information technology act - final.doc

Upload: saiky99

Post on 02-Jun-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 Information Technology Act - Final.doc

    1/56

    INFORMATION TECHNOLOGY

    ACT & CYBER LAWS

    Submitted by

    Jimit Shah ! A"#ee$ Ja%ed !!Je$$y a#e'h ( )i*h+aa Shah !(A*h+i$ Wid,e - .a#a$ Sab$i* !-

    .a/i0 Jadha% 1 Sha0a'a 2abh30'a# !1Ni#a0i )ed 4 Ni'ita Si$,h !4

    Mumbai Edu5ati3$a0 T#u*tBa$d#a 6We*t78 Mumbai9

    G2M e:Bu*i$e** ; !(:!>A 6 u$i*hme$t "3# *e$di$, 3""e$*i%e me**a,e* th#3u,h 53mmu$i5ati3$

    *e#%i5e7

    An# person who sends6 "# me!ns of ! computer resource or ! communic!tion device

    !9 !n# inform!tion th!t is gross # offensive or h!s men!cing ch!r!cterF or

    "9 !n# inform!tion which he )nows to "e f! se6 "ut for the purpose of c!using !nno#!nce6

    inconvenience6 d!nger6 o"struction6 insu t6 in?ur#6 crimin! intimid!tion6 enmit#6 h!tred6 or i

    wi 6 persistent # m!)es "# m!)ing use of such computer resource or ! communic!tion

    device6

    c9 !n# e ectronic m!i or e ectronic m!i mess!ge for the purpose of c!using !nno#!nce or

    inconvenience or deceive or to mis e!d the !ddressee or recipient such mess!ges sh! "e

    punish!" e with imprisonment for ! term which m!# eDtend to two three #e!rs !nd with fine.

    E /0a$ati3$ Gor the purposes of this section6 terms M, ectronic m!i M !nd M, ectronic *!i

    *ess!geM me!ns ! mess!ge or inform!tion cre!ted or tr!nsmitted or received on ! computer6

    computer s#stem6 computer resource or communic!tion device inc uding !tt!chments in teDt6

    im!ge6 !udio6 video !nd !n# other e ectronic record6 which m!# "e tr!nsmitted with the

    mess!ge.

    Se5ti3$ >>B 6 u$i*hme$t* "3# di*h3$e*t0y #e5ei%i$, *t30e$ 53m/ute# #e*3u#5e 3#

    53mmu$i5ati3$ de%i5e7

    Ehoever6 dishonest # receives or ret!ins !n# sto en computer resource or communic!tion

    device )nowing or h!ving re!son to "e ieve the s!me to "e sto en computer resource or

    communic!tion device6 sh! "e punished with imprisonment of either description for ! term

    which m!# eDtend to three #e!rs or with fine which m!# eDtend to rupees one !)h or with "oth.

  • 8/11/2019 Information Technology Act - Final.doc

    27/56

    Se5ti3$ >>C 6 u$i*hme$t "3# ide$tity the"t7

    Ehoever6 "# fr!udu ent # or dishonest # m!)e use of the e ectronic sign!ture6 p!ssword or

    !n# other uni:ue identific!tion fe!ture of !n# other person6 sh! "e punished with

    imprisonment of either description for ! term which m!# eDtend to three #e!rs !nd sh! ! so

    "e i!" e to fine which m!# eDtend to rupees one !)h.

    Se5ti3$ >>2 6 u$i*hme$t "3# 5heati$, by /e#*3$ati3$ by u*i$, 53m/ute# #e*3u#5e7

    Ehoever6 "# me!ns of !n# communic!tion device or computer resource che!ts "#

    person!tion6 sh! "e punished with imprisonment of either description for ! term which m!#

    eDtend to three #e!rs !nd sh! ! so "e i!" e to fine which m!# eDtend to one !)h rupees.

    Se5ti3$ >> E 6 u$i*hme$t "3# %i30ati3$ 3" /#i%a5y7

    Ehoever6 intention! # or )nowing # c!ptures6 pu" ishes or tr!nsmits the im!ge of ! priv!te

    !re! of !n# person without his or her consent6 under circumst!nces vio !ting the priv!c# of

    th!t person6 sh! "e punished with imprisonment which m!# eDtend to three #e!rs or with

    fine not eDceeding two !)h rupees6 or with "oth.

    E /0a$ati3$ 7

    Gor the purposes of this section

    tr!nsmit me!ns to e ectronic! # send ! visu! im!ge with the intent th!t it "e viewed

    "# ! person or persons

    c!pture6 with respect to !n im!ge6 me!ns to videot!pe6 photogr!ph6 fi m or record "#

    !n# me!nsF

    priv!te !re! me!ns the n!)ed or underg!rment c !d genit! s6 pu"ic !re!6 "uttoc)s or

    fem! e "re!stF

    pu" ishes me!ns reproduction in the printed or e ectronic form !nd m!)ing it !v!i !" e

    for pu" icF

    under circumst!nces vio !ting priv!c# me!ns circumst!nces in which ! person c!n

    h!ve ! re!son!" e eDpect!tion th!t

  • 8/11/2019 Information Technology Act - Final.doc

    28/56

    he or she cou d disro"e in priv!c#6 without "eing concerned th!t !n im!ge of his

    priv!te !re! w!s "eing c!pturedF or

    !n# p!rt of his or her priv!te !re! wou d not "e visi" e to the pu" ic6 reg!rd ess of

    whether th!t person is in ! pu" ic or priv!te p !ce.

    Se5ti3$ >>F 6 u$i*hme$t "3# 5ybe# te##3#i*m7

    ;19 Ehoever6

    ;A9 with intent to thre!ten the unit#6 integrit#6 securit# or sovereignt# of Indi! or to stri)e

    terror in the peop e or !n# section of the peop e "#R

    ;i9 den#ing or c!use the deni! of !ccess to !n# person !uthorised to !ccess computer

    resourceF or

    ;ii9 !ttempting to penetr!te or !ccess ! computer resource without !uthoris!tion or eDceeding

    !uthorised !ccessF or

    ;iii9 introducing or c!using to introduce !n# computer cont!min!nt6

    !nd "# me!ns of such conduct c!uses or is i)e # to c!use de!th or in?uries to persons or

    d!m!ge to or destruction of propert# or disrupts or )nowing th!t it is i)e # to c!use d!m!ge

    or disruption of supp ies or services essenti! to the ife of the communit# or !dverse # !ffect

    the critic! inform!tion infr!structure specified under Section >0F or

    ;(9 )nowing # or intention! # penetr!tes or !ccesses ! computer resource without

    !uthoris!tion or eDceeding !uthorised !ccess6 !nd "# me!ns of such conduct o"t!ins !ccess to

    inform!tion6 d!t! or computer d!t!"!se th!t is restricted for re!sons of the securit# of the

    St!te or foreign re !tionsF or !n# restricted inform!tion6 d!t! or computer d!t!"!se6 with

    re!sons to "e ieve th!t such inform!tion6 d!t! or computer d!t!"!se so o"t!ined m!# "e used

    to c!use or i)e # to c!use in?ur# to the interests of the sovereignt# !nd integrit# of Indi!6 the

    securit# of the St!te6 friend # re !tions with foreign St!tes6 pu" ic order6 decenc# or mor! it#6

    or in re !tion to contempt of court6 def!m!tion or incitement to !n offence6 or to the

    !dv!nt!ge of !n# foreign n!tion6 group of individu! s or otherwise6 commits

    the offence of c#"er terrorism.

    ;29 Ehoever commits or conspires to commit c#"er terrorism sh! "e punish!" e with

    imprisonment which m!# eDtend to imprisonment for ife.

  • 8/11/2019 Information Technology Act - Final.doc

    29/56

    Se5ti3$ >1

    Section de! s with pu" ishing or tr!nsmitting o"scene m!teri! in e ectronic form. The

    e!r ier Section in ITA w!s !ter widened !s per ITAA 2008 in which chi d pornogr!ph# !nd

    retention of records "# intermedi!ries were ! inc uded.

    Pu" ishing or tr!nsmitting o"scene m!teri! in e ectronic form is de! t with here. Ehoever

    pu" ishes or tr!nsmits !n# m!teri! which is !scivious or !ppe! s to the prurient interest or if

    its effect is such !s to tend to depr!ve !nd corrupt persons who !re i)e # to re!d the m!tter

    cont!ined in it6 sh! "e punished with first conviction for ! term upto three #e!rs !nd fine of

    five !)h rupees !nd in second conviction for ! term of five #e!rs !nd fine of ten !)h rupees

    or "oth.

    3#$3,#a/hy a$d D3b*5e$e i$"3#mati3$ An !ddition to the $#"er $!fe ru es is th!t !

    computers h!ve to "e e:uipped with the Bcommerci! # !v!i !" e s!fet# or fi tering softw!re

    so !s to the !void6 !s f!r !s possi" e6 !ccess to the we"sites re !ting to pornogr!ph# inc uding

    chi d pornogr!ph# or o"scene inform!tion.

    The other p!rt is th!t B$#"er $!fe4s !re m!nd!ted to disp !# ! "o!rd6 c e!r # visi" e to theusers6 prohi"iting them from viewing pornogr!phic sites !s we !s cop#ing or down o!ding

    inform!tion which is prohi"ited under the !w. Ehich rest!ur!nt which gives users Internet

    !ccess wi w!nt to do this

    One positive ch!nge in the ru es is th!t of inspection. In the e!r ier ru es6 !n office not "e ow

    the r!n) of Po ice Officer w!s !uthori5ed to inspect the $#"er $!fe !nd networ)F in the

    ch!nged ru es6 !n officer of the registr!tion !genc# wi "e !uthori5ed. This me!ns th!t the

    h!r!ssment of $#"er $!fe ownersJm!n!gers wou d pro"!" # not "e done "# ! po ice officer.

    Im!gine ! rest!ur!nt with EiGi6 s!#6 the *!r)et $!fe in h!n *!r)et6 Ce hi6 h!ving to

    conform to these ru es. Or im!gine us w!nting to give EiGi !ccess !t ! conference K wi we

    need to register !s ! $#"er $!fe It ?ust won4t h!ppen. As with most other ru es6 these ru es

    wi pro"!" # not "e enforced6 "ut the pro" em is in the eDception! c!ses6 when the# !re used

    in order to h!r!ss est!" ishments. *ost of us re!ding this thin) th!t it c!n4t h!ppen to us6 "ut

    the f!ct is th!t it c!n. I4ve he!rd ! c!se of "i5!rre re:uests "eing m!de of ! we"site owner "ec!use of something he pu" ished !nd !ter retr!cted6 !s ong !s four #e!rs !fter the

  • 8/11/2019 Information Technology Act - Final.doc

    30/56

    retr!ction.

    The provisions in the !w need to "e more i"er! in order to prevent its misuse "# !wm!)ers6

    !nd in our opinion6 these $#"er$!fe guide ines h!ve cre!ted the found!tion for further

    h!r!ssment.

    Rea*3$* "3# 3#$3,#a/hy bei$, $3t i00e,a0

    P!w!n Cugg! 6 ! !w#er who speci! i5es in IT !ws6 s!id the new guide ines were !r"itr!r#.

    ME!tching pornogr!ph# is not i eg! in Indi! 6M he s!id. MIt@s !"surd to !s) c#"er c!fe owners

    to te their customers not to !ccess pornogr!phic m!teri! even !s !w ! ows individu! s to

    !ccess !du t we"sites un ess it@s not chi d pornogr!ph#. The new ru es re:uire ! second oo).M

    The new ru es suggest c!fe owners inst! fi tering softw!re !nd )eep ! og of ! we"sites

    !ccessed "# customers for !t e!st one #e!r. $!fe owners h!ve ! so "een !s)ed not to "ui d !

    c!"inJcu"ic e with ! height of more th!n four !nd h! f feet. In ! c#"er c!fe where there !re no

    cu"ic es6 Mowners wi h!ve to p !ce computers with the screens f!cing outw!rdM or tow!rds

    open sp!ce. The move is !imed !t reducing priv!c# ! c#"er c!fe user c!n get.

    Cugg! s!id if imp emented e!rnest #6 the new ru es wi put most of c#"er c!fe owners out of

    "usiness.

    Internet !ctivists termed the guide ines Munconstitution! M. Pr!nesh Pr!)!sh6 ! progr!mme

    m!n!ger with $entre of Internet !nd Societ#6 s!id the ru es wi vio !te priv!c# !nd wi

    h!mper internet users@ !"i it# to free # eDpress themse ves.

    The new ru es m!)e it m!nd!tor# for user to c!rr# !n identit# c!rd. $#"er c!fe owners h!ve "een !s)ed to give user ogs to the Mregistr!tion !genc#M ever# month !s we )eep these

    records ! ong with the og of we"sites !ccessed !t the c#"er c!fe s!fe for ! period of one #e!r.

    A few c!fe owners s!id th!t technic! #6 it wou d "e ! d!unting t!s) to )eep ! record of ever#

    we"site !ccessed using their computers for ! #e!r.

    Ehi e minors6 if c!rr#ing identit# c!rds h!ve "een permitted to use computers in ! c#"er c!fe6

    the# won@t "e ! owed inside cu"ic es if not !ccomp!nied "# gu!rdi!ns or p!rents. There is

    ! so provision of photogr!phing c#"er c!fe users using ! we"c!m or other device. The

    http://timesofindia.indiatimes.com/topic/Indiahttp://timesofindia.indiatimes.com/topic/India
  • 8/11/2019 Information Technology Act - Final.doc

    31/56

    photogr!phs wi h!ve to "e !uthentic!ted "# the user. Pr!)!sh s!id th!t photogr!phing users

    r!ises serious priv!c# :uestions6 especi! # in the c!se of chi dren.

    Se5ti3$ >4

    This section empowers the /overnment or !gencies !s stipu !ted in the Section6 to intercept6

    monitor or decr#pt !n# inform!tion gener!ted6 tr!nsmitted6 received or stored in !n#

    computer resource6 su"?ect to comp i!nce of procedure !s !id down here.

    This power c!n "e eDercised if the $entr! /overnment or the St!te /overnment6 !s the c!se

    m!# "e6 is s!tisfied th!t it is necess!r# or eDpedient in the interest of sovereignt# or integrit#

    of Indi!6 defence of Indi!6 securit# of the St!te6 friend # re !tions with foreign St!tes or pu" ic

    order or for preventing incitement to the commission of !n# cogni5!" e offence re !ting to

    !"ove or for investig!tion of !n# offence.

    ROLE OF IT IN BAN.ING SECTOR

    ;19 Adv!ncement in techno og# h!s ventured new products6 new services6 new m!r)ets

    !nd h!s ch!nged the entire de iver# ch!nne for the "!n)ing industr#.;29 Inform!tion Techno og# h!s ! so provided "!n)ing industr# new me!ns to de! with

    the ch! enges posed "# the ch!nging econom#. Inform!tion techno og# h!s !imed !t

  • 8/11/2019 Information Technology Act - Final.doc

    32/56

    the incre!sing the speed !nd re i!"i it# of fin!nci! oper!tions !nd h!s further

    strengthen the "!n)ing sector.;39 The progress of techno og# !nd the deve opment of wor dwide networ) h!ve

    signific!nt # reduced the cost of g o"! fund tr!nsfer.

    ; 9 IT h!s en!" ed "!n)s to s!tisf# the ever incre!sing dem!nds of the customers who !retechno7s!vv#.

    ; 9 IT h!s "een providing so utions to "!n)s for the !ccounting !nd "!n) office

    re:uirements.; e7*onies , ectronic Gund Tr!nsfer J e$he:ues8 On ine P!#ment of ,Dcise % Service T!D

    (i P!#ments

    10 $!rd to $!rd Gunds Tr!nsfer

    11 (!n) ome ;i9 ,Dpress Ce iver#

    12 $!sh on T!p ;ii9 Norm! Ce iver#

    13 Sm!rt *one# Order

    Some products c!n "e eDp !ined !s fo ows

    !9 Aut3mati5 Te00e# Ma5hi$e 6ATM7

    An AT* is ! computeri5ed te ecommunic!tions device th!t provides ! customers ! secure

    method of performing fin!nci! tr!ns!ctions in ! pu" ic sp!ce without the need for ! hum!n

    c er) or "!n) te er. AT*s !re in)ed to "!n)4s centr! computer !nd identif# the customer

  • 8/11/2019 Information Technology Act - Final.doc

    33/56

    through m!gnetic coding on the c!rd provided to customer !nd Person! Identific!tion

    Num"er ;PIN96 )e#ed in "# the customer. It upd!tes the !ccount of the customer !fter the

    comp etion of the tr!ns!ction. This ! so proves to "e !n !dvertising !gent for the comp!n#.

    The tr!ns!ction using AT* c!n r!nge from simp e tr!ns!ctions invo ving c!sh withdr!w! s

    !nd deposits to m!)ing hote reserv!tions etc.

    ;9 E0e5t#3$i5 Fu$d* T#a$*"e# 6EFT7

    To tr!nsfer funds inst!nt # !mong v!rious "r!nches !t v!rious oc!tions in the countr#F "#

    connecting these "r!nches through ! networ) using the !test communic!tion techno og#

    which inc udes s!te ite6 e!sed ines6 di! 7up ines etc.

    (9 SMS Ba$'i$,

    It is ! techno og#7en!" ed service offering from "!n)s to its customers6 permitting them to

    oper!te se ected "!n)ing services over their mo"i e phones using S*S mess!ging.S*S

    (!n)ing services !re oper!ted using "oth Push !nd Pu *ess!ges

    Push mess!ges !re those th!t the "!n) chooses to send out to ! customer4s mo"i e phone6

    without the customer initi!ting ! re:uest for the inform!tion6 these !re either *o"i e

    *!r)eting mess!ges or mess!ges ! erting !n event which h!ppens in the customer4s "!n)

    !ccount6 such !s ! !rge p!#ment using the customer4s credit c!rd6 etc.

    Pu mess!ges !re those th!t !re initi!ted "# the customer6 using ! mo"i e phone6 for o"t!ining

    inform!tion or performing ! tr!ns!ction in the "!n) !ccount.Pu mess!ges inc ude !n !ccount

    "! !nce en:uir#6 or re:uests for current inform!tion i)e deposit interest r!tes6 !s pu" ished

    !nd upd!ted "# the "!n).

  • 8/11/2019 Information Technology Act - Final.doc

    34/56

    a9 eTA=

    (!n)s i)e IC(I h!ve e!sed the process of t!D p!#ment "# imp ementing the eTA

    pro?ect. P!#ment of eDcise !nd customs dut# over the Internet is ! so possi" e.S(I e7

    t!D is !n on ine p!#ment f!ci it#. This f!ci it# s!ves time6 is convenient6 h!ss e free

    !nd p!per ess. It is !v!i !" e on ! 2 D > "!sis !nd en!" es user to p!# t!Des on ine6

    with e!se !nd simp icit#.

    b9 O$0i$e Remitta$5e*

    Another eD!mp e of how we IT h!s "een ! igned with "!n)ing6 !nd is providing

    v! ue to customers6 is "etter on ine remitt!nces from !round the wor d. (enefici!ries

    in Indi! !re credited with remitt!nce mone# within hours.

    59 O$0i$e Ba$5a**u#a$5e

    It is ! p!c)!ge of fin!nci! services invo ving distri"ution of insur!nce products

    through "!n)4s "r!nch networ). On ine (!nc!ssur!nce f!ci it!tes customer to p!#

    insur!nce premium6 !t ! ow cost6 "# visiting the concerned "!n)4s we"site. This h!s6

    ed to the migr!tion of customers from high cost "r!nch tr!ns!ction to ow7cost on ine

    interf!ces6 "ringing down the tot! cost per tr!ns!ction.

    d9 Bi00 ayme$t*

    , ectronic "i p!#ment is ! fe!ture of on ine "!n)ing6 ! owing ! depositor to send

    mone# from his dem!nd !ccount to ! creditor or vendor such !s ! pu" ic uti it# or !

    dep!rtment store to "e credited !g!inst ! specific !ccount.The p!#ment is optim! #

    eDecuted e ectronic! # in re! time6 though some fin!nci! institutions or p!#ment

    services wi w!it unti the neDt "usiness d!# to send out the p!#ment.

    e9 Othe# )a0ue Added Se#%i5e*

    Some "!n)s ! so offer v! ue !dded services in the !re!s of '!i w!# reserv!tion. The f!ci it#

    h!s "een !unched w.e.f. Septem"er 16 2003 in !ssoci!tion with I'$T$. The scheme

    f!ci it!tes (oo)ing of '!i w!#s Tic)et On ine. Thus6 customer doesn4t h!ve to their entr# into

    the soci! networ)ing sites. A though the# h!ve not "een entire # successfu !s of now6 there

    is ! good ch!nce th!t the# cou d wrec) h!voc on th!t sp!ce.

  • 8/11/2019 Information Technology Act - Final.doc

    35/56

    NASSCOM

    I$t#3du5ti3$

    The N!tion! Associ!tion of Softw!re !nd Services $omp!nies ;NASS$O*9 is ! tr!de!ssoci!tion of Indi!n Inform!tion Techno og# ;IT9 !nd (usiness Process Outsourcing ;(PO9industr#. ,st!" ished in 1 886 NASS$O* is ! non7profit org!ni5!tion. It is the g o"! tr!de "od# with over 1200 mem"ers6 of which 2 0 !re g o"! comp!nies6form -S6 - 6 ,-6 =!p!n !nd $hin!. The mem"ers !re "!sic! # in the "usiness of softw!redeve opment6 softw!re services6 softw!re products6 IT7en!" edJ(PO services !nd e7commerce. NASS$O* w!s set up in 1 88 to f!ci it!te "usiness !nd tr!de in softw!re !ndservices !nd to encour!ge !dv!ncement of rese!rch in softw!re techno og#.It is the strongest proponent of g o"! free tr!de6 !nd is committed to wor) pro!ctive # toencour!ge its mem"ers to !dopt wor d c !ss m!n!gement pr!ctices6 "ui d !nd upho d highestst!nd!rds in :u! it#6 securit# !nd innov!tion !nd rem!in competitive in tod!#4s r!pid #ch!nging techno og# !ndsc!pe. It is the most re i!" e source of d!t! !nd inform!tion in theIndi! Softw!re Industr#.In Indi! !nd !round the wor d6 NASS$O* mem"ers !re p!rticip!nts in the new g o"!econom# !nd !re reputed for their cutting7edge "usiness pr!ctices !nd soci! initi!tives.

    Na**53m * )i*i3$@

    NASS$O*@s vision is to est!" ish Indi! !s the 21st centur#@s softw!re powerhouse !nd

    position the countr# !s the g o"! sourcing hu" for softw!re !nd services.*em"ers en?o# sever! "enefits inc uding inform!tion on ch!nges in po icies of the/overnment of Indi! with reg!rds to computer softw!re !nd IT services.

    Aim* a$d Ob e5ti%e*@

    The prim!r# o"?ective of NASS$O* is to !ct !s ! c!t! #st for the growth of the softw!redriven IT industr# in Indi!. Other go! s inc ude f!ci it!tion of tr!de !nd "usiness in softw!re!nd services6 encour!gement !nd !dv!ncement of rese!rch6 prop!g!tion of educ!tion !ndemp o#ment6 en!" ing the growth of the Indi!n econom# !nd provide compe ing "usiness

    "enefits to g o"! economies "# g o"! sourcing.

    NASS$O* ! so ende!vors to ever!ge IT !nd n!rrow the digit! divide in Indi! !nd en!" eher citi5ens to en?o# the "enefits of IT. It ! so "oosts the process of Innov!tionF IT wor)forcedeve opment !nd enh!nce c#"er securit#.

    a#t$e#*hi/ +ith the G3%e#$me$t

    NASS$O* !cts !s !n !dvisor6 consu t!nt !nd coordin!ting "od# for the softw!re !ndservices industr# in Indi!.

    NASS$O* h!s p !#ed ! )e# ro e in en!" ing the government in Indi! to deve op industr#friend # po icies. It h!s "een ! proponent of free tr!de6 !rguing for 5ero t!riff protection6strong inte ectu! propert# !nd d!t! protection !ws6 deregu !tion of the te ecom m!r)et !nd

  • 8/11/2019 Information Technology Act - Final.doc

    36/56

    the cre!tion of softw!re techno og# p!r)s !nd priv!te sector p!rticip!tion in the educ!tions#stem 7 me!sures which h!ve resu ted in signific!nt growth of the industr#.

    NASS$O* ! so p !#s ! ro e in eng!ging with g o"! ! i!nces on softw!re :u! it# st!nd!rds6immigr!tion po icies6 ETO !nd free tr!de in services6 !nd neDt7gener!tion "est pr!ctices ing o"! sourcing of services.

    Re*ea#5h NASS$O* undert!)es rese!rch on the I$T industr# in Indi! !nd the wor d in order tocontinuous # educ!te its mem"ers of new "usiness opportunities6 "usiness pr!ctices in g o"!m!r)ets6 potenti! thre!ts to industr# growth !nd !ttr!ct !ddition! investments in Indi!.

    ua0ity 3" #3du5t* a$d Se#%i5e* NASS$O* strong # "e ieves in encour!ging its mem"ers to provide g o"! :u! it# products!nd services. The !ssoci!tion provides !ssist!nce to its mem"ers in !chieving intern!tion!:u! it# certific!tions "# org!ni5ing semin!rs !nd re !ted progr!ms on :u! it# st!nd!rds !nddissemin!ting re ev!nt inform!tion.

    I$te00e5tua0 #3/e#ty Ri,ht* NASS$O* is !n !rdent supporter of strong inte ectu! propert# !ws in Indi!. NASS$O* ! so !unched the countr#@s first !nti7pir!c# hot ine !nd Indi!@s first !nti7pir!c#to 7free hot ine. NASS$O* h!s ! so successfu # f!ci it!ted enforcement !ws !g!instsoftw!re pir!c# in Indi! !nd he ped introduce $#"er &!ws.

    a#t$e#*hi/ +ith Membe#*@ The org!ni5!tion provides v!rious services to its mem"ers such !s the fo owing

    $re!ting "usiness opportunities !nd sh!ring of "est pr!ctices )now edge through

    forums6 semin!rs !nd conferences Pu" ishing rese!rch reports th!t provide the mem"ers counse from e!ding industr#!n! #sts. The org!ni5!tion ! so m!int!ins ! d!t!"!se of mem"er comp!nies specif#ingtheir !re!s of eDpertise.

    Providing inform!tion on g o"! "usiness norms on t!D!tion6 regu !tions6 recruitment6etc.

    NASSCOM INITIATI)ES INCL 2E@

    The Comestic *!r)et Initi!tive6 cre!ted to integr!te the IT !nd non7IT sectors !nd to p !n for continued IT industr# growth.

    The Innov!tion Initi!tive6 cre!ted to foster !n environment th!t meets the specificneeds of Indi!n "usinesses of ! si5es.

    The ,duc!tion Initi!tive6 cre!ted to provide !ddition! tr!ining !nd s)i enh!ncementto improve gr!du!te emp o#!"i it#. This initi!tive ! so interf!ces "etween industr#6!c!demi! !nd government.

  • 8/11/2019 Information Technology Act - Final.doc

    37/56

    The Eomen in &e!dership7IT Initi!tive6 cre!ted to incre!se the num"er of womenentering the IT7(PO industr# !nd enh!nce the c!reer prospects for those women in theindustr#.

    The Securit# Initi!tive6 cre!ted to promote inform!tion securit# !nd comp i!ncethrough pu" ic educ!tion !nd cre!tion of ! securit#7!w!re environment.

    THE CRIME AN2 CRIMINAL TRAC.ING NETWOR. AN2 SYSTEMS 6CCTNS7I$itiati%e by NASSCOM & Nati3$a0 C#ime Re53#d* Bu#eau8 Mi$i*t#y 3" H3me A""ai#*

    Eith the $$TNS in p !ce6 ! inform!tion wi "e !v!i !" e on ine. Inform!tion reg!rdingfingerprints6 unidentified "odies6 missing persons6 sto en vehic es6 sto en !rms6 etc.6 wi "e

    ?ust ! c ic) !w!#.

    G!ci it!te co ection6 stor!ge6 retriev! 6 !n! #sis6 tr!nsfer !nd sh!ring of d!t! !nd Inform!tion!mong Po ice St!tions6 Cistrict6 St!te he!d:u!rters !nd other org!ni5!tionJ!gencies6 inc udingthose !t /overnment of Indi! eve .

    e p in en!" ing !nd !ssisting the senior Po ice Officers in "etter m!n!gement of Po ice Gorce

    eeping tr!c) of the progress of the crime !nd crimin! investig!tion !nd prosecutionc!ses6 inc uding progress of c!ses in the court

    e p in reducing the m!nu! !nd redund!nt record )eeping.

    C3m/a#i*3$ bet+ee$ I$dia$ Cybe# 0a+ & hi0i//i$e* Cybe# La+

    IN2IAN CYBER LAWS HILI INNES CYBER LAWS$iti5ens c!n !v!i wider freedom of Greedom of eDpression is restricted due to

  • 8/11/2019 Information Technology Act - Final.doc

    38/56

    eDpression sternness of the !wThe punishments under this !w !re ess

    severe

    The punishments !re h!rsh. On ine crimes !re

    punished more severe # th!n the re! crime

    which inc udes fine of mi ion "uc)s or up to

    12 #e!rs in ?!i .$hi d pornogr!ph# % c#"er s:u!tting is

    punish!" e under this !w.

    The !mendment under this !w on 3 rd Octo"er

    2012 proposed to remove chi d pornogr!ph#

    % c#"er s:u!tting.There is no such provision under this !w. This !w m!nd!tes N!tion! (ure!u of

    investig!tion % Phi ippine n!tion! po ice to

    org!ni5e c#"er crime units st!ffed "# speci!

    investig!tors who !re so e # responsi" e to

    h!nd e c#"ercrime c!ses.Person! d!t! of citi5ens is e!si # !ccessi" e. Person! d!t! of citi5ens is )ept high #

    confidenti!

    CASE ST 2IES

    NMIMS

    In ! m!?or educ!tion7re !ted r!c)et "ust6 siD persons h!ve "een identified for h!vingimperson!ted 8> c!ndid!tes in the N!rsee *on?ee *!n!gement Aptitude Test ;N*AT9 which

    w!s he d from Octo"er 11 to Cecem"er 1 6 2012. A ?oint te!m of the c#"er7crime po ice !nd-nit 86 $rime (r!nch6 *um"!i h!s !rrested one of these imperson!tors whi e the rem!ining

    five !re #et to "e c!ught6 c !imed the *um"!i7"!sed N!rsee *on?ee Institute of *!n!gement

  • 8/11/2019 Information Technology Act - Final.doc

    39/56

    Studies ;N*I*S9 -niversit#6 which conducts the N*AT for !dmissiSons to its *(A progr!ms.

    The ! eged imperson!tor c!ught unti now is n!med A o) um!r. In !ddition6 the po icec !imed to h!ve !rrested five other peop e who were org!nising them! pr!ctice. (r!?endr!pr!t!p Singh6 one of these !ccused6 h!d promised one student of

    securing him p!ssing m!r)s in the N*AT through m!n!gement :uot! for 's 1 !)h.There!fter6 the !ccused too) 's >. !)h !s !dv!nce from the student !nd emp o#ed ! dumm#

    c!ndid!te to t!)e the test in p !ce of the student. The !ccused then informed the student th!the h!d p!ssed the N*AT eD!m !nd h!d "een short isted for the group discussion !nd

    interview. The student wou d then "e !s)ed to p!# up the rem!ining 's >. !)h.The other !ccused h!ve "een tr!ced !nd !rrested from Ce hi6 -tt!r Pr!desh !ndPune. !num!nt Singh /u?!r@s credit c!rd w!s used to p!# the !dmission fees for some of the

    students whi e his "rother Sugriv Singh /u?!r used to medi!te "etween the students !nddumm# test t!)ers. P!v!n um!r !nd im!nshu She)h!r were "oth ! so midd emen who

    used to ure N*I*S !spir!nts into p!#ing mone# on the preteDt of !dmission throughm!n!gement :uot! !nd then p!ss them on to consu t!nts. Such w!s the efficienc# of the

    i eg! service th!t most of these students scored 220 m!r)s or !"ove in N*AT6 ! ver# highscore for the test.

    Ehi e the imperson!tors m!n!ged to get p!st the N*AT verific!tion s#stems using forged

    prim!r# !nd second!r# identit# proofs6 the students "enefitting from the m! pr!ctice weren!i ed "# N*I*S during the group discussion !nd interview st!ge !fter their photogr!phs

    were found to "e not m!tching those given !t the time of the test. Among the 8> students who! eged # !v!i ed of this m! pr!ctice6 on #

  • 8/11/2019 Information Technology Act - Final.doc

    40/56

    profi ing6 used to prevent imperson!tion6 during the test chec)7in process. Cespite !rgu!" #we!)er securit# me!sures6 the N*AT costs 's 16< 06 higher th!n the $AT which costs 's

    16

  • 8/11/2019 Information Technology Act - Final.doc

    41/56

    3. The s! e consider!tion w!s not routed through the !ccused.. Prim! f!cie (!!5ee.com h!d ende!vored to p ug the oopho e.. The !ccused h!d !ctive # p!rticip!ted in the investig!tions.

  • 8/11/2019 Information Technology Act - Final.doc

    42/56

    inform!tion of the current c! er6 " oc) unw!nted c! s !nd connect their G!ce"oo) or &in)edIn !ccount to view the !test mess!ges from their connections.

    The issue with the !pp is th!t a /e#*3$ i* $3t i$ 53$t#30 i" thei# $umbe# i* bei$, *ha#ed 3$the *e#%i5e by 3$e 3" thei# 53$ta5t . Ehi e the service does offer !n option to un ist !num"er6 we !re not sure how m!n# peop e !re !w!re th!t their num"er is ! re!d# sh!red onthe service !nd then go !"out un isting their num"er on the service. (esides th!t6 it4s ! sounc e!r whether Truec! er !ctu! # de etes ! records from their d!t!"!se !fter one de iststheir num"ers. Grom their GAU

    BGor the respect of #our securit#6 #our num"er wi "e immedi!te # !nd perm!nent # removedfrom !n# se!rch resu t. ou c!nnot su"mit #our num"er !g!in. P e!se goto http JJwww.truec! er.comJun ist to un ist #our num"er perm!nent #.

    Ehi e it st!tes th!t it removes one4s num"er from se!rch resu ts it4s not !pp!rent th!t therecords !re perm!nent # de eted. So even if one h!s un isted their num"er6 we !re not :uitesure whether their d!t! h!s "een compromised !s it might sti "e stored in Truec! er4sservers.

    &!st month6 Truec! er h!d c !imed to h!ve c oc)ed 20 mi ion users g o"! # !st month6 upfrom 10 mi ion users in =!nu!r# 2013. Truec! er h!d previous # c !imed th!t m!?orit# of itsusers !re from Indi!6 ! though it h!dn4t disc osed !n# specific inform!tion on its Indi!n user

    "!se. An ,T report suggests th!t the comp!n# h!d 1.< mi ion users in Indi! !s of =une 2012!nd !ccounted for h! f of the comp!n#4s user"!se. A so note th!t6 these 1.< mi ion users th!tthe report suggests !re the ones th!t use the !pp ic!tion6 which me!ns th!t the a5tua0 $umbe#3" /h3$e b33' #e53#d* "#3m I$dia 3$ T#ue5a00e# * *e#%e#* 53u0d be mu5h hi,he# .

    G#ee' ha5'e#* *tea0 R* !( 0a'h "#3m A i* Ba$' a553u$t* u*i$, 503$ed debit 5a#d*

    =o" ess /ree)s sto e mone# from *um"!i po icemen@s ADis (!n) !ccounts using c oned

    de"it c!rds 6 eDposing the vu ner!"i it# of !ccount ho ders in Indi! to rising crime !cross

    ,urope !nd the -S.

    ,uro tr!ns!ctions in the !utom!ted te er m!chines ; AT*s 9 in /reece ed to !"out 2 Indi!ns6

    inc uding peop e from the po ice dept6 osing !n e:uiv! ent of !"out 's 13 !)h6 s!id *um"!i

    po ice. The "!n) h!s suspected th!t this might h!ve "een done "# some org!nised g!ng th!t is

    we versed with forger#6h!c)ing !nd dup ic!tion methods6M Ceput# $ommissioner of Po ice

    S!t#! N!r!#!n to d ,T. MThis cou d "e ! c!se of c oning of de"it c!rds6 "ut we !re not sure

    !"out the method used #et. Ee !re investig!ting the m!tter.M

    http://www.truecaller.com/unlisthttp://www.truecaller.com/support/http://www.truecaller.com/unlisthttp://www.mynewsdesk.com/pressroom/truecaller/pressrelease/view/truecaller-app-hits-20-million-global-users-875680http://www.medianama.com/2013/01/223-truecaller-10-million-usershttp://www.medianama.com/2013/01/223-truecaller-10-million-usershttp://articles.economictimes.indiatimes.com/2012-06-20/news/32337276_1_popular-app-phone-numbers-user-basehttp://economictimes.indiatimes.com/topic/Axis%20Bank%20accountshttp://economictimes.indiatimes.com/topic/cloned%20debit%20cardshttp://economictimes.indiatimes.com/topic/cloned%20debit%20cardshttp://economictimes.indiatimes.com/topic/ATMshttp://economictimes.indiatimes.com/topic/hackinghttp://economictimes.indiatimes.com/topic/hackinghttp://www.truecaller.com/unlisthttp://www.truecaller.com/support/http://www.truecaller.com/unlisthttp://www.mynewsdesk.com/pressroom/truecaller/pressrelease/view/truecaller-app-hits-20-million-global-users-875680http://www.medianama.com/2013/01/223-truecaller-10-million-usershttp://www.medianama.com/2013/01/223-truecaller-10-million-usershttp://articles.economictimes.indiatimes.com/2012-06-20/news/32337276_1_popular-app-phone-numbers-user-basehttp://economictimes.indiatimes.com/topic/Axis%20Bank%20accountshttp://economictimes.indiatimes.com/topic/cloned%20debit%20cardshttp://economictimes.indiatimes.com/topic/cloned%20debit%20cardshttp://economictimes.indiatimes.com/topic/ATMshttp://economictimes.indiatimes.com/topic/hacking
  • 8/11/2019 Information Technology Act - Final.doc

    43/56

    Poor # secured c!rds from Indi!n "!n)s !nd crimin! e ements eDp oiting unprofession! w!#

    of using de"it !nd credit c!rds !re r!ising the num"er of fin!nci! crimes "oth oc! # !nd

    !"ro!d. At e!st 's 30 crore worth of tr!ns!ctions were done !st Cecem"er !nd =!nu!r#

    using sto en credit c!rd identit#. MEe h!ve reversed the imp!ct in ! such customers@ !ccounts

    with immedi!te effect6 to ensure the# !re not inconvenienced6@@ s!id !n ADis (!n) spo)esm!n.

    The intern!tion! s#ndic!te of crimin! s w!s !ccessing inform!tion !"out c!rd ho ders !t

    ret!i est!" ishments. These were done most # "# c oning c!rds during intern!tion! tr!ve .

    Some of the countries such !s South Afric! !nd Th!i !nd !re notorious for th!t.

    (!n)s !re enh!ncing the securit# to prevent misuse of e ectronic p!#ments 6 which h!s now

    "ecome the preferred mode of tr!ns!ction for customers. MIf the# profi e customers !nddetermine vectors correct # then !n !"norm! us!ge wou d cre!te ! red f !g 7 i)e the oc!tion

    where the mone# is withdr!wn6M S!?!n P!u 6 director7 s#stems engineering 7 Indi! % SAA'$

    for =uniper Networ)s to d ,T.

    In Cecem"er6 Pune7"!sed p!#ment processor , ectr!$!rd Services w!s h!c)ed "# ! g o"!

    c#"er7crime ring6 which ! so "ro)e into the s#stems of (!ng! ore7"!sed ,nSt!ge Inc.

    compens!ted the victims.

    A//0e "i i$, bu, that a003+* "a'e 5ha#,i$, *tati3$* t3 ha5' i h3$e*

    &AS Q,/AS App e Inc@s neDt softw!re upd!te for its iPhones !nd iP!ds wi fiD ! securit#

    f !w th!t ! ows h!c)ers to eng!ge in sp#ing !nd c#"er crimes when the victim connects the

    device to ! f!)e ch!rging st!tion6 the comp!n# s!id on Eednesd!#.App e@s devices !re

    vu ner!" e to !tt!c)s unti the comp!n# re e!ses its iOS > softw!re upd!te6 which is s !ted for

    this f! .

    http://economictimes.indiatimes.com/topic/Indian%20bankshttp://economictimes.indiatimes.com/topic/Indian%20bankshttp://economictimes.indiatimes.com/topic/credit%20cardshttp://economictimes.indiatimes.com/topic/electronic%20paymentshttp://economictimes.indiatimes.com/topic/EnStage%20Inc.http://economictimes.indiatimes.com/topic/iOShttp://economictimes.indiatimes.com/topic/Indian%20bankshttp://economictimes.indiatimes.com/topic/credit%20cardshttp://economictimes.indiatimes.com/topic/electronic%20paymentshttp://economictimes.indiatimes.com/topic/EnStage%20Inc.http://economictimes.indiatimes.com/topic/iOS
  • 8/11/2019 Information Technology Act - Final.doc

    44/56

    Three computer scientists6 who ! erted App e to the pro" em e!r ier this #e!r6 demonstr!ted

    the securit# vu ner!"i it# !t the ( !c) !t h!c)ing convention in &!s Qeg!s on Eednesd!#

    where some >6000 securit# profession! s !re e!rning !"out the !test thre!ts posed "#

    computer h!c)ing.

    App e s!id the issue h!d "een fiDed in the !test "et! of iOS >6 which h!s ! re!d# "een

    re e!sed to softw!re deve opers.

    MEe wou d i)e to th!n) the rese!rchers for their v! u!" e input6M App e spo)esm!n Tom

    Neum!#r s!id.

    The wor) w!s done "# (i # &!u6 ! rese!rch scientist !t the /eorgi! Institute of Techno og# 6

    !nd gr!du!te students eong?in =!ng !nd $heng#u Song.

    In ! demonstr!tion !t the h!c)ing conference6 the# p ugged !n iPhone into ! custom7"ui t

    ch!rger the# e:uipped with ! tin# &inuD computer th!t w!s progr!mmed to !tt!c) iOS

    devices. The# s!id it cost !"out L to "u# !nd ! wee) to design.

    It infected the phone with ! computer virus designed to di! the phone of one of the

    rese!rchers6 which it did.

    The# s!id th!t re! 7wor d c#"er crimin! s might "ui d viruses th!t wou d give them remote

    contro of the devices. Th!t wou d en!" e them to t!)e screen shots for ste! ing "!n)ing

    p!sswords !nd credit c!rd num"ers. The# cou d ! so !ccess em!i s6 teDts !nd cont!ct

    inform!tion or tr!c) the oc!tion of the phone@s owner6 &!u s!id.MIt c!n "ecome ! sp#ing

    too 6M s!id &!u.

    &!u s!id the# were pu" ici5ing the issue in the spirit of Mwhite h!tM h!c)ing6 which is finding

    securit# "ugs so th!t m!nuf!cturers c!n fiD them "efore crimin! s eDp oit them.

    MSecurit# doesn@t wor) if #ou "ur# pro" ems6M he to d 'euters on the side ines of the press

    conference.

    &!u s!id th!t devices running /oog e Inc@s Android oper!ting s#stem !re not vu ner!" e to

    the s!me t#pes of !tt!c) "ec!use the# w!rn users if the# p ug devices into ! computer6 even

    one posing !s ! ch!rging st!tion.After App e@s iOS > softw!re upd!te6 ! mess!ge wi pop up

    http://economictimes.indiatimes.com/topic/Tom%20Neumayrhttp://economictimes.indiatimes.com/topic/Tom%20Neumayrhttp://economictimes.indiatimes.com/topic/Billy%20Lauhttp://economictimes.indiatimes.com/topic/Billy%20Lauhttp://economictimes.indiatimes.com/topic/Georgia%20Institute%20of%20Technologyhttp://economictimes.indiatimes.com/topic/Georgia%20Institute%20of%20Technologyhttp://economictimes.indiatimes.com/topic/Georgia%20Institute%20of%20Technologyhttp://economictimes.indiatimes.com/topic/Yeongjin%20Janghttp://economictimes.indiatimes.com/topic/iPhonehttp://economictimes.indiatimes.com/topic/Linuxhttp://economictimes.indiatimes.com/topic/Androidhttp://economictimes.indiatimes.com/topic/Tom%20Neumayrhttp://economictimes.indiatimes.com/topic/Tom%20Neumayrhttp://economictimes.indiatimes.com/topic/Billy%20Lauhttp://economictimes.indiatimes.com/topic/Georgia%20Institute%20of%20Technologyhttp://economictimes.indiatimes.com/topic/Yeongjin%20Janghttp://economictimes.indiatimes.com/topic/iPhonehttp://economictimes.indiatimes.com/topic/Linuxhttp://economictimes.indiatimes.com/topic/Android
  • 8/11/2019 Information Technology Act - Final.doc

    45/56

    to ! ert the user th!t the# !re connecting to ! computer6 not !n ordin!r# ch!rger6 he s!id.

    NEWS ARTICLES

    M3*t *t35' e 5ha$,e* *ee 5ybe#:5#ime a* *y*temi5 #i*'@

    N,E C,& I A m!?orit# of stoc) eDch!nges wor dwide c!me under c#"er !tt!c)s !st #e!r

    !nd ! most 0 per cent of them perceive such !ctivities to "e ! potenti! s#stemic ris)6

    !ccording to ! surve#.

    Gor the "ourses6 c#"er7crimes 77 whose n!ture is "ecoming more comp eD 77 cou d resu t in

    Mm!ssive fin!nci! !nd reput!tion! imp!ct6M !mong other !dverse f! outs.

    The findings !re p!rt of the 2012713 $#"er7$rime Surve# ?oint # conducted "# the IOS$O

    'ese!rch Cep!rtment !nd the Eor d Geder!tion of ,Dch!nges. It covered v!rious eDch!nges

    !nd centr! counterp!rt# c e!ring houses !cross the wor d.

    The Intern!tion! Org!nis!tion of Securities $ommissions ;IOS$O9 is ! grouping of c!pit!

    m!r)et regu !tors6 inc uding the Securities !nd ,Dch!nge (o!rd of Indi!; Se"i 9.

    MA m!?orit# of eDch!nges ;8 per cent9 view c#"er7crime in securities m!r)ets !s ! potenti!

    s#stemic ris)6M the report s!id.

    *ore th!n h! f of the eDch!nges surve#ed s!id the# h!d suffered ! c#"er !tt!c) in 2012.

    M,Dch!nges from the Americ!s were more i)e # to report h!ving suffered !n !tt!c) ; per

    cent96M it !dded.

    $#"er7crimes in the securities m!r)ets !re gener! # disruptive in n!ture !nd cou d neg!tive #

    imp!ct m!r)et integrit# !nd efficienc#.

    Gurther6 the surve# showed th!t eDch!nges emp o# sever! prevent!tive !nd detection

    mech!nisms to t!c) e c#"er7crimes.

    http://economictimes.indiatimes.com/topic/cyber%20attackshttp://economictimes.indiatimes.com/topic/cyber%20attackshttp://economictimes.indiatimes.com/topic/IOSCOhttp://economictimes.indiatimes.com/topic/capital%20markethttp://economictimes.indiatimes.com/topic/capital%20markethttp://economictimes.indiatimes.com/topic/capital%20markethttp://economictimes.indiatimes.com/topic/Sebihttp://economictimes.indiatimes.com/topic/cyber%20attackshttp://economictimes.indiatimes.com/topic/IOSCOhttp://economictimes.indiatimes.com/topic/capital%20markethttp://economictimes.indiatimes.com/topic/capital%20markethttp://economictimes.indiatimes.com/topic/Sebi
  • 8/11/2019 Information Technology Act - Final.doc

    46/56

    M...Ne!r # ! ; per cent9 of eDch!nges surve#ed report th!t dis!ster7recover# protoco s !re

    in p !ce in their org!nis!tion6M it !dded.

    owever6 !"out ! :u!rter of the p!rticip!ting "ourses s!id th!t current prevent!tive !nd

    recover# mech!nisms m!# not "e sufficient in the f!ce of ! !rge7sc! e6 coordin!ted c#"er7

    !tt!c).

    *e!nwhi e6 ! st!ff wor)ing p!per pu" ished on =u # 1< "# IOS$O s!id inst!nces of !tt!c)s

    !g!inst eDch!nges me!ns th!t c#"er7crime is ! re!d# t!rgeting securities m!r)ets@ core

    infr!structures !nd providers of essenti! ;!nd non7su"stitut!" e services9.

    MAt this st!ge6 these c#"er7!tt!c)s h!ve not imp!cted core s#stems or m!r)et integrit# !nd

    efficienc#. owever6 some eDch!nges surve#ed suggest th!t ! !rge7sc! e6 successfu !tt!c)

    m!# h!ve the potenti! to do so6M the p!per s!id.

    Cybe# 5#ime@ Ea*y m3$ey8 0a5' 3" dete##e$t* amid *03+ 3b ma#'et 0u#e I$dia$* i$t3

    ha5'i$, *e#%i5e*

    *-*(AI Indi! is f!st emerging !s ! t! ent hotspot for the g o"! c#"er7crime industr# !mid

    s ow hiring in the tr!dition! softw!re industr#6 the ure of e!s# mone#6 !nd !c) of !w

    enforcement6 !ccording to computer securit# eDperts.

    Eor) such !s h!c)ing into computer networ)s !nd cre!tion of m! w!re is "eing outsourced to

    c#"er7mercen!ries in Indi! through underground m!r)etp !ces. It is possi" e to rent "otnets 7

    computers contro ed "# ! h!c)er 7 to !unch dis!" ing !tt!c)s to "ring down we"sites for !s

    itt e !s MIncre!sing #6 Indi! is "ecoming not ?ust the victim "ut the host countr# with reg!rd

    to c#"er !tt!c)s6M =!gdish *!h!p!tr!6 m!n!ging director for Indi! !nd SAA'$ !t !nti7virus

    m!)er *cAfee6 to d ,T. The process h!s "ecome so org!nised th!t some of these h!c)ing

    services come with &ive $h!t customer support6 !ccording to *cAfee.

    In 20126 *cAfee &!"s identified !t e!st 8 0 sep!r!te "its of re!d#7to7down o!d m! w!re

    hosted on computers in Indi!. In the first :u!rter of 20136 the num"er h!d ?umped to 16100.

    Indi! is r!n)ed eighth in the wor d in terms of num"er of !tt!c)s origin!ting here6 ! report "#A)!m!i Techno ogies in *!# s!id.

  • 8/11/2019 Information Technology Act - Final.doc

    47/56

    M( !c)h!ts c!n m!)e ! ot of mone#6 so I@m not surprised th!t we@re "eginning to see c#"er7

    crime m!r)ets emerge in Indi!6M s!id OD" ood 'uffin6 ! $!n!di!n h!c)tivist "!sed in

    (!ng! ore. In Internet securit# !ngu!ge6 ! " !c)h!t refers to someone who eDp oits

    vu ner!"i ities in computers with m! icious intent or person! g!in. In *!rch6 Norwegi!n

    te ecommunic!tions services provider Te enor reported !n intrusion into its computer

    networ)s. $#"er7securit# comp!n# Norm!n Sh!r) tr!ced th!t !tt!c) to Indi! !nd documented

    it in ! whitep!per tit ed @-nvei ing !n Indi!n $#"er7!tt!c) Infr!structure@.

    I$dia Ha* the S'i00*

    M ou h!ve underground h!c)er forums where peop e post their h!c)ing re:uirement !nd #ou

    c!n "id for them !nd h!ve the mone# tr!nsferred to ! P!#P! !ccount vi! ! service c! ed

    Perfect *one#6M S!rv!i#! s!id. Ehi e ethic! h!c)ers cou d e!rn 306000 ! mon7th eg! #6

    c#"er crime fetches mo7re th!n L26000 ; 163060009 ! month.

    Perfect *one# functions !s !n e7currenc#. The currenc# units c!n "e tr!nsferred "etween

    customers6 whose identities c!n "e hidden. The units c!n "e redeemed for c!sh 7 in do !rs or

    euros 7 or go d "# third7p!rt# eDch!nge services.

    The h!c)er forums c!nnot "e !ccessed vi! st!nd!rd we" "rowsers 7 wh!t is re:uired is !

    speci! "rowser c! ed ! Tor (rowser th!t ! ows !ccess to the @hidden we"@ where these

    " !c)h!t h!c)ers oper!te.

    The forums oo) i)e ! soci! networ)ing site designed "# de!th7met! f!ns. Attempts "# ,T

    to cont!ct h!c)ers on these forums were not successfu . Some of the tr!its th!t m!de Indi! the

    hu" for sourcing techno og# services !re ! so contri"uting to the rise of this new du"ious

    tr!de. M ou need softw!re s)i sF the countr# h!s th!t c!p!"i it#. Then #ou need motiv!tion6

    which is the mone#6 !nd the )now edge th!t the Indi!n eg! s#stem is i)e # to not "e !" e to

    prosecute #ou. These !re cross7"order computer crimes6 our !ws h!ve not re!ched th!t

    point6M s!id Cinesh Pi !i6 $,O of *!hindr! Speci! Services /roup.

    There is no estim!te of the num"er of Indi!n h!c)ers for hire. And securit# industr#

    profession! s s!id whi e the# )new the num"er of !tt!c)s from Indi! w!s rising6 the# cou d

  • 8/11/2019 Information Technology Act - Final.doc

    48/56

    not pinpoint individu! !tt!c)s th!t cou d "e !ttri"uted to Indi!n h!c)ers L2 ; 12 9 per hour.

    I$dia I$5 *h3u0d +a'e u/ t3 the 5ybe# th#eat*

    The recent incident of c#"er theft !t ADis (!n) shou d serve !s ! w!)e7up c! for Indi!n

    industr#. Ee !re vu ner!" e.

    Cem!teri! ised sh!res he d in e ectronic !ccounts6 "!n)s !nd pension funds6 power

    tr!nsmission !nd distri"ution s#stems6 tr!in sign! ing s#stems6 he! th c!re s#stems !nd

    records6 w!ter distri"ution s#stems6 the A!dh!!r d!t!"!se6 pr!ctic! # ever#thing is tod!#

    contro ed in c#"er sp!ce.

    If th!t contro does not wor) !s it is supposed to6 or gets hi?!c)ed "# crimin! s or hosti e st!te

    !gencies6 ch!os wi resu t. Indi! needs to put in p !ce s#stems to gu!rd !g!inst !rge7sc! e

    disruption !nd oss !s ! resu t of c#"er !tt!c)s. And this goes "e#ond form! !dherence to

    ISO st!nd!rds.

    The government is re!d#ing ! c#"er securit# fr!mewor)6 ! c#"er securit# po ic# !nd !

    N!tion! $#"er $oordin!tion $entre ;N$$$9 th!t wi monitor met!d!t! on c#"er tr!fficf ows. owever6 it is "e#ond the government@s prowess to ensure securit# on its own.

    On # strong pu" ic7priv!te p!rtnership c!n secure the n!tion !nd its vit! functions. This c! s

    for coordin!ted !ction on mu tip e fronts. One is po ic# !nd egis !tion6 to ensure integrit#

    !nd !ccount!"i it# to c#"er monitoring.

    The government proceeds !s if one c !use in the Inform!tion Techno og# Act is enough to

    protect Indi!ns@ priv!c#. Ee need ! sep!r!te !nd we 7thought7out !w on the su"?ect.

    Procedures for "re!ching it when necess!r# must "e rigorous6 tr!nsp!rent !nd !men!" e to

    !udit. A second front is techno ogic! c!p!"i it#. Grom setting st!nd!rds !nd testing of

    e:uipment to !dv!nces in cr#ptogr!ph#6 !rge !re!s c! for institutions to "e set up !nd

    hum!n c!p!"i it# "ui t up.

    A strong domestic m!nuf!cturing "!se wou d "e ! gre!t he p. Pu" ic !w!reness !nd

    invo vement is the third !re! of !ction. Grom p!ssive securing of individu! phones !nd

    http://economictimes.indiatimes.com/axis-bank-ltd/stocks/companyid-9175.cmshttp://economictimes.indiatimes.com/topic/pensionhttp://economictimes.indiatimes.com/topic/cyber%20security%20policyhttp://economictimes.indiatimes.com/topic/National%20Cyber%20Coordination%20Centrehttp://economictimes.indiatimes.com/topic/Information%20Technology%20Acthttp://economictimes.indiatimes.com/axis-bank-ltd/stocks/companyid-9175.cmshttp://economictimes.indiatimes.com/topic/pensionhttp://economictimes.indiatimes.com/topic/cyber%20security%20policyhttp://economictimes.indiatimes.com/topic/National%20Cyber%20Coordination%20Centrehttp://economictimes.indiatimes.com/topic/Information%20Technology%20Act
  • 8/11/2019 Information Technology Act - Final.doc

    49/56

    computers to !ctive rese!rch in com"!ting c#"er !tt!c)s !nd snooping6 ! r!nge of !ctivit#

    c! s for vigorous p!rticip!tion "# Indi!@s #outh. The# must "e enthused !nd motiv!ted. The

    c#"er !gend! is !rge !nd urgent.

    .e#a0a t3 *et u/ !4 5ybe# 5e00* t3 ta5'0e 5ybe# 5#ime*

    T I'-QANANT AP-'A* The er! ! government wi set up 1 c#"er ce s to t!c) e the

    growing incidence of c#"er7re !ted crimes in the st!te6 $hief *inister Oommen $h!nd# s!id

    here tod!#.

    Spe!)ing to reporters !fter ! c!"inet meeting6 he s!id the c#"er ce s wou d "e set up in po ice

    district he!d:u!rters6 for which seven new posts h!ve "een s!nctioned.

    Su#%ey 3$ 5ybe# 0a+* & 5ybe# th#eat*

    ECONOMICS TIME ANALYSIS 6!; th SE TEMBER ; !;7@

    In the p!st 12 months6 c#"er crime cost ever# Indi!n net worth victim 's. 106 on !n!ver!ge. Indi! is emerging !s the g o"! hot spot of c#"er croo)s.

    http://economictimes.indiatimes.com/topic/Oommen%20Chandyhttp://economictimes.indiatimes.com/topic/Oommen%20Chandy
  • 8/11/2019 Information Technology Act - Final.doc

    50/56

    Su#%ey A$a0y*i* IN2IA GLOBAL

    A)ERAGENumbe# 3" 5ybe# 5#ime %i5tim* 2 mi ion 23 mi ion

    Th3*e de"#auded 3$5e i$ thei# 0i"etime

  • 8/11/2019 Information Technology Act - Final.doc

    51/56

    2. !ve #ou ever tried the fo owing !ctivities

  • 8/11/2019 Information Technology Act - Final.doc

    52/56

  • 8/11/2019 Information Technology Act - Final.doc

    53/56

    . Eh!t do #ou thin) the IT Act is for

    CONCERNS OF CYBER LAWS

    L33/h30e*

    !ving discussed in det!i ! the provisions of ITA !nd ITAA6 et us now oo) !t some of the

    "ro!der !re!s of omissions !nd commissions in the Act !nd the gener! criticism the Acts

    h!ve f!ced over the #e!rs.

    A7 A+a#e$e**@ There is no serious provision for cre!ting !w!reness !nd putting suchiniti!tives in p !ce in the Act. The government or the investig!ting !gencies i)e the

    Po ice dep!rtment ;whose ?o" h!s "een m!de comp!r!tive # e!sier !nd focused6

    th!n)s to the p!ssing of the IT Act96 h!ve t!)en !n# serious step to cre!te pu" ic

    !w!reness !"out the provisions in these egis !tions6 which is !"so ute # essenti!

    considering the f!ct th!t this is ! new !re! !nd techno og# h!s to "e e!rnt "# ! the

    st!)e7ho ders i)e the ?udici! officers6 eg! profession! s6 itig!nt pu" ic !nd the

    pu" ic or users !t !rge. ,speci! # provisions i)e scope for !d?udic!tion process isnever )nown to m!n# inc uding those in the investig!ting !gencies.

  • 8/11/2019 Information Technology Act - Final.doc

    54/56

    B7 Ju#i*di5ti3$@ This is ! m!?or issue which is not s!tisf!ctori # !ddressed in the ITA or

    ITAA.

    =urisdiction h!s "een mentioned in Sections !nd

  • 8/11/2019 Information Technology Act - Final.doc

    55/56

  • 8/11/2019 Information Technology Act - Final.doc

    56/56

    Bib0i3,#a/hy

    B33'*@

    Bu*i$e** 0a+ by

    Li$'*@

    http JJeprocure.gov.inJcpppJsitesJdef!u tJfi esJeprocJit!ct2000.pdf

    http JJwww.emc.comJco !ter! Jfr!ud7reportJcurrent7st!te7c#"ercrime72013.pdf

    http JJwww. eg! pundits.comJ)rXcontent.do v Y i%idY 301

    htt/@ deity9,3%9i$ 53$te$t %ie+:it:a5t:;

    +++95ybe#0a+*i$dia9$et I$"3#mati3$:te5h$303,y:a5t:3":i$dia9htm0

    +++9mit9,3%9i$ 53$te$t i$"3#mati3$:te5h$303,y: a5t:;

    +++9e53$3mi5time*953m

    +++9i$diat3day9i$9t3day9i$

    http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdfhttp://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdfhttp://www.legalpundits.com/kr_content.do?v@=li&id=4301http://deity.gov.in/content/view-it-act-2000http://www.cyberlawsindia.net/Information-technology-act-of-india.htmlhttp://www.mit.gov.in/content/information-technology-act-2000http://www.mit.gov.in/content/information-technology-act-2000http://www.economictimes.com/http://www.indiatoday.in.today.in/http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdfhttp://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdfhttp://www.legalpundits.com/kr_content.do?v@=li&id=4301http://deity.gov.in/content/view-it-act-2000http://www.cyberlawsindia.net/Information-technology-act-of-india.htmlhttp://www.mit.gov.in/content/information-technology-act-2000http://www.economictimes.com/http://www.indiatoday.in.today.in/