition<\/li>\n\n\n\n<li>Gupta &amp; Agarwal, Cyber Law; 1st Edition, Premiere Publishing Company<\/li>\n\n\n\n<li>Cyber and E-Commerce Laws, P. M. Bakshi and R. K. Suri<\/li>\n\n\n\n<li>Indian Penal Code 1860 by K.D. Gaur<\/li>\n\n\n\n<li>Sowmya, \u2018Crime: A Conceptual Understanding\u2019 (Indian Journal of Applied Research, October 2011)<\/li>\n\n\n\n<li>Hema Modi, \u2018All you need to know about hacking\u2019 (ipleaders, 23 October 2021)<\/li>\n\n\n\n<li>\u2018India records 36.29 lakh cyber security incidents since 2019 till June this year, says Govt\u2019 (The Economic Times, 19 July 2022)<\/li>\n\n\n\n<li>Banker&#8217;s Book Evidence Act 1891<\/li>\n\n\n\n<li>Information Technology Act 2000, Section 43<\/li>\n\n\n\n<li>M.P. No. 1772 of 2019<\/li>\n\n\n\n<li>Cyber Crime P.S. Case No. 01 of 2020<\/li>\n\n\n\n<li>(2013) 12 SCC 73<\/li>\n\n\n\n<li>2015 SCC OnLine SC 1242<\/li>\n\n\n\n<li>(2018) 253 DLT 728<\/li>\n\n\n\n<li>CC No. 4680 of 2004<\/li>\n\n\n\n<li>http:\/\/iibf.org.in\/documents\/Cyber-Laws-chapter-in-Legal-Aspects-Book.pdf<\/li>\n\n\n\n<li>http:\/\/www.slideshare.net\/bharadwajchetan\/an-introduction-to-cyber-law-it-act-2000-india<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"End-Notes\"><\/span>End-Notes:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Indian Evidence Act 1872<\/li>\n\n\n\n<li>Banker&#8217;s Book Evidence Act 1891<\/li>\n\n\n\n<li>Hema Modi, \u2018All you need to know about hacking\u2019 (ipleaders, 23 October 2021)<\/li>\n\n\n\n<li>AIR 2018<\/li>\n\n\n\n<li>Cr. M.P. No. 1772 of 2019<\/li>\n\n\n\n<li>(2018) 253 DLT 728<\/li>\n\n\n\n<li>CC No. 4680 of 2004<\/li>\n\n\n\n<li>Mishra J.P., An Introduction to Cyber Laws, Central Law Publications: First Edition: 2012<\/li>\n\n\n\n<li>\u2018India records 36.29 lakh cyber security incidents since 2019 till June this year, says Govt\u2019 (The Economic Times, 19 July 2022)<\/li>\n\n\n\n<li>Mishra J.P., An Introduction to Cyber Laws, Central Law Publications: First Edition: 2012<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Introduction A man was discovered from a fauna creature that further evolved to be a human being. From fire to ovens, from animal skins to passable clothing, we are the revolutionaries of materialized things turning coal into diamonds with our cognitive capabilities. From advancing as an ape to a human, time passed by with the<\/p>\n","protected":false},"author":1368,"featured_media":21867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"_joinchat":[],"footnotes":""},"categories":[66],"tags":[5277,28],"class_list":{"0":"post-21868","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-law","8":"tag-cyber-law","9":"tag-top-news"},"jetpack_featured_media_url":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-12-2026-at-01_44_03-AM.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/21868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/users\/1368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/comments?post=21868"}],"version-history":[{"count":2,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/21868\/revisions"}],"predecessor-version":[{"id":21927,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/21868\/revisions\/21927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/media\/21867"}],"wp:attachment":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/media?parent=21868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/categories?post=21868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/tags?post=21868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}