top of page

Role of Cyber Laws in Precluding Cyber Crimes


AUTHOR: KETHAM MADHURI, DY PATIL COLLEGE OF LAW, NAVI MUMBAI , MAHARASHTRA


ABSTRACT

“Cybercrime- A real threat to the real world”. This research paper presents about cyber-crimes occurring in our society. Analyses and discusses provisions of cyber laws which prevent cyber-crimes in the society. Discuss about cyber security. Mentions about possible measures that has to be followed by individuals to prevent cyber-crimes. Also mentions special measures related to protecting children from cyber-attacks.


KEYWORDS

Cyber law, cyber security, cyber space, cyber-crime, information technology.


INTRODUCTION

In this digital world where the dependency on the digital space is growing dramatically, the threat to digital space data is also increasing which is leading to an increase in cyber-crimes in the society. Every aspect of day-to-day life is dependent on mobiles, laptops. There is a great chance of infringement of your professional data and your personal data. Nowadays we are witnessing that children are getting affected by these cyber-attacks like- cyber bullying, cyber stalking. which can cause a negative impact on the children.

Cybercrime is infringement of your personal and professional data in cyberspace by using electronic devices as medium.


REASONS FOR CYBER CRIMES

Cyber criminals mainly perform cybercrimes for financial benefits, to cause major loss to the companies, persons and with an intention to defame others cyber criminals perform various acts.


TYPES OF CYBER CRIMES

Identity theft, Phishing, online financial fraud, hacking, cyber bullying, cyber stalking, spyware, credit card fraud, Ransomware, Data infringement etc.


CYBER LAWS

These laws provide provisions related to cyber security, data protection rights to the individuals, prevention of cyber-crimes, punishments for the cyber criminals.

The Indian government had introduced the information technology act (IT) of 2000 and the digital personal data protection act (DPDPA) of 2023.

Right to privacy is a fundamental right under article 21 of the Indian constitution.

The fight against cybercrime needs a comprehensive approach. Given that technical measures alone cannot prevent any crime, it is crucial that law enforcement agencies investigate and prosecute cybercrime effectively.


ANALYSIS OF PROVISIONS IN IT ACT 2000

CHAPTER-3 of IT act 2000- deals with electronic governance, which includes:

  • Legal recognition of electronic records

  • Legal recognition of electronic signatures

  • Detention of electronic records

  • This section also specifies rules and regulations that have to be followed while publishing in electronic gazette.

CHAPTER-5 of IT act 2000- deals with securing of electronic records and securing signature:

SECTION- 16: Security procedure and practices

  • This section provides provisions regarding the procedure that has to be followed to secure the data and what are the practices that must be implemented to secure data and to avoid infringement of data.

CHAPTER-8 of IT act 2000- deals with duties of subscribers:

SECTION-40: Specifies provisions of generating key pair

SECTION-41: Signifies provisions for accepting of digital signature certificate

SECTION-42: Provisions related to control of private key

These are all the provisions provided in IT act 2000 for attaining data security which helps to prevent cyber-crimes.

CHAPTER-10 of IT act 2000-deals with appellate tribunals:

  • The aggrieved person or the individual who is suffering from cyber-attacks can file an appeal for claiming their data privacy rights in these appellate tribunals.

CHAPTER-11 of IT act 2000- deals with various offences

SECTION- 65: Tampering with computer source documents

SECTION-66: computer related offences

SECTION-66 C: Deals with various punishments for identity theft, cheating, violation of privacy, cyber terrorism and for transmitting obscene material in electronic form

SECTION 70 A: National nodal agency 

SECTION 70 B: Indian computer emergency response team to serve as national agency for incident response

SECTION 72: Penalty for breach of confidentiality and privacy


DETAILED ANALYSIS OF IT (INTERMEDIARY GUIDELINES & DIGITAL MEDIA ETHICS CODE) RULES 2021

PART 2: Deals with due diligence by intermediaries & grievance redressal mechanism

  • Due diligence related to social media, online gaming, news & current affairs content.

PART 3: Signifies provisions regarding code of ethics & procedure & safeguards in relation to digital media.

RULE 9- Provides 3 tier structure for observance and adherence to the code

  • Level 1- self-regulating by the publishers

  • Level 2- self regulation by the self-regulating bodies of the publishers

  • Level 3- Oversight mechanism by central government

Hence, if we follow all the above discussed provisions provided by it act 2000 and its rules, we can safeguard ourselves and the cyber space from cyber-crimes.


DETAILED ANALYSIS ON DIGITAL PERSONAL DATA PROTECTION ACT, 2023

This act is also known as DPDP Act- 2023 which provides provisions for the processing of digital personal data in a manner that recognises both the right of individuals to protect their professional data and the need to process such personal data for lawful purposes.

CHAPTER-2: provides provisions related to grounds for processing personal data.

SECTION- 10: provides additional obligations of significant data fiduciary.

The Central Government may notify any Data Fiduciary or class of Data Fiduciaries as significant Data Fiduciary, on the basis of an assessment of such relevant factors as it may determine, including;

  • Risk of rights of Data Principle

  • Risk of electoral democracy

  • Security of the state

  • The volume and sensitivity of personal data processed

  • Public order

CHAPTER-8: PENALTIES AND ADJUDICATION

While determining the amount of monetary penalty to be imposed, the board shall consider the following matters:

  • The nature, gravity and duration of the breach.

  • The type and nature of the personal data affected by the breach.

  • Respective nature of the breach.

  • Whether the person, as a result of the breach, has realised a gain or avoided any loss.

  • whether the monetary penalty to be imposed is proportionate and effective, having regard to the need to secure observance of and deter breach of the provisions of this act.

  • Whether the person took any action to mitigate the effects and consequences of the breach, and the timeliness and effectiveness of such action.

These are the provisions related to digital data protection that one must follow to protect their digital data from cyber-attacks.


DETAILED ANALYSIS THE CHILDREN’S ONLINE PRIVACY PROTECTION ACT(COPPA)

The Children's Online Privacy Protection Act (COPPA) is a federal law that protects the personal information of children under 13 years of age.

The act was passed in response to a growing awareness of internet marketing techniques that targeted children and collected their personal information from websites without any parental notification.

This act applies to online services, apps, websites and other devices that are directed to children under 13 or collect personal information from them.

ESSENTIALS:

Operators shall:

  • Obtain verifiable parental consent before collecting, using or disclosing a child’s personal information.

  • Allow parents to protect further use.

  • Notify parents of their information practices.

  • Provide parents access to their child’s personal information.

  • Include a link to the operators online of its data collection practices in any notice sent to a parent.

  • Protect the confidentiality, security and integrity of the personal information.

  • Right to revoke consent and have information deleted.

  • Limited collection of personal information when a child participates in online games and contests.

These are the essentials that an operator shall follow to avoid cyber-attacks related to children.


MEASURES TO BE FOLLOWED TO PREVENT CHILDREN FROM CYBER CRIMES

  • Create awareness about cyber crimes 

  • Parents have to keep an eye on their children on what type of content their children are watching.

  • Create strong key passwords

  • Advise your children that they should not talk to strangers on WhatsApp, Instagram, telegram etc.

  • Parents should try to spend more time with children so that children can decrease their screen time slowly.

  • Establish more cyber-crime police stations to ensure speedy justice to the victims.

  • Recently Delhi high court organises online workshop to create awareness on child sexual abuse and also launched cyber awareness interactive videos.


DETAILED ANALYSIS ON CYBER SECURITY ACT- 2012

This act was developed in response to an increasing number of cyber attacks on both private companies and the United States government. As the country increasingly relies upon the internet to conduct business, the critical services upon which we rely have become increasingly vulnerable to cyber threats.

Provisions

  • Determine the greatest cyber vulnerabilities

  • Protect our most critical infrastructure

  • Protect and promote innovation

  • Improve information sharing while protecting privacy and civil liberties

  • Improve the security of the federal government’s networks

  • Strengthen the cybersecurity workforce

  • Coordinate cybersecurity research and development


CONCLUSION

Through this article we can gain a brief knowledge about cyber-crimes, types of cyber-crimes, what measures that have to be followed in reducing cyber-attacks and role of cyber laws in precluding cyber-crimes. This article also provides detailed analysis of various provisions related to cyber-crimes that has to be followed in precluding cyber-attacks through which the digital data privacy of an individual is protected. This article also provides detailed analysis on various acts like-information technology act, information technology rules and guidelines and digital media ethics code, cyber security act, children’s online Privacy protection act.


REFERENCES
  1. Information Technology Act- 2000

  2. Information Technology (Intermediary Guidelines & Digital Media Ethics Code) Rules- 2021

  3. Information of cyber laws and cyber-crimes by live law

  4. The Cyber Security Act of 2012

  5. Children’s online Privacy Protection Act 

  6. Digital Personal Data Protection Act,2023 from- Ministry of Electronics and Information Technology

bottom of page