Chapter-6: Cyber Law
Section A: Introduction
1. What
is Cyber Law?
Cyber Law, also known as Internet Law, governs
activities conducted on the internet and digital transactions. It encompasses
laws related to digital communication, online transactions, data protection,
privacy, and cybercrimes.
2. Need
for Cyber Law
The rapid growth of the internet and digital
technologies has increased the need for regulations to:
Protect
users from cybercrimes like hacking and phishing.
Ensure
secure online transactions and ecommerce.
Protect
personal data and privacy.
Regulate
electronic communications and digital signatures.
3.
History of Cyber Law in India
India's journey in cyber law began with the Information Technology Act, 2000, which aimed to provide legal recognition to electronic transactions and address cybercrimes. This was a landmark step in ensuring the legal framework kept pace with technological advancements.
Section B: Meaning and Definitions
1.
Electronic Transactions
Electronic transactions refer to the exchange of
money or data over electronic systems, such as online banking, ecommerce, and
electronic fund transfers. For example, buying a book from an online store
involves an electronic transaction.
2. Ecommerce
Ecommerce, or electronic commerce, is the buying
and selling of goods and services over the internet. Examples include online
shopping platforms like Amazon and Flipkart.
3. Ebanking
Ebanking, or electronic banking, allows
customers to conduct financial transactions via the internet. This includes
services like online fund transfers, bill payments, and account management.
4.
Electronic Signature
An electronic signature is a digital form of a
signature used to authenticate documents and transactions. For instance,
signing a PDF document using a digital signature tool.
5.
Hacking
Hacking is the unauthorized access to or control
over computer systems and networks. An example is breaking into someone's email
account without permission.
6.
Phishing
Phishing is a cybercrime where attackers
disguise themselves as trustworthy entities to steal sensitive information like
usernames, passwords, and credit card details. For instance, receiving a fake
email from a bank asking for login credentials.
7.
Malware
Malware, short for malicious software, refers to
software designed to harm or exploit any programmable device, service, or
network. Examples include viruses, trojans, and ransomware.
8.
Cookies
Cookies are small data files stored on a user's
computer by websites to track online activity and preferences. For example, an
online store using cookies to remember items in a shopping cart.
9. Spam
Spam refers to unsolicited and often irrelevant
messages sent over the internet, usually to a large number of users. An example
is receiving unwanted advertising emails.
10.
Firewall
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted network and untrusted networks, such as the internet.
Section
C: Scope of Cyber Law
Cyber Law covers a wide range of issues:
1. Online
Contracts
These are agreements made over the internet,
such as terms and conditions accepted while signing up for an online service.
Cyber law ensures these contracts are legally binding.
2. Ecommerce
Regulation
Regulations govern online businesses to protect
consumers, ensure fair trade practices, and secure online transactions. This
includes laws on data protection and consumer rights.
3.
Consumer Rights
Cyber law protects consumers from fraud,
misrepresentation, and unfair practices in online transactions. For example,
ensuring a customer receives the product they ordered online.
4.
Identity/Data/Funds Theft
Cyber law addresses crimes related to identity
theft, data breaches, and unauthorized access to funds. For instance, laws
against hacking and phishing protect users' personal information and financial
assets.
5. Fraud
and Forgery
Laws against digital fraud and forgery prevent
activities like creating fake documents or transactions to deceive others. An
example is forging a digital signature to access sensitive information.
6.
Hacking
Cyber law criminalizes unauthorized access to computer systems and networks. This includes measures to prevent, detect, and prosecute hacking activities.
Section D: Cyber Safety and Security
1.
Meaning
Cyber safety refers to the practices and
measures taken to protect individuals and organizations from cyber threats and
crimes. It involves ensuring the security of information systems, networks, and
data.
2. Steps
to Ensure Cyber Safety
Use
Strong Passwords: Create complex passwords and change them regularly.
Install
Security Software: Use antivirus and antimalware programs to protect against
threats.
Update
Systems Regularly: Keep operating systems and software up to date to patch
security vulnerabilities.
Be
Cautious with Emails: Avoid opening suspicious emails or clicking on unknown
links.
Enable TwoFactor Authentication: Add an extra layer of security to accounts by requiring a second form of verification.
Section E: Information Technology Act, 2000
1.
Overview
The Information Technology Act, 2000 (IT Act)
was enacted to provide legal recognition for electronic transactions and combat
cybercrimes. It covers various aspects, including digital signatures,
cybercrime prevention, and data protection.
2.
Emphasis on Section 66A
Section 66A of the IT Act dealt with the
punishment for sending offensive messages through communication services. It included
penalties for sending:
Grossly
offensive or menacing content.
False
information causing annoyance, inconvenience, or danger.
Emails
intended to deceive or mislead the recipient.
However, Section 66A was struck down by the Supreme Court of India in 2015, as it was deemed unconstitutional and violative of freedom of speech and expression under Article 19(1)(a) of the Indian Constitution.
References
1. Information Technology Act, 2000, India.
2. Indian Penal Code, 1860, India.
3. Vakul Sharma, Information Technology: Law and
Practice, Universal Law Publishing.
4. Apar Gupta, Commentary on Information
Technology Act, LexisNexis.
5. Pavan Duggal, Cyber Law: The Indian Perspective, Saakshar Law Publications.
Comments
Post a Comment