Professional Documents
Culture Documents
ABSTRACT
INTRODUCTION
Data theft under Section 43 (b) of Information Technology (Amendment) Act, 2008 is
dealt as - If any person without permission of the owner or any other person, who is in
charge of a Computer, its system or network - downloads, copies or extracts any data,
computer data base or information from such computer, its system or network including
Data diddling is the performing unauthorized modifications to data prior or during input
into a computer or computer system by means of . It data entry, a virus that changes data,
the programmer of the database or application, exchanging valid disks and tapes with
modified replacements.
The Internet Security Glossary (Shirley,2000) defines Denial of Service ( commonly named
DOS attack) as “The prevention of authorised access to a system resource or the delaying of
system operations and functions.” It is a technology driven cyber intrusion, where the
cyber criminal floods the networks bandwidth or blocks the user’s mails with spam mails
depriving the user, access to the Internet and the services provided there from. There are
three basic types of attack; consumption of computational resources, such as bandwidth,
disk space, or central processing unit (CPU) time, disruption of configuration
information, such as routing information and disruption of physical network
components. The provision for this was made in section 43(f ) of IT amendment Act,
2008, which stated that denies or causes the denial of access to any person authorised to
access any computer, computer system or computer network by any means. Any person
who damages or causes to damage shall be liable to damages by way of compensation to
the person so affected. Section 368 of Indian Penal Code, 1860 defines Web-Jacking. It
may also cover instances related to spamming, etc;.
An e-mail bomb is a form of net abuse consisting of sending huge volumes of e-mail to
an address in an attempt to overflow the mailbox or overwhelm the server where the
email address is hosted in a denial-of-service attack. Mass mailing consists of sending
numerous duplicate mails to the same email address.
2.7.2 Spam
Spam is describe as the emission of unsolicited bulk messages. Offenders send out
millions of e-mails to users, often containing advertisements for products and services,
but frequently also malicious software. Since the first spam e-mail was sent in 1978, how
ever, today e-mail provider organizations report that as many as 85 to 90 per cent of all e-
mails are spam. While this has not been mentioned specifically but this can be interpreted
in the provisions mentioned in section 66A of IT amendment Act, 2008. Through this
section, sending of menacing, annoying messages and also misleading information about
the origin of the message has become punishable with imprisonment up to three years and
fine.
2.7.3 Vishing
Vishing is the practice of using social engineering over the system, most often using
features facilitated by Voice over IP (VoIP), to gain access to private personal and
financial information from the public for the purpose of financial reward. The term is a
combination of “voice” and phishing.
Section 66F of IT amendment act 2008 talks about acts of cyber terror which threatens
the unity, integrity or sovereignty of India or strike terror in the people or any section of
the people include a. Denial of service of resources in use by nation b. Attempting to
penetrate or access a computer resource without authorization or exceeding authorized
access c. Introducing or causing to introduce any computer contaminant likely to cause
death or injuries to person or damage to or destruction of property or disrupts or knowing
that it is likely to cause damage or disruption of supplies or services essential to the life
of the community or d. knowingly or intentionally penetrates or accesses a computer
resource without authorisation or exceeding authorised access, and by means of such
conduct obtains access to information, data or computer database that is restricted for
reasons for the security of the State or foreign relations, or any restricted information,
data or computer database, with reasons to believe that such information, data or
computer database so obtained may be used to cause or likely to cause injury to the
interests of the sovereignty and integrity of India, the security of the State, friendly
relations with foreign States, public order, decency or morality, or in relation to contempt
of court, defamation or incitement to an offence, or to the advantage of any foreign
nation, group of individuals or otherwise, commits the offence of cyber terrorism. These
acts have been made punishable with Imprisonment which may extend to imprisonment
for life.
2.11 Pornography
Pornography is verbal or pictorial material which represents or describes sexual behavior
that is degrading or abusive to one or more of the participants in such a ways as to
endorse the degradation. Behavior that is degrading or abusive includes physical harm or
abuse and physical or psychological coercion. In addition, behavior that ignores or
devalues the real interest, desires and experiences of one or more participants in any way
is degrading. Finally that a person has chosen or consented to be harmed, abused, or
subjected to coercion does not alter the degrading character of such behavior. Section 67
B of IT amendment act 2008 is attempt to address the issue of child pornography.
Through this section it has made the publication or transmission of material in any
electronic form which depicts children engaged in sexually explicit act or conduct, any
one who creates, facilitates or records these acts and images punishable with
imprisonment of five years and fine which may extend up to ten lakhs in first offence and
seven years and fine of ten lakhs on subsequent offence.
DISCUSSION
The Minister of State for Communications & Information Technology, India had
informed the Rajya Sabha that cyber crimes are on the rise in the country and also
address the growing threat of Cyber Crimes in the country, the Government has evolved
an integrated approach with the legal, technical and administrative steps.(PIB,2012).This
statement indicates the seriousness to curb cyber crime in India. The Information
Technology Act provides legal framework to address various types of cyber crimes and
prescribes punishment for such crimes.Under the IT Act 2000, criminal offences were
specified under Sections 65,66 and 67 of Chapter XI (“Offences”). The Chapter IX of
IT Amendment Act 2008,contains sections 43 to 47 which describe different nature of
penalties, appointment of adjudication Officer for holding an inquiry in relation to certain
computer crimes and for awarding compensation or damages for certain types of
computer frauds and Chapter XI deals with some computer crimes and provides for
penalties for these offences. It contains sections 65 to 78. The table 1 describes
cybercrimes, section under which the crime is punishable and its respective punishment.
44 (b) Failing to file any return or furnish any Penalty not exceeding Rs. 05 Thousand
information or other document within the for every day during which such failure
prescribed time continues.
44(c) For not maintaining books of account or Penalty not exceeding RS. 10 Thousand
records for every day during which such failure
continues.
45 Offences for which no penalty is separately Compensation of RS. 25 Thousand
provided
65 Tampering with computer source Imprisonment up to three years or with
documents fine which may extend up to RS. 02
Lakhs or both
68 Failing to comply with the directions of the Imprisonment upto three years and fine
controller upto RS. 02 Lakhs or both
Appendix 1 describes the Cyber Crime and relevant section of ITAA 2008 and IPC 1860.
CONCLUSION
Technology is always a double-edged sword. Society that is dependent more and more on
technology cyber crimes are bound to increase because bytes are replacing bullets in the
crime world. There will always be new and unexpected challenges to stay ahead of cyber
criminals and cyber terrorists but we can win only through partnership and collaboration
of both individuals and government. Hence, it is responsibilities of the law makers have
to go the extra mile compared to the fraudsters, to keep them at bay. The Information
Technology Act 2000 was first step in India for securing internet based transactions or
communication. The existing provisions along with the additional / revised provisions
under the IT Amendment, Act 2008 provide for criminal prosecution and stringent
monetary penalties that are likely to act as effective deterrents to curb the cyber crime
from Indian society. Introduction of several provisions in the IT Amendment Act, 2008,
are extremely essential in today’s business environment as several Indian companies
providing services to or in conjunction with foreign entities handle large amounts of data
that are accessed and/or processed by their employees. There are some avoidable
loopholes in the act as cyber Stalking, cyber squatting etc., which need to be proper
combating. History is the witness that no legislation has succeeded in totally eliminating
crime.
REFERENCE
[1] Brooks, F.D. and Davenport, T.H. (2004), ‘Enterprise systems and the supply chain’,
Journal of Enterprise Information Management, Vol. 17, No. 1, pp.8–19.
[2] Chou, D.C.,Tan, X.and Yen,D.C. (2004),‘Web technology and supply chain
management’, Information Management & Computer Society,Vol.12, No. 4, pp.338–349.
[3]Cyber Crimes: Law And Practice, Government of Kerala,
http://www.img.kerala.gov.in/docs/downloads/cyber%20 crimes.pdf, April 05, 2013.
[ 4 ] Leena ,N (2011), ‘Cyber Crime Effecting E-commerce Technology’, Oriental Journal of
Computer Science & Technology Vol. 4(1), pp 209-212.
[5] Malgi , Shashirekha(2012), ‘Cyber Crimes under Indian IT Laws’, International Journal of
Scientific & Engineering Research Volume 3, Issue 6, http://www.ijser.org
[6] Muthukumaran ,B. (2008) ‘ Cyber Crime Scenario in India’, Criminal Investigation
Department Review – January , pp 17-23
[7] Press Information Bureau, Govt. of India, Ministry of Communications &
Technology, March, 27, 2012,http://pib.nic.in/newsite/erelease.aspx?relid=81764.
[8] Sanchez, A. and Perez, M. (2003),‘The use of EDI for interorganisational co-
operation and co-ordination in the supply chain’, Integrated Manufacturing Systems, Vol.
14, No. 8, pp.642–651.
[9] Shirley, R. GTE / BBN Technology. 2000. Internet Security Glossary. RFC2828.
[10 Talwant Singh, ‘Cyber Law & Information Technology’, http://www.indlii.org/CyberLaw.aspx,
March 08, 2013.
[11] The Information Technology (Amendment) Bill, 2008,Ministry Of Law, Justice And
Company Affairs (Legislative Department), New Delhi, India, February 05,2009.
http://www.mit.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf, April 04, 2013.
[12] Wow Essay (2009), Top Lycos Networks,http://www.wowessays.com/dbase/ab2/
nyr90.shtml,March 04,2013
Danish Ali Khan is an Associate Professor at NIT, Jamshedpur. He had obtained PhD in Computer
Application from NIT, Jamshedpur, India. He has held many administrative responsibilities like, Deputy
Registrar, member of Computer Committee, Assistant Controller of Examination, College Inspection
committee, etc. He has teaching experience of more than 15 years in field Computer application and 4 years
industrial experience. His research interest includes supply chain management, operations research and
Computer Application and also guiding and supervising the research scholar in this area. He has contributed
in Int.J. Business Performa and Supply Chain Modelling, MT & M,AMSE Modelling, AMSE Journal of
Production Engineering and Management Organisation. He is also reviewer of AMSE Journal France. He is
a member of professional bodies like ISTE India.
Appendix1 Cyber Crime and relevant section of ITAA 2008 and IPC 1860