Professional Documents
Culture Documents
Government Agencies.
Electronic Gazette.
Hacking
Misrepresentation
Publishing Digital Signature Certificate false
in certain particulars and publication for
fraudulent purposes.
LITIGATION ALREADY
BEGUN
Litigation already begun in India relation to e-
procurement.
Numerous legal issues relating to electronic
government procurement will continue to
emerge in the near future.
Need to adopt a proactive approach in dealing
with these various legal challenges
AMENDMENTS IN
IT ACT, 2000
MAKES THE LAW TECHNOLOGY
NEUTRAL
ELECTRONIC SIGNATURES INSTEAD OF
DIGITAL SIGNATURES
NEW PROVISION ON PRIVACY
WATERS DOWN THE LIABILITY OF THE
NETWORK SERVICE PROVIDERS
HUGE DRAWBACKS OF THE
PROPSOED AMENDMENTS
DATA PROTECTION
NO NEW CYBERCRIMES ADDED
TAXATION
E-PAYMENTS
NEED TO COMPLY
There is a need to proactively comply with the
requirements of the Indian Cyberlaw .
Necessary to limit liability and emergence of
undesirable consequences.
The Information Technology Act, 2000
currently under review by the Government.
Need to adopt a flexible approach of due
diligence.
Types of Cyber crimes
Credit card frauds
Cyber pornography
Sale of illegal articles-narcotics, Crime against Government
weapons, wildlife
Online gambling
Intellectual Property crimes-
software piracy, copyright
infringement, trademarks
violations, theft of computer Crime against property
source code
Email spoofing
Forgery
Defamation
Cyber stalking (section 509 IPC) Crime against persons
Cyber terrorism
Frequency of incidents of Cyber crimes in
India
24
Computer Related Crimes under IPC
and Special Laws
Sending threatening messages by email Sec 503 IPC
25
ASLU Survey published in March
2007-Incidence of Cyber crime in
India
Non Reporting-causes
60% feared negative
UNAUTHORISED publicity
ACCESS 19%
23% did not know police
equipped to handle cyber
E-MAIL ABUSE 21% crimes
9% feared further cyber
attacks
DATA THEFT 33%
8% had no awareness of
cyber laws
False arrest concerns
Frequency of incidents of Cyber crimes in
India
Incident wise break up
other 2007
2006 Denial of Service: Section
dos 43
Virus: Section: 66, 43
virus
Data Alteration: Sec. 66
Data
alteration U/A Access: Section 43
Email Abuse: Sec. 67,
un.Access
500, Other IPC Sections
0 5 10 15 20 25 30
Source: Survey conducted by ASCL