Anda di halaman 1dari 51

Information Technology Act 2000

Rather than giving Information and Technology gives rise to more Cyber crimes

Submitted To: Prof. Anant Amdekar Submitted By: Abhimanyu Mundra Bhavana Lohia Geetesh Thakur Himanshu Shah

Jugal Shah Keshwanand Pandey Kirti Shahu

Information Technology Act 2000

Table of Content Sr. No.


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Advantages of IT Act Shortcomings of IT Act NASSCOMs Contribution to IT in India Introduction to Cyber Crime Defining Cyber Crime Types of Cyber Crime Cyber Crime Statistics of India Types of Cyber Criminals Some of important Definition Writing requirements Penalties for Computer Crimes Police Powers Digital Signature Possible use of E-Governance MCA21 project under E-Governance Contribution of Information Technology in Banking Sector Comparison between India & China Some Indian Case Studies Conclusion Suggestion Bibliography

Particulars
Introduction of Information Technology Act, 2000 (IT Act)

Page No.
3 5 6 7 10 13 14 21 22 23 24 24 25 26 28 29 33 36 40 46 48 49

Information Technology Act 2000

Information Technology Act 2000


Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities in this limitless new universe are increasing incessantly, laws must be formulated to monitor these activities. Some countries have been rather vigilant and formed some laws governing the net. In order to keep pace with the changing generation, the Indian Parliament passed the much-awaited Information Technology Act, 2000 .As they say, "Its better late than never". However, even after it has been passed, a debate over certain controversial issues continues. A large portion of the industrial community seems to be dissatisfied with certain aspects of the Act. But on the whole, it is a step in the right direction for India. The Information Technology Act 2000 regulates the transactions relating to the computer and the Internet. The objectives of the Act as reflected in the Preamble to the Act are: 1. The Preamble to the Act states that it aims at providing legal -recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information and aims at facilitating electronic filing of documents with the Government agencies. 2. To facilitate electronic filing of the document with the government of India. 3. To give legal recognition to digital signature for accepting any agreement via computer. 4. According to I.T. Act 2000, any company can store their data in electronic storage.

Information Technology Act 2000

5. To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime. The General Assembly of the United Nations had adopted the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law (UNCITRAL) in its General Assembly Resolution A/RES/51/162 dated January 30, 1997. The Indian Act is in keeping with this resolution that recommended that member nations of the UN enact and modify their laws according to the Model Law. Thus with the enactment of this Act, Internet transactions will now be recognized, on-line contracts will be enforceable and e-mails will be legally acknowledged. It will tremendously augment domestic as well as international trade and commerce. The Information Technology Act extends to the whole of India and, saves as otherwise provided in this Act, it applies also to any offence or contravention there under committed outside India by any person. However The Act does not apply to: 1. A negotiable instrument as defined in section 13 of the Negotiable Instruments Act,1881; 2. A power-of-attorney as defined in section 1A of the Powers-ofAttorney Act, 1882; 3. A trust as defined in section 3 of the Indian Trusts Act, 1882; 4. A will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called; 5. Any contract for the sale or conveyance of immovable property or any interest in such property; 6. Any such class of documents or transactions as may be notified by the Central Government in the Official Gazette. Information Technology Act 2000 5

Advantages of I.T. Act 2000:1. Helpful to promote e-commerce Email is valid Digital signature is valid. Payment via credit card is valid. Online contract is valid Above all things validity in eye of Indian law is very necessary. After making IT act 2000, all above things are valid and these things are very helpful to promote e-commerce in India. 2. Enhance the corporate business After issuing digital signature, certificate by Certifying authority, now Indian corporate business can enhance. 3. Filling online forms After providing facility, filling online forms for different purposes has become so easy. 4. High penalty for cyber crime Law has power to penalize for doing any cyber crime. After making of this law, nos. of cyber crime has reduced.

Information Technology Act 2000

Shortcoming s of I.T. Act 2000:1. Infringement of copyright has not been included in this law. 2. No protection for domain names. 3. The act is not applicable on the power of attorney, trusts and will. 4. Act is silent on taxation. 5. No, provision of payment of stamp duty on electronic documents

Information Technology Act 2000

NASSCOMs contribution to IT in India:


NASSCOM is India's National Association of Software and Service Companies, the premier trade body and the chamber of commerce of the IT software and services industry in India. NASSCOM is a global trade body with over 1100 members, of which over 250 are global companies from the US, UK, EU, Japan and China. NASSCOM's member companies are in the business of software development, software services, software products, IT-enabled/BPO services and e-commerce. NASSCOM was set up to facilitate business and trade in software and services and to encourage advancement of research in software technology. It is a not-for-profit organization, registered under the Societies Act, 1860. NASSCOM has been the strongest proponent of global free trade in India. NASSCOM is committed to work proactively to encourage its members to adopt world class management practices, build and uphold highest quality standards and become globally competitive. In India and around the world, NASSCOM members are participants in the new global economy and are reputed for their cutting-edge business practices and social initiatives. NASSCOM's Vision NASSCOM's vision is to establish India as the 21st century's software powerhouse and position the country as the global sourcing hub for software and services. NASSCOM Membership NASSCOM welcomes as members, companies and firms that are incorporated and/or are registered in India, which have made and will make positive contributions to the IT industry in India and globally. Member companies are expected to comply with the Associations code of conduct. Membership Strength The membership of NASSCOM has been steadily increasing. In 1988, NASSCOM had 38 members, who together contributed close to 65 percent of the revenue of the software industry. Since then, membership of NASSCOM has grown multifold to reach over 1100 members. These members currently account for over 95 percent of the revenues of the software industry in India. Here is a list of prominent members of executive council of NASSCOM.

Som Mittal - President of NASSCOM for 2009-2010 Pramod Bhasin - Chairman of NASSCOM(former) Harsh Manglik -Chairman of NASSCOM for 2010-2011 Mr. Rajendra S. Pawar as the new Chairman of its Executive Council for the year 2011-2012 (April 26, 2011)

Information Technology Act 2000

Aims and Objectives The primary objective of NASSCOM is to act as a catalyst for the growth of the software driven IT industry in India. Other goals include facilitation of trade and business in software and services, encouragement and advancement of research, propagation of education and employment, enabling the growth of the Indian economy and provide compelling business benefits to global economies by global sourcing. NASSCOM also endeavors to leverage IT and narrow the digital divide in India and enable her citizens to enjoy the benefits of IT. It also boosts the process of Innovation; IT workforce development and enhance cyber security. NASSCOM is achieving its objectives by following a seven fold strategy:

Partner with Government of India and State Governments in formulating IT policies and legislation. Partner with global stakeholders for promoting the industry in global markets. Strive for a thought leadership position and deliver world-class research and strategic inputs for the industry and its stakeholders. Encourage members to uphold world class quality standards. Strive to uphold Intellectual Property Rights of its members. Strengthen the brand equity of India as a premier global sourcing destination. Expand the quantity and quality of the talent pool in India. Continuous engagement with all member companies and stakeholders to devise strategies to achieve shared aspirations for the industry and the country.

Partnership with the Government NASSCOM acts as an advisor, consultant and coordinating body for the software and services industry in India. NASSCOM has representatives in various committees in the Government of India including the Ministry of Information Technology, Ministry of Commerce, the Ministry of Finance, Department of Telecommunication, Ministry of Human Resources Development, Ministry of Labor and the Ministry of External Affairs. NASSCOM also acts as a consulting body for various State Governments in India. NASSCOM has played a key role in enabling the government in India to develop industry friendly policies. NASSCOM has been a proponent of free trade, arguing for zero tariff protection, strong intellectual property and data protection laws, deregulation of the telecom market and the creation of software technology parks and private sector participation in the education system - measures which have resulted in significant growth of the industry.

Information Technology Act 2000

NASSCOM has also been engaged with various governments overseas, to promote a win-win partnership via global sourcing. NASSCOM also plays a role in engaging with global alliances on software quality standards, immigration policies, WTO and free trade in services, and next-generation best practices in global sourcing of services.

Partnership with Members NASSCOM provides value-added services to its members to grow their business and create an ecosystem which promotes growth and profitability. This includes:

Forums for making business connections and sharing best practices Participation in seminars and conferences (in India and abroad) with customer delegations Access to world-class research and market intelligence services; and counsel from leading analysts and think tanks and consultants Access to knowledge of global business practices (taxation, legislation, immigration policies, recruitment and branding) Opportunity to "give back" to the society by participation in NASSCOM Foundation, IT Workforce development initiative and other digital divide initiatives

Contribute in development of global standards and thought leadership in areas of IP creation, security, data protection, and next-generation software quality standards.

Information Technology Act 2000

10

I ntroduction to Cyber Crime


The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. Major cyber crimes in the recent past include the Citibank rip off. US $ 10 million were fraudulently transferred out of the bank and into a bank account in Switzerland. A Russian hacker group led by Vladimir Kevin, a renowned hacker, perpetrated the attack. The group compromised the bank's security systems. Vladimir was allegedly using his office computer at AO Saturn, a computer firm in St. Petersburg, Russia, to break into Citibank computers. He was finally arrested on Heathrow airport on his way to Switzerland. With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include: (i) (ii) Crimes committed by using computers as a means, including conventional crimes. Crimes in which computers are targets.

The Internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cybercrime illegal activity committed on the Internet. The Internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise.

Information Technology Act 2000

11

Success in any field of human activity leads to crime that needs mechanisms to control it. Legal provisions should provide assurance to users, empowerment to law enforcement agencies and deterrence to criminals. The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. Cyber space creates moral, civil and criminal wrongs. It has now given a new way to express criminal tendencies. Back in 1990, less than 100,000 people were able to log on to the Internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". Until recently, many information technology (IT) professionals lacked awareness of and interest in the cyber crime phenomenon. In many cases, law enforcement officers have lacked the tools needed to tackle the problem; old laws didnt quite fit the crimes being committed, new laws hadnt quite caught up to the reality of what was happening, and there were few court precedents to look to for guidance? Furthermore, debates over privacy issues hampered the ability of enforcement agents to gather the evidence needed to prosecute these new cases. Finally, there was a certain amount of antipathyor at the least, distrust between the two most important players in any effective fight against cyber crime: law enforcement agencies and computer professionals. Yet close cooperation between the two is crucial if we are to control the cyber crime problem and make the Internet a safe place for its users. In the world of cyber crime, evil bytes are fast replacing whizzing bullets. The Indian authorities are aware of the fight ahead. But the future does not look optimistic, shares experts. Life is about a mix of good and evil. So is the Internet. For all the good it does us, cyberspace has its dark sides too. Unlike conventional communities though, there are no policemen patrolling the information superhighway, leaving it open to everything from Trojan horses and viruses to cyber stalking, trademark counterfeiting and cyber terrorism. Information Technology Act 2000 12

Given the unrestricted number of free Web sites, the Internet is undeniably open to exploitation. Known as cyber crimes, these activities involve the use of computers, the Internet, cyberspace and the World Wide Web. "Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime," says Supreme Court advocate and cyber law expert Pavan Duggal. While the worldwide scenario on cyber crime looks bleak, the situation in India isn't any better. There are no concrete statistics but, according to Duggal, Indian corporate and government sites have been attacked or defaced more than 780 times between February 2000 and December 2002. Mr. Duggal stated that, Despite the Information Technology Act, 2000, there are still several grey areas that exist within the law. "The IT Act, 2000, is primarily meant to be a legislation to promote e-commerce. It is not very effective in dealing with several emerging cyber crimes like cyber harassment, defamation, stalking and so on."

Information Technology Act 2000

13

Defining Cyber Crime


Defining cyber crimes, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both". Information Technology Act & Indian Penal Code All cyber crimes do not come under the IT Act. Many cyber crimes come under the Indian Penal Code. Sending threatening messages by email: Section 506 IPC Sending defamatory messages by email : Section 499 IPC Web-jacking: Section 383 IPC Online sale of narcotics: NDPS Act Online sale of weapons: Arms Act E- mail Abuse: Section 500 IPC Hacking: Section 66 IT Act Pornography: Section 67 IT Act Virus attacks: Section 43, 66 IT Act Salami attacks: Section 66 IT Act

Information Technology Act 2000

14

Types of Cyber Crimes


Financial crimes This would include cheating, credit card frauds, money laundering etc. To cite a recent case, a website offered to sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The word about this website now spread like wildfire. Thousands of people from all over the country responded and ordered mangoes by providing their credit card numbers. The owners of what was later proven to be a bogus website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much to the chagrin of the card owners. Caselet: Wipro Spectra mind lost the telemarketing contract from Capital one due to an organized crime. The telemarketing executives offered fake discounts, free gifts to the Americans in order to boost the sales of the Capital one. The internal audit revealed the fact and surprisingly it was also noted that the superiors of these telemarketers were also involved in the whole scenario. Cyber pornography This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). Recent Indian incidents revolving around cyber pornography include the Air Force Balbharati School case. A student of the Air Force Balbharati School, Delhi, was teased by all his classmates for having a pockmarked face. Tired of the cruel jokes, he decided to get back at his tormentors. He scanned photographs of his classmates and teachers, morphed them with nude photographs and put them up on a website that he uploaded on to a free web hosting service. It was only after the father of one of the class girls featured on the website objected and lodged a complaint with the police that any action was taken. In another incident, in Mumbai a Swiss couple would gather slum children and then would force them to appear for obscene photographs. They would then upload these photographs to websites specially designed for paedophiles. The Mumbai police arrested the couple for pornography.

Information Technology Act 2000

15

Sale of illegal articles This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or 167 simply by using email communication. E.g. many of the auction sites even in India are believed to be selling cocaine in the name of 'honey'.

Phishing In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises from the use of increasingly sophisticated lures to "fish" for users' financial information and passwords. Caselet: RBI Phishing Scam: In a daring phishing attack of its kind, the fraudsters even have not spared the Reserve Bank of India. The phishing email disguised as originating from the RBI, promised its recipient prize money of Rs.10 Lakhs within 48 hours, by giving a link which leads the user to a website that resembles the official website of RBI with the similar logo and web address. The user is then asked to reveal his personal information like password, I-pin number and savings account number. However, the RBI posted a warning regarding the fraudulent phishing e-mail on the bank's official website.

Online gambling There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. Caselet: Recent Indian case about cyber lotto was very interesting. A man called Kola Mohan invented the story of winning the Euro Lottery. He himself created a website and an email address on the Internet with the address 'eurolottery@usa.net.' Whenever accessed, the site would name him as the beneficiary of the 12.5 million pound. After confirmation a telgu newspaper published this as news. He collected huge sums from the public as well as from some banks for mobilization of the deposits in foreign currency. However, the Information Technology Act 2000 16

fraud came to light when a cheque discounted by him with the Andhra Bank for Rs 1.73 million bounced. Mohan had pledged with Andhra Bank the copy of a bond certificate purportedly issued by Midland Bank, Sheffields, London stating that a term deposit of 12.5 million was held in his name.

Intellectual Property crimes These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc. Caselet: These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc. In other words this is also referred to as cybersquatting. Satyam Vs. Siffy is the most widely known case. Bharti Cellular Ltd. filed a case in the Delhi High Court that some cyber squatters had registered domain names such as barticellular.com and bhartimobile.com with Network solutions under different fictitious names. The court directed Network Solutions not to transfer the domain names in question to any third party and the matter is sub-judice.

Cyber Defamation This occurs when defamation takes place with the help of computers and or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. Caselet: Indias first case of cyber defamation was reported when a companys employee started sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the company. The company was able to identify the employee with the help of a private computer expert and moved to the Delhi High Court. The court granted an ad-interim injunction and restrained the employee from sending, publishing and transmitting e-mails, which are defamatory or derogatory to the plaintiffs.

Information Technology Act 2000

17

Cyber stalking The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. Caselet: Ritu Kohli has the dubious distinction of being the first lady to register the cyber stalking case. A friend of her husband gave her telephonic number in the general chat room. The general chatting facility is provided by some websites like MIRC and ICQ, Where the person can easily chat without disclosing his true identity. The friend of husband also encouraged this chatters to speak in slang language to Ms. Kohli.

Unauthorized access to computer systems or networks This activity is commonly referred to as hacking. The Indian law has however given a different connotation to the term hacking, so we will not use the term "unauthorized access" interchangeably with the term "hacking". Caselet: However, as per Indian law, unauthorized access does occur, if hacking has taken place. An active hackers group, led by one Dr. Nuker, who claims to be the founder of Pakistan Hackerz Club, reportedly hacked the websites of the Indian Parliament, Ahmedabad Telephone Exchange, Engineering Export Promotion Council, and United Nations (India).

Sending threatening emails Caselet: A 16 year old student from Ahmadabad who threatened to blow up Andheri Railway station in an email message was found guilty by the Juvenile court in Mumbai. A private news channel received an email on 18 March 2008 claiming sender as Dawood Ibrahim gang saying a bomb would be planted on an unspecified train to blow it up. The case was registered in Andheri Police station under section 506 of IPC and transferred to cyber crime investigation cell. During Investigation CCIC traced the cyber cafe from which the email account was created and threatening email was sent. Cafe owner told police about friends which had come that day to surf the net. Police summoned them and found that Information Technology Act 2000 18

the system which was used to send email was accessed by only one customer. On 22nd March 08, police arrested the boy a Class XII science student who during interrogation said that he sent the email for fun of having his prank flashed as breaking news on television.

Salami attacks These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.

Virus / worm attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory Caselet: E.g. love bug virus, which affected at least 5 % of the computers of the globe. The losses were accounted to be $ 10 million. The world's most famous worm was the Internet worm let loose on the Internet by Robert Morris in 1988 that almost brought development of Internet to a complete halt.

Logic bombs These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date

Information Technology Act 2000

19

Trojan attacks A Trojan as this program is aptly called is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.

Web jacking This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website in a recent incident reported in the USA the owner of a hobby website for children received an e-mail informing her that a group of hackers had gained control over her website. Caselet: Recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein. Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the gold fish case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as ransom. Thus web jacking is a process where by control over the site of another is made backed by some consideration for it.

Pay-Per Click Fraud Caselet: Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics to defraud advertisers or Web sites that provide venues for advertisers. In the common pay-per-click advertising model, advertisers pay a fee for each click on their link. According to a CNET News article some industry segments have costs-per-click of several dollars. By using automated clicking programs (called hit bots) or employing low-cost workers to click the links, the perpetrators create the illusion that a large number of potential customers are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser. Click fraud scammers often take advantage of the affiliate programs offered by some Web sites, such as Google and Yahoo! Search Marketing. The scammers sign up for the affiliate programs, agreeing to provide further exposure to the advertising in question and receiving a portion of the pay-per-click fees in return. The perpetrators place the ads on Web sites created solely for this purpose that, Information Technology Act 2000 20

naturally, doesnt have any real traffic. Once the ads are in place, the hitbots or workers generate large volumes of fraudulent clicks, often in a very short time period, for which the scammer bills the owner of the affiliate program. Both Google and Yahoo! Search Marketing have had to reimburse advertisers for payper-click fees that were discovered to have been the result of click fraud.

Information Technology Act 2000

21

Cyber Crime Statistics of India

Source:-http://www.consumerfraudreporting.org/internet_scam_statistics.htm

Information Technology Act 2000

22

Types of Cyber Criminals


Kids (age group 9-16 etc.) It seems really difficult to believe but it is true. Most amateur hackers and cyber criminals are teenagers. To them, who have just begun to understand what appears to be a lot about computers, it is a matter of pride to have hacked into a computer system or a website. There is also that little issue of appearing really smart among friends. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong. Organized hacktivists Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc. The attacks on approximately 200 prominent Indian websites by a group of hackers known as Pakistani Cyber Warriors are a good example of political hacktivists at work. Disgruntled employees One can hardly believe how spiteful displeased employees can become. Till now they had the option of going on strike against their bosses. Now, with the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes, which can bring entire systems down. Professional hackers (corporate espionage) Extensive computerization has resulted in business organizations storing all their information in electronic form. Rival organizations employ hackers to steal industrial secrets and other information that could be beneficial to them. The temptation to use professional hackers for industrial espionage also stems from the fact that physical presence required to gain access to important documents is rendered needless if hacking can retrieve those.

Information Technology Act 2000

23

S ome of the Important Definition


1. "Affixing digital signature" with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature; 2. "Certifying Authority" means a person who has been granted a licence to issue a Digital Signature Certificate under section 24; 3. "Certification practice statement" means a statement issued by a Certifying Authority to specify the practices that the Certifying Authority employs in issuing Digital Signature Certificates; 4. "Digital signature" means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3; 5. "Digital Signature Certificate" means a Digital Signature Certificate issued under subsection of section 35; 6. "Electronic form" with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device; 7. "Secure system" means computer hardware, software, and procedure that (a) are reasonably secure from unauthorised access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended functions; and (d) adhere to generally accepted security procedures;

Information Technology Act 2000

24

Writing requirements
Section 4 of the Act states that when under any particular law, if any information is to be provided in writing or typewritten or printed form, then notwithstanding that law, the same information can be provided in electronic form, which can also be accessed for any future reference. This non-obstinate provision will make it possible to enter into legally binding contracts on-line!

Penalties for Computer Crimes

Information Technology Act 2000

25

Source:- http://www.indiaitlaw.com/comcriact.htm

Police Powers
Information Technology Act 2000 26

A police officer not below the rank of deputy superintendent of police has the power to enter any public place and arrest any person without a warrant if he believes that a cyber crime has been or is about to be committed. This provision may not turn to be very effective for the simple reason that most of the cyber crimes are committed from private places such as ones own home or office. Cyber-cafs and public places are rarely used for cyber crimes. However, if the Act did give the police department powers to enter peoples houses without search warrants, it would amount to an invasion of the right to privacy and create pandemonium. Keeping this in mind, the Legislature has tried to balance this provision so as to serve the ends of justice and at the same time, avoid any chaos. On being arrested, the accused person must, without any unnecessary delay, be taken or sent to the magistrate having jurisdiction or to the officer-incharge of a police station. The provisions of the Code of Criminal Procedure, 1973 shall apply in relation to any entry, search or arrest made by the police officer.

Information Technology Act 2000

27

Digital Signature
Digital Signature means authentication of any electronic record by a subscriber by means of an electronic method or procedure. Rapid developments in e-business pose a growing need for online security and authentication. Many emerging technologies are being developed to provide online authentication. The major concern in e-business transactions is the need for the replacement of the hand-written signature with an online signature. The traditional e-mail system, which has problems of message integrity and nonrepudiation, does not fulfil the basic requirements for an online signature. Further, since the Internet communication system is prone to various types of security breaches, the discussion of robust and authenticated e-business transactions is incomplete without consideration of security as a prominent aspect of online signatures. One may consider an e-signature as a type of electronic authentication. Such authentication can be achieved by means of different types of technologies. A Digital Signature (DS) can be considered as a type of e-signature, which uses a particular kind of technology that is DS technology. DS technology involves encrypting messages in such a way that only legitimate parties are able to decrypt the message. Two separate but interrelated keys carry out this process of encryption and decryption. One party in the transactions holds the secret key, or the private key, and the other party holds the public key or the key with wide access. The selection and use of an encryption technique plays a crucial role in the design and development of keys. In short, a DS satisfies all the functions, such as authenticity, non-repudiation, and security, of a hand-written signature. Such a signature can be viewed as a means of authentication and can be owned by an individual. While using this technology, there must be third party involvement order to handle the liability issues that may be raised by bilateral transactions. With this existing legal infrastructure and the rapid emergence of software security products, it is important to understand the role of emerging technologies

Information Technology Act 2000

28

like DS in e-business. One of the major indicators of technological improvements is the market development and commercialization of that technology. Legitimacy and Use of Digital Signatures The Act has adopted the Public Key Infrastructure for securing electronic transactions. As per Section 3 of the Act, a digital signature means an authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the other provisions of the Act. Thus a subscriber can authenticate an electronic record by affixing his digital signature. A private key is used to create a digital signature whereas a public key is used to verify the digital signature and electronic record. They both are unique for each subscriber and together form a functioning key pair. Section 5 provides that when any information or other matter needs to be authenticated by the signature of a person, the same can be authenticated by means of the digital signature affixed in a manner prescribed by the Central Government. Under Section 10, the Central Government has powers to make rules prescribing the type of digital signature, the manner in which it shall be affixed, the procedure to identify the person affixing the signature, the maintenance of integrity, security and confidentiality of electronic records or payments and rules regarding any other appropriate matters. Furthermore, these digital signatures are to be authenticated by Certifying Authorities (CAs) appointed under the Act. These authorities would inter alias; have the license to issue Digital Signature Certificates (DSCs). The applicant must have a private key that can create a digital signature. This private key and the public key listed on the DSC must form the functioning key pair. Once the subscriber has accepted the DSC, he shall generate the key pair by applying the security procedure. Every subscriber is under an obligation to exercise reasonable care and caution to retain control of the private key corresponding to the public key listed in his DSC. The subscriber must take all precautions not to disclose the private key to any third party. If however, the private key is compromised, he must communicate the same to the Certifying Authority (CA) without any delay.

Information Technology Act 2000

29

Possible Uses of E-Governance


The future of e-governance is very bright. With the help of information technology, the daily matters can be effectively taken care of irrespective of the field covered by it. For instance, the Delhi Police Headquarter has launched a website, which can be used for lodging a First Information Report. Similarly, the Patna High Court has taken a bold step of granting bail on the basis of an online bail application. The educational institutions, including universities, are issuing admission forms electronically, which can be downloaded from their respective websites. The results of examinations of various educational institutions, both school level and university level, are available online, which can be obtained without any trouble. These are but some of the instances of the use of technology for a better e-governance. The beneficial concept of e-governance can be utilized for the following purposes: To have access to public documents. For making online payments of various bills and dues. To file statutory documents online. To file the complaints, grievances and suggestions of citizens online. The online facility can be used to enter into a partnership the appropriate government in cases of government contracts. The citizens can use the online facility to file their income tax returns. The citizens will enjoy the facility of online services.

Information Technology Act 2000

30

MCA21 project under E-Governance


Background Keeping in tune with the E-Governance initiatives the world over, Ministry of Company Affairs (MCA), Government of India, has initiated the MCA21 project, which will enable an easy and secure access to MCA services in a manner that best suits the corporate entities and professionals besides the public. MCA21 is intended to achieve all the objectives of a versatile E-Governance project. The project is named as MCA21 as it aims at repositioning MCA as an organization capable of fulfilling the aspirations of its stakeholders in the 21st century. Rather than compelling the business community to physically travel to MCA offices, MCA services will be made available at the place of their choice, be it their homes or offices. The major components involved in this comprehensive E-Governance project are Front Office and Back Office. The MCA21 project is designed to fully automate all processes related to the proactive enforcement and compliance of the legal requirements under the Companies Act, 1956. This will help the business community to meet their statutory obligations. From the customer perspective, the Front Office operations assume significance, which would be administered through the Front Office portal. The entire Back Office operations of the MCA would be automated so as to achieve the objective of a user friendly computerized environment. My MCA portal is the single point of contact for all MCA related services, which can be easily accessed over the Internet by all users. The project also envisages a cost effective integrated software solution for computerizing various inhouse functions like Human Resources Management, Payroll, Accounting and Finance for internal users (employees) of MCA. Permanent documents of existing companies like memorandum of association, articles of association, current charge documents, are presently maintained in paper form across various Registrar of Companies (RoC) offices. These documents are being converted into electronic format and it is being carried out at the respective RoC offices as part of this project. The scope of MCA21 project covers only the offices of RoCs, Regional Directors and the Headquarters at New Delhi. It does not include other offices of MCA like Official Liquidators, Company Law Board / Tribunal and Courts. The success of the service oriented approach, the most fundamental ingredient of this project, will depend greatly on analyzing and responding to the needs of all stakeholders. To that extent, the project will develop a mechanism to constantly develop and improve the MCA21 system. It will be made possible by analyzing usage patterns and error/status messages as well as feedback from the customers comprising the corporate, professionals and the public. Key Benefits of MCA21 Project MCA21 seeks to fulfill the requirements of the various stakeholders including the corporate, professionals, public, financial institutions and banks, Government and the MCA employees. The key benefits of MCA21 project are as follows: a) On line incorporation of companies on line b) Simplified and easy mode of filing of Forms/ Returns c) Registration as well as verification of charges anytime and from anywhere d) Inspection of public documents of companies anytime from anywhere e) Corporate centric approach Information Technology Act 2000 31

f) g) h) i) j)

Building up a centralized database repository of corporate operating in India Enhanced service level fulfillment and customer relationship building Total transparency through E-Governance Timely redressed of investor grievances Availability of more time for MCA employees for qualitative analysis of corporate information

An Overview of MCA set up The MCA mainly administers the Companies Act, 1956 and The Monopolies and Restrictive Trade Practices Act 1969. Besides, it also administers the following Acts: a) The Competition Act, 2002 b) The Chartered Accountants Act, 1949 c) The Costs and Works Accounts Act, 1959 d) The Company Secretaries Act, 1980 e) The Partnership Act, 1932 f) The Societies Registration Act, 1860 g) The Companies (Donation to National Fund) Act, 1951 The MCA, which functions under overall direction and supervision of the Minister of Company Affairs, has a three tier organizational set up for administration of the Act, namely, the Headquarters at New Delhi, the Regional Directors at Mumbai, Kolkata, Chennai and Noida and the RoCs in States and Union Territories. The Official Liquidators who are attached to various High Courts functioning in the country are also under the overall administrative control of the Ministry. The Company Law Board, a quasi judicial body, has its Principal Bench at Delhi, an additional Principal Bench for Southern States at Chennai and four Regional Benches located at Delhi, Mumbai, Kolkata and Chennai. The four Regional Directors are in charge of the respective regions, each region comprising a number of States and Union Territories. They supervise the working of the offices of the RoCs and the Official Liquidators working in their regions. They also maintain liaison with the respective State Governments and the Central Government in matters relating to the administration of the Companies Act. Certain powers of the Central Government under the Act have been delegated to the Regional Directors. There is also an inspection unit attached to the office of every Regional Director for carrying out the inspection of the books of accounts of Companies under Section 209A of the Companies Act. RoCs appointed under Section 609 of the Companies Act and covering the various States and Union Territories are vested with the primary duty of registering companies in the respective States and the Union Territories and ensuring that such companies comply with statutory requirements under the Act. These offices function as registry of records, relating to the companies registered with them, which are available for inspection by members of public on payment of the prescribed fee. The Central Government exercises administrative control over these offices through the respective Regional Directors.

Information Technology Act 2000

32

Services Available on MCA21 The following services will be available under the MCA21 Project: Registration and incorporation of new companies Filing of Annual Returns and Balance Sheets Filing of forms for change of names/address/Directors details Registration and verification of charges Inspection of documents Applications for various statutory services from MCA Investor grievance redressed

Organization of RoC Office under MCA The RoC office working from its present address will virtually become the Back Office of the Ministry. There are likely to be a number of companies/entities who may find it difficult to switch over to e-Filing at the initial stage. Facilitation Centers known as Physical Front Offices (PFOs) are being set up at 53 locations throughout the country to provide requisite comfort for e-Filing to such companies. 1. Front Office (FO) The Front Office represents the interface of the corporate and public user with the MCA21 system. This comprises of Virtual Front Office and Physical Front Office. Virtual Front Office merely represents a computer facility for filing of digitally signed eForms by accessing the My MCA portal through Internet. It also pre supposes availability of related facilities to convert documents into PDF format and scanning of documents wherever required. When a company or user does not have these computer facilities, it can avail of these facilities at the designated facilitation centers, known as the Physical Front Offices. 2. Virtual Front Office (VFO) Virtual Front Office facilitates online filing of the e-Forms using Internet. The system automatically does pre scrutiny of the e-Forms filed and indicates error messages in case of incomplete or invalid particulars. Upon successful submission, a Service Request Number (SRN) will be generated by the system for the user, which will be used for future correspondence with MCA. The system calculates the fee payable for the form and accepts online payment through credit cards and Internet banking. There is also an option to make offline payment at designated bank branches through challan generated by the system. In the latter case, the MCA system gets updated on the realizations made by the designated banks on a daily basis. Virtual Front Office is meant for electronically delivering services at a place and time convenient to the business community through the Front Office portal. The following are the system requirements for VFO: A Personal Computer Information Technology Act 2000 33

Web Browser Internet Explorer, Netscape Navigator Internet access Adobe Acrobat Reader 7.0.5 WinZip 8.0 Scanner (for scanning of paper documents to be filed as attachments to e-Form) Printer (for printing bank payment challan or service fee bill)

Thus, you have a Virtual Front Office in your home/office with the above mentioned facilities. You can even use a cyber caf or kiosk equipped with above facilities as a Virtual Front Office. 3. Physical Front Office (PFO) Physical Front Office replaces the existing RoC office counters. It is meant to serve as a facilitation centre to facilitate filing of e-Forms, scanning attachments to e-Forms, generating challans for making payment of fees at the designated bank and finally, uploading the filled in digitally signed e-Forms. The Physical Front Offices will be designed to facilitate electronic delivery of services, similar to the type available at the Virtual Front Office, and will serve corporate who do not have access to computers and Internet. As part of MCA21, adequate number of Physical Front Offices, including Temporary Front Offices (TFOs), to cater to peak seasonal load, will be established throughout the country to serve better the interests of corporate and professionals. The details of likely Physical Front Offices are given in Appendix A. The finalized address of Physical Front Office in your city can be referred from My MCA portal. While encouraging customers to use Virtual Front Office for fulfilling their obligations as stipulated under the Companies Act 1956, Physical Front Offices would ensure a smooth transition to fully electronic delivery of MCA services. Members of the business community can walk into these offices and obtain services. All the services for scanning and uploading of e-Forms at PFOs would be available free of cost in the Physical Front Offices. Since these facilitation centers are being set up to facilitate e-Filing during the transition period, these will remain operational for a period of three years only, by which time, it is expected that all clients will operate through Virtual Front Offices. Back Office The Back Office represents the office of RoCs, Regional Directors, and Headquarters and takes care of internal processing of the forms filed by the corporate user as per MCA norms and guidelines. The e-Forms will be routed dynamically to the concerned authority for processing depending upon the assigned role. All the e-Forms along with the attachments will be stored in the electronic repository, which the staff of MCA can view depending upon the access rights.

Information Technology Act 2000

34

Contribution of Information Technology in Banking Sector


IT in the Indian Financial Sector the Beginnings 1. The use of technology in expanding banking has been a key focus area of the Reserve Bank. Technological innovation not only enables a broader reach for consumer banking and financial services, but also enhances its capacity for continued and inclusive growth. 2. There are several factors attributed to Indias high growth in the recent period - improved productivity, growing entrepreneurial spirit, and higher savings, to name the most important. But one factor usually goes unacknowledged that is financial intermediation. Improvement in the quantum and quality of financial intermediation ranks along with other factors that are mentioned above is a key growth driver. And one of the factors that drove the improvement in the quantum and quality of financial intermediation is more wide spread and more efficient use of IT.

3. Implementing IT in an Indian banking system dominated by government-owned banks has not been easy. In his book Imagining India Ideas for the New Century, Nandan Nilekani makes interesting references to this issue. He writes about his travels around the country in the early 1990s, speaking about the role of, what was then called in typical Indian English as electronification in Indian banking. After one such presentation, Nandan writes, the chairman of a bank advised him to stop preaching, warning him that (quote), The unions will gherao you in your house! Nandan goes on to describe another presentation before an incredibly hostile audience, who dismissed out of hand all his ideas and suggestions. But at the end of the presentation, the union leader told him privately that both his sons were working for Microsoft on software solutions.
Initial days of IT implementation at the Reserve Bank, systems had to be smuggled into the office when the world was sleeping. IT implementation no longer faces opposition from any quarter. Indeed, everyone welcomes it. Even the trade unions have become extensive users of technology. IT in the Indian Financial Sector Status Today 1. More than most other industries, banks and financial institutions rely on gathering, processing, analyzing and providing information in order to meet the needs of customers. Given the importance of information in banking, it is not surprising that banks were among the earliest adopters of automated information processing technology. The visible benefits of IT in day-to-day banking in India are quite well known. Theres Anywhere Banking through Core Banking Systems, Anytime Banking through new, 24*7*365 delivery channels such as Automated Teller Machines (ATMs), and Net and Mobile Banking. In addition, IT has enabled the efficient, accurate and timely management of the increased transaction volume that comes with a larger customer base. It has also facilitated the movement from class banking to mass banking. 2. The past few years saw RBI marking some major milestones in the Indian payment and settlement systems. The introduction of the Real Time Gross Settlement (RTGS) System has resulted in compliance with the Basle Core Principles for Systemically Important Payment Systems of the Bank for International Settlements. It also has paved the way for risk-free, credit push based fund transfers settled on a real-time basis and in central bank money. The facility for inter-bank funds settlement through RTGS is today available

Information Technology Act 2000

35

across more than 55,000 bank branches, in more than 2500 regional centers across the country a coverage span perhaps not seen anywhere else in the world. Now, lets compare todays situation with what was in place in 2004, when only 4,800 branches offered RTGS. The rapid acceptance of RTGS by users can be measured by the daily transaction volume: today, close to 100,000 transactions a day in the RTGS mode, up from just about 6000 transactions a day in 2004-05. 3. In fact, quick, safe and efficient electronic movement of funds from virtually any part of the country to any other location is now almost guaranteed. This is enabled by the coordination with the National Electronic Funds transfer (NEFT) System and the National Electronic Clearing Service (NECS). In 2005, RBI was clearing about 2.70 lakh NEFT transactions a month. This number has jumped exponentially to nearly 40 lakh a month today. The establishment of the legal framework for all of this in the form of the Payment and Settlement Systems Act, 2007 provides the requisite supportive structure for these systems. 4. The extent of customer migration to electronic payments in India. From less than half a percent of transactions in the electronic mode in 2001, today we process close to about 30 crore transactions per year in the electronic mode. The same holds true for RBIs recent initiative away from High Value Clearing to electronic modes a move aimed at creating a safer, secure and credit-push based funds transfer route that has gained considerable traction. 5. There are developments seen in the communication network and messaging system in India. This Institute for Development and Research in Banking Technology (IDRBT), set up by the RBI in 1997, implemented the INdianFInancialNETwork the INFINET a one-of-a-kind initiative for the banking sector aimed at sharing expensive IT resources so as to achieve economies of scale. One of IDRBTs notable achievements has been the implementation of Public Key Infrastructure (PKI) - based electronic data transfer with very high security levels. The Institute also developed a messaging standard called Structured Financial Messaging System (SFMS) with security features superior even to SWIFT. Today INFINET has migrated to the latest MPLS technology in an effort to provide a state-of-the-art network. 6. IDRBT also set up the National Financial Switch for interconnecting ATMs. Its interesting to note that at the turn of the century, there were only about 4000 ATMs in all of India, and today there are more than ten times this number, and all of them interconnected. These changes have enabled RBI to take major step in this area. Like, ATM card holders can use any ATM in the country irrespective of which bank issued them the card. 7. Given the growing importance of IT in the banking sector, it is appropriate that the IDRBT provides incentives to the IT-based operations of commercial banks by evaluating their IT capabilities and motivating them to push for improvements by instituting awards. IT in the Financial Sector: the Continuing Agenda 1. Information technologies and the innovations they enable are strategic tools for enhancing the value of customer relationship. They reduce the costs of financial transactions, improve the allocation of financial resources, and increase the competitiveness and efficiency of financial institutions.

Information Technology Act 2000

36

2. Even as the achievements of IT in the banking sector are impressive, RBI has a big agenda on the way forward. Current financial sector leaders still need to take greater advantage of new technologies and information-based systems and expand the coverage of the Indian banking and financial system. For instance, the potential of IT in extending banking services to under-served markets in rural and semi-urban areas is enormous. The use of Smart Card technology, mobile ATMs, coverage of post offices under electronic payments networks in out-of-reach areas all could play significant roles in providing financial services to more people and thereby serve financial inclusion. 3. There is tremendous potential for the business growth of financial institutions on the one hand and the inclusive growth of India on the other. We have already seen banks using innovative approaches such as solar power- and mobile technology-based connectivity for branches. A variety of options are available which enable extended reach of such services. The banks should identify the technological model that is right for them. We have already seen the positive benefits that come from extending the reach of banking services through pilot projects in Andhra Pradesh and parts of the North East. The Reserve Bank also has announced its intention to expand the reach of banking in the North East even further by funding the cost of connectivity using VSAT technology. IBA is working on the details of this effort. 4. India is experiencing an explosion in the use of mobile communication technology. And this is a development that the financial sector can exploit. Mobile phone users belong to all strata of society, spread across metropolitan centers, towns and villages. Banks can take advantage of this expanded reach of telecom if they provide services through this medium. The phones integrated chip can function as a multi-application smart card, thus making banking services available to virtually every mobile phone owner. This holds substantial promise as the delivery vehicle of the future: there is huge potential and an exciting opportunity. However, the expansion of such capabilities must be accompanied by a minimum level of essential security features and continued compliance with established covenants relating to privacy of customer transactions. 5. The potential of IT for the near future also includes: Enabling differentiation in customer service; Facilitating Customer Relationship Management (CRM) based on available information, which can be stored and retrieved from data warehouses; Improving asset-liability management for banks, which has a direct bearing on the profits of banks; Enhancing compliance with anti-money laundering regulations. Hence, Investments in newer technologies must be made to modernize existing operations, to face competitive challenges, and to meet customer expectations. Some of these investments will also be made with the goal of achieving cost savings, energy efficiency and environmental friendliness. In the years ahead, the ability of banks to harness new technologies to meet the demands of households and businesses will be tested.

Information Technology Act 2000

37

Comparison between INDIA & CHINA


India Year 2006 2011 Cases 142 420 Arrested 154 288 Source: - http://www.gcl.in/downloads/bm_cybercrime.pdf 2006 400 250 China 2011 2050 1300

http://www.webwire.com/ViewPressRel.asp?aId=115645 Over 90% of computer crimes involved were registered under the Information Technology Act. Cases fell under two major categories -forgery and criminal breach of trust.

Cybercrime Rates
China 83 % followed by Brazil and India at 76 % and America ranking third on the list of most victimized countries. Less than one in 10 people (9%) who responded said they feel very safe online.

India have 10 million compared to China currently has 420 million Internet users, the largest in the world. Last year, 250,000 IP addresses in India were hit by Trojans. 262,000 IP addresses in China were hit by Trojans planted by nearly 165,000 overseas IP addresses. Penalty for unauthorized data accessing: India $4500 China $20000

Source: - http://www.globe7.com Information Technology Act 2000 38

CHINA
The Ministry of Public Security set up a public information and internet security supervision department. Police from the supervision department became a new police entity, mainly in charge of tasks such as supervising, checking and directing the protection of computer internet information system security; and detecting and dealing with illegal behaviors and crimes endangering computer internet information system security. Regarding investigation skills, the public information and internet security supervision department initiated a research project for cyber crime investigation skills with the approval of the Ministry of Science and Technology, and has been listed in the tenth five-year plan of technology break-through. 20% of cyber crime cases have been investigated and solved. In China, 25% of major cyber crimes are internet frauds. A second form of cyber crimes is to spread pornographic messages and shows. Another form is that criminals reach potential victims through the internet, with the purpose of committing sexual assault or murder. There are also internet traps and canvassing etc, which are present in 15% of cases. Beijing: Nearly 180 cyber crimes were solved during November and more than 460 suspects were arrested for their involvement, China's ministry of public security said on Tuesday. Fourteen websites were shut during the month for allegedly providing hacker software, training hackers and organizing cyber attacks, Xinhua reported.

Information Technology Act 2000

39

INDIA
The MoU establishes collaboration through the Cyber and Hi-Tech Crime Investigation & Training (CHCIT) Centre of CBI and the Data Security Council of India (DSCI), a section 25 not-for-profit company, setup as an independent self regulatory organization by Nasscom. The scope for the collaboration ranges from better awareness on emerging technologies and security standards to best practices and education in emerging cyber technologies. Hacking ruled the roost within these 420 cases, where 233 cases were of alleged hacks. Pornography closely followed by 139 offences. They both were 74 and 88 respectively in 2006. According to sources, Under the Indian Penal Code (IPC) a total of 276 cases, were registered during 2009 as compared to 176 such cases during 2008, an increase of 56.8 percent. Majority of the crimes out of276 cases fell under two categories -forgery and criminal breach of trust. Cities like Bangalore, Ahmedabad, Delhi, Ludhiana, Pune among others, saw high occurrence of cyber crime cases under the IT act with a total of 145 of the 178 cases.

Information Technology Act 2000

40

Critical Infrastructures under Constant Cyber attack Globally

Critical infrastructure systems around the world are the targets of repeated cyber attacks, according to a new global survey of technology executives in these industries. They believe some of the attacks are coming not just from individual cybercriminals but terrorists and foreign nation states. The United States and China are believed to be the most likely countries to conduct a cyber attack against the critical infrastructure of another nation, according to the respondents. Companies and agencies operating in the banking and finance sectors, energy and natural resources, telecommunications and internet service providers, transportation and mass transit, chemical production and storage, food distribution and government services are considered critical infrastructure companies.

Information Technology Act 2000

41

Some Indian Case Studies:

First conviction in India


A complaint was filed in by Sony India Private Ltd, which runs a website called sony-sambandh.com, targeting Non Resident Indians. The website enables NRIs to send Sony products to their friends and relatives in India after they pay for it online. The company undertakes to deliver the products to the concerned recipients. In May 2002, someone logged onto the website under the identity of Barbara Campa and ordered a Sony Colour Television set and a cordless head phone.A lady gave her credit card number for payment and requested that the products be delivered to Arif Azim in Noida. The payment was duly cleared by the credit card agency and the transaction processed. After following the relevant procedures of due diligence and checking, the company delivered the items to Arif Azim. At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif Azim. The transaction closed at that, but after one and a half months the credit card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase. The company lodged a complaint for online cheating at the Central Bureau of Investigation which registered a case under Section 418, 419 and 420 of the Indian Penal Code. The matter was investigated into and Arif Azim was arrested. Investigations revealed that Arif Azim, while working at a call centre in Noida gained access to the credit card number of an American national which he misused on the companys site. The CBI recovered the colour television and the cordless head phone. The accused admitted his guilt and the court of Shri Gulshan Kumar Metropolitan Magistrate, New Delhi, convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal Code this being the first time that a cyber crime has been convicted. The court, however, felt that as the accused was a Information Technology Act 2000 42

young boy of 24 years and a first-time convict, a lenient view needed to be taken. The court therefore released the accused on probation for one year.

India's First ATM Card Fraud


The Chennai City Police have busted an international gang involved in cyber crime, with the arrest of Deepak Prem Manwani (22), who was caught red-handed while breaking into an ATM in the city in June last, it is reliably learnt. The dimensions of the city cops' achievement can be gauged from the fact that they have netted a man who is on the wanted list of the formidable FBI of the United States. At the time of his detention, he had with him Rs 7.5 lakh knocked off from two ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had walked away with Rs 50,000 from an ATM in Mumbai. While investigating Manwani's case, the police stumbled upon a cyber crime involving scores of persons across the globe. Manwani is an MBA drop-out from a Pune college and served as a marketing executive in a Chennai-based firm for some time. Interestingly, his audacious crime career started in an Internet cafe. While browsing the Net one day, he got attracted to a site which offered him assistance in breaking into the ATMs. His contacts, sitting somewhere in Europe, were ready to give him credit card numbers of a few American banks for $5 per card. The site also offered the magnetic codes of those cards, but charged $200 per code. The operators of the site had devised a fascinating idea to get the personal identification number (PIN) of the card users. They floated a new site which resembled that of a reputed telecom company's. That company has millions of subscribers. The fake site offered the visitors to return $11.75 per head which, the site promoters said, had been collected in excess by mistake from them.

Information Technology Act 2000

43

Believing that it was a genuine offer from the telecom company in question, several lakh subscribers logged on to the site to get back that little money, but in the process parted with their PINs. Armed with all requisite data to hack the bank ATMs, the gang started its systematic looting. Apparently, Manwani and many others of his ilk entered into a deal with the gang behind the site and could purchase any amount of data, of course on certain terms, or simply enter into a deal on a booty-sharing basis. Meanwhile, Manwani also managed to generate 30 plastic cards that contained necessary data to enable him to break into ATMS. He was so enterprising that he was able to sell away a few such cards to his contacts in Mumbai. The police are on the lookout for those persons too. On receipt of large-scale complaints from the billed credit card users and banks in the United States, the FBI started an investigation into the affair and also alerted the CBI in New Delhi that the international gang had developed some links in India too. Manwani has since been enlarged on bail after interrogation by the CBI. But the city police believe that this is the beginning of the end of a major cyber crime.

Case of Cyber Extortion


He does not know much about computer hacking, yet 51-year-old cyber criminal Pranab Mitra has stunned even the cyber crime investigation cell of Mumbai police with his bizarre fraud on the Net. Mitra, a former executive of Gujarat Ambuja Cement, was arrested on Monday for posing as a woman and seducing online an Abu Dhabi-based man, thereby managing to extort Rs 96 lakh from him. Investigating officer, Assistant Commissioner of Police, J.S. Sodi, said Mitra has been remanded to police custody till June 24, and has been booked for cheating, impersonation, blackmail and extortion under sections 420, 465, 467, 471, 474 of the IPC, read with the newly formed Information Technology Act. Mitra posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe. According to the FIR, Mitra trapped Ninawe in a Information Technology Act 2000 44

cyber-relationship sending emotional messages and indulging in online sex since June 2002.Later, Mitra sent an e-mail that she would commit suicide if Ninawe ended the relationship. He also gave him another friend Ruchira Senguptas e-mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died. Then Mitra began the emotional blackmail by calling up Abu Dhabi to say that police here were searching for Ninawe. Ninawe panicked on hearing the news and asked Mitra to arrange for a good advocate for his defence. Ninawe even deposited a few lakh in the bank as advocate fees. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case.

ICICI Bank Phishing


Did you know that e-mails, long considered the most convenient form of communication, can actually spring some nasty surprises for you? Recently, a few ICICI Bank customers in Mumbai, to their utter dismay, discovered that e-mails can be extremely hazardous, if not to their health, at least to their security. These ICICI Bank customers received an e-mail from someone who posed as an official of the bank and asked for sensitive information like the account holder's Internet login name and password and directed them to a Web page that resembled the bank's official site. When some customers wrote in to find out what the e-mail was about, the bank officials registered a complaint with the police. New as it may be in India, it is actually a popular banking scam, a warning against which had been issued by many international banks including Barclays and Citibank. rediff.com presents a guide that will help readers understand what the scam is about and how they can stay clear of it. What happened in the case of the e-mail scam involving ICICI Bank? A few customers of ICICI Bank received an e-mail asking for their Internet login name and password to their account. The e-mail seemed so genuine that some users even clicked on the URL given in the mail to a Web page that very closely resembled the official site. The scam was finally discovered when an assistant manager of ICICI Bank's information security cell received e-mails forwarded by Information Technology Act 2000 45

the bank's customers seeking to crosscheck the validity of the e-mails with the bank. Such a scam is known as 'phishing.'

Cyber Lotto an Effective Tool of Frauds


"It is a classic case of cyber crime, the first of its kind in Andhra Pradesh," was how Vijayawada Police Commissioner Sudeep Lakhtakia summed up the case of cheating and fraud registered against Kola Venkata Krishna Mohan, the selfstyled winner of the multi-million dollar Euro lottery. Mohan admitted that he did not win the 12.5 million pound Euro lottery in November 1998, as he had claimed, but merely played fraud to make good his losses in gambling. "With the help of computers, the accused took the people for a ride," the Vijayawada police commissioner pointed out. Mohan, using the Internet and forged documents, allegedly cheated banks and several persons to the tune of 60 million rupees. Kola Mohan was arrested by the Vijayawada city police on Monday in connection with cases of fraud and forgery registered against him. He was remanded to judicial custody till December 13 by Fifth Metropolitan Magistrate K B Narsimhulu. He was shifted to the district jail at Gandhinagar in Vijayawada. Mohan was accused of cheating the Andhra Bank to the tune of Rs 1.73 million. By perpetrating the multi-million rupee fraud, Mohan has achieved the dubious distinction of allegedly committing the first and biggest cyber crime in Andhra. The state incidentally is making rapid strides in information technology, thanks to the initiative of cyber-savvy Chief Minister N Chandrababu Naidu. A compulsive gambler who played cards regularly at high stakes in various clubs in the coastal city, Mohan told newsmen at the police commissioner's office at Vijayawada on Monday that he had lost as much as Rs 30 million in 1998 when a gambling syndicate led by a real estate dealer and a restaurant-owner cheated him. "I was on the look-out to make good the losses by hook or crook. During a visit to London, I learnt about the Euro lottery. I staked some money on it in vain. Then, Information Technology Act 2000 46

I invented the story that I won the lottery. I created a website and an email address on the Internet with the address 'eurolottery@usa.net.' Whenever accessed, the site would name me as the beneficiary of the 12.5 million pound (that is, $ 19.8 million or Rs 840 million) Euro-lottery," Kola Mohan recalled. A Telugu newspaper in Hyderabad received an email that a Telugu had won the Euro lottery. The website address was given for verification. The newspaper sent the query and got the "confirmation" since Kola Mohan had himself created and manipulated the website

Information Technology Act 2000

47

Conclusion
As we can see that there where so many cyber crimes happening in India before the amendment of information technology act the rate of crime have not stopped nor it have come down but it is reaching its high . We have try to find out various reasons that despite of such a tight act and high penalties and punishments what are the lope holes in the act which is blocking the proper implementation of such a force full act . Cyber Law in India is in its infancy stage. A lot of efforts and initiatives are required to make it a mature legal instrument. Law has been instrumental in giving Cyber Law in India a shape that it deserves. To make the circle complete we are proudly introducing another effort in this direction. Following are some of the lope holes which we have tried to figure out: 1. Reporting of important matters pertaining to Cyber Law in India: 2. Analysis of Cyber Law scenario in India, 3. Providing a comprehensive database for cases and incidents related to Cyber Law in India, 4. A ready reference for problems associated with Cyber Law in India, etc. The discussion group cum database will analyze Cyber Law of India that suffers from the following drawbacks: 1. Non-inclusion of contemporary Cyber crimes and Contraventions like Phishing, Spamming, Cyber extortions, Compromised e-mails, Cyber Terrorism, etc. 2. An obscure position of Freedom of speech and expression under the IT Act, 2000. 3. Absence of Liability for illegal blocking of websites, blogs, etc. 4. Lack of Techno-Legal compliance under the IT Act, 2000. 5. Lack of Wireless security under the IT Act, 2000. 6. Absence of legal protection pertaining to IPRs in cyberspace. Information Technology Act 2000 48

7. A confusion regarding Locus-standi and due diligence. 8. Absence of Private defense in cyberspace. 9. Non-dealing of issues like Cyber terrorism and private defense, 10. E-waste in India must be taken seriously, etc. Besides these grey areas India is also facing problems of lack of Cyber Security in India as well as ICT Security in India. A techno-legal base is the need of the hour. Unfortunately, we do not have a sound and secure ICT Security Base in India and Cyber security in India is still an ignored World. If opening of Cyber Cells and Cyber Units is Cyber Security than perhaps India is best in the World at managing Cyber Security issues. Unfortunately ICT Security in India is equated with face saving exercises of false claims and redundant exercises. The truth remains that ICT Security in India is a myth and not reality. The Cyber Law in India requires a dedicated and pro active approach towards ICT and Cyber Security in India. In the absence of a dedicated and sincere approach, the Cyber Law in India is going to collapse. Now as we know what are the major lope holes in the act let us try to fine the possible suggestion to over come these and try to learn form what US/UK are following in order to have a virus free cyber.

Information Technology Act 2000

49

Suggestion
Recruitment There is a high need to increase the strength of staff for proper functioning of the ACT. Red coding System Set - up a red coding system, with the help of which the government can keep a tap on mails, chat, etc. this system will help the government to detect the possibility of further cyber crime. Training and Development One of the most important requirements for the proper function of the ACT is that, there should be good quality training programs on a regular base. Domain It is necessary, Domain should be treated as a separate entity rather then treating it as IP ACT. Cyber theft, cyber stalking, cyber harassment and cyber defamation are presently not covered under the act. These crimes need to have specific provisions in the act to enable the police to take quick action. Vague Definitions Definitions, prescriptions of punishment and certain provisions (such as that dealing with hacking) need specific amendment. Parameters for its implementation Law enforcement officials need to be trained for effective enforcement.

Information Technology Act 2000

50

Bibliography: http://www.cyberlawclinic.org/casestudy.asp http://www.cybercellmumbai.com/case-studies http://satheeshgnair.blogspot.com/2009/06/selected-case-studies-on-cybercrime.html http://legalserviceindia.com/cyber/itact.html http://www.cyberlawclinic.org/cybercrime.html http://www.cyberlawclinic.org/cyberlaw.html http://teck.in/news/indian-cyber-laws-it-rules-it-act-2000-and-objectivest118.html http://business.svtuition.org/2009/11/what-is-information-technology-act2000.html www.naavi.org/pati/pati_cybercrimes_dec03.htm http://cybersecurity.nitrd.gov/profiles/blogs/phishing-scams-in-india-and http://services.indiabizclub.com/info/types_of_service/nasscom http://centralyma.org.in/seminar/Statistical%20Report%20of%20Cyber %20Crime.pdf http://www.emergence.nu/events/budapest/ahuja.pdf http://rbidocs.rbi.org.in/rdocs/Speeches/PDFs/GOVSPC1805.pdf http://www.reportcybercrime.com/offences.php http://newstonight.net/content/r-chidambaram-committee-fight-cybercrime.htm

Information Technology Act 2000

51

Anda mungkin juga menyukai