You are on page 1of 20

FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

STUDY MATERIAL- Prof.


G.Yazdani, JMI
Vve are reaching the next era in the evolution of the internet. The current golden age of
inrormation and connectivity has so far been focused on the sharing of information between

numans uSing We are reaching the next era in h e evolution of the internet.

n e current golden age of information and connectivity has so far been focused on the

sharing ot intormation between humans using networks and computing power.

n e sonware and devices managing this process are certainly complex, but tor tne most

and
part these systems have relied on humans to act on the information being transierred

to make in the real world.


processed changess

n e next Significant step is the removal of the boundary between the physical world and

tne intenet, to enable machines to communicate with each other to achieve pnysical
Outcomes. This is a world where you never run out of milk. because your fridge knows how

much you have left, and can order you more- unless it krnows from your calendar that you

are going on holiday.

This world will require machines to communicate on an unprecedented scale..Most homes


Currently have a handful of devices connected to the internet. In the new age, every single
electrical item could have its own software and network connection, sending and receiving
data and instructions and from the web.

inroads are being made across a number of sectors including energy, telehealth and in the
automative industry where progress has in part been driven by
for all new models of passenger cars to be fitted with "eCall"
a system which
automatically dials the emergency services if the car is involved in a
serious accident.

Regulators are also waking up


to the potential public benefits of the internet of
from traffic control. reductions in things
pollution, energy efficiency and costs savings.
However, to achieve the full potential of the internet of
things, there are a number of
challenges that will have to be overcome.

Spectrum Availability
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEw DELHI

All of the devices required to communicate are unlikely to be hardwired to the internet,
and will instead rely on local or mobile wireless communications. The electromagnetic
we can find ways of
spectrum usable for transmissions is a limited resource, and unless
will reach capacity and
doing more with less, the expansion in wireless.communications
grind to a halt.

This risk has caught the attention of the European Commission and Ofcom. Ofcom has

proposed that one way we can do more with less is to make use of the "white space" in
the spectrum between the licensed bands. A trial of white space technology is due to

commence this autumn in the UK.

Network Coverage

Mobile access is increasingly seen as the solution for consumers in remote localions
where it is not commercially viable to install physical connections, but there are many
locations where there are insufficient users to support even mobile connectivity.

As internet access has become ever more important to modern life, the UK government
has increasingly viewed connectivity in rural locations as a responsibility of government.

For example, the UK 4G spectrum auction earlier this year included specific Coverage
obligations on the bidders.

A two-tier system of those in the internet of things and those out of it would cause
inefficiency and inequality, and it is likely that univeraal access will remain on the
legislative agenda, whether funded centrally or paid for by network businesses (and
therefore indirectly by their subscribers).

Standards and Interoperability

As with almost all new technologies, the growth of the intemet of things will be hampered
if producers do not adopt standards which enable devices to interoperate.

There is little point in a home network in which the shower cannot tell the coffee machine
to switch on.

Most technology businesses understand the value to the whole industry of successful
interoperability, and we can expect standards to evolve naturally. particularly considering
the legislative priority given to interoperability in the EU
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

Market Cooperation

The market for M2M communications is currently fragmented, and there are widely
of the speed of growth in
this sector. Vertical alliances and
varying predictions
consolidation between the different stages of production will improve efficiency and the

pace of product development.

Privacy
The amount of personal information we share with online business is a concern of many

consumers, and further EU regulation is imminent in_this area.

With huge amounts of data being generated, tracked and stored by the internet of things
businesses will have an unprecedented insight into the lives of their customers.

As this industry develops and policies designed for the simple information age become
less able to deal with the practical challenges of the internet of things, we will need to
reconsider the basis of our approach to regulating for privacy.

Concept of Information Technology


and Cyber Space: Interface of Technology and Law
cyber law is the part of the overal legal system that deals with the Internet. cyberspace, and their
respective legal issues.

Cyber law covers a fairly broad area, encompassing several subtopics including freedom of
expression. access to and usage of the Internet. and online privacy. Generically, cyber law is
relerred to as the Law of the Interne.

The History of Information Technology: Past, Present, Future

When we think of information technology (IT), we think of computers and the internet. Right?
Even kids can't imagine that there was a time without computers, cell phones and other mobile
devices. We use it everyday and we feel that we can't live without it. We communicate with others
Using cel phones, chat rooms, forums and email. We use the internet for research, entertainment,
communication, work and school. In today's modem time, kids don't have to go to the library to
find information and to do their homework. They conveniently have constant access to the internet
in their own homes. Likewise, businesses use computers and the internet not only for research
purposes but also for gathering and storing information. They no longer have rely
to on paperwork,
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

cabinets and books. However, there was


time when these modem technologies didn't exist and
a

sOcIcry used other forms of what was the latest technology at that time. In fact, information
technology has been around for a long time and without the evolution of IT throughout history, it
wouldn't be where it is today and provide us with the modern technologies that are readily
available to us.

Let's go back through history and take a look at the different stages of IT development:

. Pre Mechanical Age


2. Mechanical Age
3. Electromechanical Age
4. Electronic Age

The Pre Mechanical Age (3000 B.C. and 1450 A.D).


The carliest age of technology has been dated back to the pre mechanical age (between
3000 B.C. and 1450 A.D.). Human beings at that time primarily communicated with each
other using simple picture drawings called petroglyphs,

*They created these drawings on rock. This form of language was used to tell a story, to
keep record of how many animals one owned and to mark their territory.
*This eventually led to the arrival
of the
first writing system known as
"cuniform
(cuneiform was first created between 3500 and 3000 BCE by ancient Sumerians, who were
who inhabited the Mesopotamian region) Instead of using pictures to express
a
people
words, signs were composed to correspond with spoken sounds. Afterwards, the
Phoenician alphabet (The Phoenician alphabet is an alphabet (more specifically,
an abjad) known in modern times from the Canaanite and Aramaic inscriptions found
across the
Mediterranean region. The name-comes from the Phoenician civilization)
Phoenicia was an ancient thalassocratic civilization originating in the Levant region of the
castern Mediterranean, primarily located in modern Lebanon.

9P70:I9L
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

was created which consisted of a more simplified writing technique using symbols to
express single syllables and consonants. Later on, vowels were added and names were
given to the letters to create the alphabet that we use today

As the alphabets and the writing systems became more popular and common, there was more and

more recorded information. This resulted in finding better ways to communicate and keep record

of information.

*The first writing material was simply a pen like object to create markings in wet clay.

leather to
*This led to more usecful forms of writing materials from writing on bark, leaves,
rags to the making of modern-day paper
wrifing on the papyrus plant to making paper with
we use today.
had to confront
However, as more and more people used these new early technologies, they
a new problem.
time? This resulted
*How could of this information for a long period of
they safely store all
in different methods for record keeping such as clay
tablets and scrolls which led to books

and libraries.

abacuses), also called


The numbering systems and the abacus, (The abacus (plural abaci or

It used in
a counting frame, is a calculating tool which has been used since ancient times. was

and Russia, centuries before the adoption of the Hindu-e


theancient Near East, Europe, China, of the abacus has not yet emerged. It consists
of rows
Arabic numeral svstem. The exact origin the first calculator,
of movable beads, or similar objects, strung on a wire. They represent digits).
were also invented during this period.

The Mechanical Age (1450 and 1840 AD)

1450 and 1840) many extraordinary inventions took


During the mechanical age (between the
similarities between our modern-day technologies and
place. This is where we can see
rising technologies back then.
in computation and
D u e to many new technological inventions, there was a great interest
information.
With
*There were several machines that were invented, one
of them being the printing press.
this new movable, metal-type printing machine, the process of composing pages took only
accessible to the public. This
a few, shot minutes which made written technology easily
led to other useful techniques such as the development of book indexes and the use of page

the way of the development of


numbers. These methods of organizing information paved
files and databases.
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

*Other major machine inventions were the following:

The slide rule (1600 ADs)- an analog computer that allowed users to multiply and divide.
T h e Pascaline (around 1642 AD) - a mechanical computer that allowed users to add,

subtract. multiply and divide two numbers.

T h e Leibniz's machine (1670 ADs) - a machine that was an improvement of the Pascaline

that included additional components that made it easier for users to multiply and divide.
T h e difference engine (1820 ADs) - a machine creation that could calculate numbers and

print the results.

Even though these machine inventions were not as effective as the latest technologies we use today.
they play a big role in the evolution process of information technology.

The Electromechanical Age (between 1840 and 1940)

During the time of the electromechanical age (between 1840 and 1940), the beginning of
telecommunication emerged. Many revolutionary technologies were invented in this stage
that led to moderm information technology systems.
First, a new method of communicating înformation was discovered with the voltaic
battery
This discovery. was the first electrical battery that created and stored electricity.
Afterwards, the telegraph was invented to communicate with others over great distances
through the use of electricity.
This led to- the development of Morse Code. (Morse code is a method used in
telecommunication to encode text characters as standardized sequences of two
different signal durations, called dots and dashes, or dits and dahs. Morse code is
named after Samuel Morse, one of the inventors of the telegraph)
This was a system built to communicate with others by breaking down the alphabet into
dots and dashes, transformed into electrical impulses and transmitted over a wire. This was
very similar to today 's digital technologies that break down information. Shortly
afterwards, the telephone and radio were invented. Later on, the first digital computer was
created. It consisted of electromechanical computing
components, data and program
readers, automatic typewriters and input/output and control readers. It was different fromn
our moderm
computers but it resulted an interest to explore
other to make the
ways system
smaller and to operate more effectively.
The Electronic Age (from 1940 to present day)
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

*The electronic
age (from 1940 to
present day) isthe stage of intormation technology that
we
currently live in.
* t first started when clectronic equipment including computers began to take place. At the
Deginning of this stage, it was realized that clectronic vacuum tubes could be used
of clectromechanical parts. instead
T h e first
high-specd digital computer was the ENIAC, Flectronic Numerical Integrator and
Computer. (ENIAC, in full Electronic Numerical Integrator and Computer, the first
programmable general-purpose electronic digital computer, built during
the United States.
World War II by
*American physicist John Mauchly, American engineer J. Presper Eckert, Jr., and their
colleagues at the Moore School of Electrical Engineering at the University_of
Pennsylvania led a government-funded project to build an all-electronic computer.
I t was able 4o solve a large class of numerical problems through reprogramming.It was
also one thousand times faster than that of
electro-mechanical machines from the previous
age.
However, the problem with the ENTAC was that it didn't have the capacity to store program
instructions in its memory. Then, the EDSAC, Electronic Delay Storage Automatic
Calculator was created and was recognized as the first stored-program computer.
Afterwards, the world's first commercial computer was invented known LEO
as (Lyons
Eletronic Office).
The evolution of information technology and the development of computers have been
grouped into five different stages or generations. They are:

1. The First Generation (roughly from 1940-1956)


2. The Second Generation (roughly from 1956-1963)
3. The Third Generation (roughly from 1964-1971)
4. The Fourth Generation (roughly from 1971-Present)
5. The Fifth Generation (Present to Future)

The First Generation (1940-1956)

*During the first generation, computer systems used vacuum tubes. The machines were huge
and took up entire rooms.
*They consumed a large amount of electricity and therefore, were
expensive to operate.
They also generated a lot of heat which
*These first generation
resulted in malfunctions.
computers relied on machine language and could only solve one
problem ata time. It also took a long, complicated process to set a new
the machine.
up problem onto
*Punched cards and paper tape were used for
The ENIAC
input and printouts were used to display output.
was an
example of a first generation computer but it was
plugboard añd switches. programmed by
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

The Second Generation ( 1956-1963)

I n the second generation, vacuum tubes were replaced with transistors. This was a major
improvement, allowing computers to become smaller, faster, cheaper, reliable and morc
energy-cficient.
They were also becoming more accessible sincc high-level programming languages were
developed such as COBOL and FORTRAN.
being
Second generation computers leaned away from cryptic, binary machine language to
symbolic, assembly languages which instruction.
programmed written
Magnetic core technology was also used instead of magnetic drum which made it possible
for computers to store their instructions in their memory.
little, magnetic tape and disks took the place of punched cards.
Litle by

Generation (I964-1971)
The Third

By the time the third generation arrived, there was an increase in the speed and the
efficiency of computers due to the development of integrated circuits
Transistors were made smaller and installed onsilicon chips. Punched cards and printouts
became obsolete since operating systems, keyboards and monitors were created
This allowed computers to operate many different applications at one time with one main
program to monitor and store information. Programming languages were developed that
made programming easier to do:
BASIC was one of those languages. For the first time in history, society as a whole had
access to computêrs.

The Fourth Generation (1971-Present)

*Fourth generation computers upscaled to integrated circuits that contained a umerous


amount of transistors on one, small chip.
*Microprocessors contained memory, logic and control circuits (central processing unit) on
a single chip. Computer systems went from enormous vacuum tubes that filled an entire
room to a tiny chip that could fit in your hand. Computers like IBM and
computer) created for both personal and business
were
Apple PC (personal
products such as Word for Windows and Access purposes. Language software
were also introduced which
peopie to use enabled
computers without the necessity of any technical
generation small "computers became knowledge. As these fourth
devices and finally the internet popular and spread worldwide, networks, handheld
were
developed.
The Fifth Generation ( Present to
future)
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

We are
currently in the fifth
generation. A lot of today s research focuses on artificial
intelligence, the creation of intelligent machines that fiunction and bchave like humans.
Speech recognition, learning. planning and problem solving are some of the activities that
are being tested and performed.
Even though art/ticial intelligence is still in development, there are some applications that
are being used such as voice recognition.
Overall, the main goal is to develop devices that respond to natural language input and that
are capable of learning.
I n conclusion, information technology has been in existence for thousands of years and has
been evolving since the beginning of time - and ît is still evolving.

Human beings have been collecting information in different ways and have discovered
different forms to communicate through the use of technologies.
Infomation technology has been essential to our lives and has made a huge impact
throughout history. Without it, we wouldn't be here today with the latest, advanced
technologies.

Contributions of Islamic scholars to the scientific enterprise

The Islanic Empire consisted of a society that was multicultural in terms of languages,
customs, tragitions and religion.
A s Muslims went forth from Arabia to conquer the countries surrounding them, they
encompassed vast lands with peoples of different faiths and cultures.
Thus the Islamic Empire not only consisted of Muslims from three continents, Arabs,
Persians, Turks, Africans, Indians and other Asians, but also Jews, Christians and other
faiths.
&Therefore scholars from all faiths worked under the umbrella ofIslam to produce a unique
culture of knowledge and learning.
I n the paragraphs that follow each major known field of science is considered and
examined for the contributions made by scholars from the Islamic world.

Mathematical Sciences

Modern technology would be unthinkable without mathematics. The relationshipP IS


reciprocal, since mathematics also needs technology.
*In
Computer Science and Information Technology, diserete mathematics
role.
plays a critical

*The study of advanced counting techniques


(combinatories, etc.), logic. relations, graph
theory, and analysis of algorithms are included in this
branch of mathematics.
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

*The mathematical sciences as practised in the slamic world during this period consisted
of mathematics, algcbra, and geomctry as well as mathematical geography, astronomy and

optics.

arithmetic in from translations of


Muslims derived their theory of numbers ('ilm al-a'dad)
VIl through to IX of Euclid's Elements and the
the Grecks sources such as Books
Introduction to the Science of Numbers by Nicomachus of Gerasa (Berggren, 1997).

India (Hindu) and possibly China and madec their


Moreover, they acquired numerals from
use widespread.

Mohammad Bin Ahmed in the tenth century invented the concept of zero or sifr. Thus

the cumbersome Roman numerals and creating a revolution in mathematics


replacing
(Badawi, 2002).

This led to advances in the prediction of the movement of the planets and advances in the

fields of astronomy and geography.

Muslim mathematics had inherited both the Babylonian sexagecimal system and the Indian
Hindu) deciml system, and this provided the basis for numerical techniques in
mathematic (Folkerts, 2001; Rajagopal, 1993).

Muslims bult mathematical models using the decimal system, expressing all numbers by
means of ten symbols, and each symbol accorded the value of position as well as absolute
value (Kettani, 1976).

Many creative methods of doing multiplications were developed by Muslims; methods of


checking by casting out nines, and decimal fractions (Anawati, 1976).

*Thus Muslim scholars contributed and laid the foundations of modern mathematics and the
use ofmathematics in the fields of science and engineering (Høyrup, 1987).

Thabit bin Qurrgh not only translated Greek works but also argued against and elaborated
on the widely accepted views of Aristotle.

*In arithmetiç there cmerged the concept of irrational numbers with Islamic mathematicians
starting from a non-Euclidean concept.

*Both Umar Khayyam (1048- 1131) and Nasir al-Din al-Tusi (1201-1274) contributed to
research on this concept which did not have its
origins in Greek mathematics.
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

Eastern Muslims derived numerals from Sanskrit-A'v1e*'TY* and 1, and they were
**
the first to develop the use of the zero (sifr), written as 0 by the Western Muslims and
by Eastern Muslims (Kettani, 1976, p.137).

Whereas these Eastern Muslims, had initially used the Arabic alphabets as numerals, by the
ninth century Westerm Muslims had invented and replaced them with "al-arqam al-
gubariyah-1,2,3,4.5,6,7,8 and 9-based on a number of angles equal to the weight of each

symbol" (Kettani, 1976, p.137).

Thus the zero with the numerals made it possible for the simple expressions for numbers
to have infinite values, thereby helping solve particular problems.

in Spain subsequently transferred this knowledge to


Translations of mathematical treatise
Europe.
780-850 AD) was
AI-Khwarizmi(Abu Ja'far Muhammad ibn Musa Al-Khwarizmi) (
who Hindu-Arabic numerals. The
an Islamic mathematician wrote on

word algorithm derives from his name. His algebra treatise Hisab al-jabr w'al-
be considered as the first book to be written
mugabala gives us the word algebra and can

on algebra. the word algebra' transliterates into the term aljabr.

the two basic operations used by al-Khwarizmi in solving quadratic


Al-jabr represents
equations.

software for
Algebra is used in computer
science in the development of algorithms and
It is also used to design formulas that are used in
working with mathematical objects.
numerical programs and for complete
scientific computations.

*The development and analysis of algorithms is fundamental to all aspects of computer

science: artificial intelligeFce, databases, graphics, networking, operating systems,


security, and so on

of al-Khwarizmi's Kitab al-Jabr wa


I n the latter half of the twelfih century, the first part
1976; Sarton, 1927).
al-Muqabalah was translated and made available Europe (Kettani,
in

*Another famous contributor to this field was Umar Khayyam, who studied cubic equations
and algebra came to be regarded as a science in its own right.

Subsequently in later centuries Italians took over his methods and extended them (Anawati,
FACULTY OF LAW, JAMIA
MILLIA ISLAMIA, NEw DELHI

1976).

*Thus thhe Muslims not only developed the methods of solving quadratic equations they also
produced tables containing sine, cosine, cotangent and other trigonometrical values.

*Al-Battani (d.929) systematically developed trigonometry and extended it to spherical


Trigonometry (Kettani, 1976; Sarton, 1927), with important consequences for astronomy,
geography and exploration beyond the known world, thus making the construction of better
maps and the reconceptualisation otf the structure of the planet Earth.

*Arabic geometry absorbed not only materials and methods of Euclid's Elements but also
the works of Apollonius and Archimedes.

*The book, On the Measurements


ofPlanes and SphericalninthFigures, writtenon
Archimedean
became known in the
problems by the three sons of Musa bin Shakir in the century
West through the translation by Gerard of Cremona.

*In seventeenth century Europe the problems formulated by Ibn al-Haytham (965-1041 AD)
became known as "A lhazen's problem". Again his work that was translated into Latin

made Europeans aware of al Haytham's remarkable achievements in the field of Optics

(Kitab al-Manazir) (Meyers, 1964, p.32).

Among his works were included a theory of vision and a theory of light, and vas called by
his successors of the twelfth century "Ptolemy the Second".

Furthermore by promoting the use of experiments in scientifie research, al-Haytham played


an important role in setting the scene in modern science (Rashed, 2002, p.773)

ALHaytham's conlributions to geomelry and number theory went well beyond the
Archimedean tradition. AL-Haytham also worked on analytical geometry and the
beginnings of the link between algebra and geometry.

Subsequently, this work led in pure mathematics to the harmonious fusion ofalgebra and
geometry that was epitomised by Descartes in geometric analysis and by Newton in the
calculus.

*Al-Haytham was a scientist who made major contributions to the fields ofmathematics,
physics and àstronomy during the latter half of the tenth century.

John Peckham in the late-thirteenth century used al-Haytham's Kitab al-Manazir and
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

Witelo's Optics too has echoes of Kitab al-Manazir. Witelo work was used by Johannes
Kepler.

*Roger Bacon, the founder of experimental science. probably used the original Arabic works
of al-Haytham as well as Latin translations (Meyers, 1964).

*Much work was under-taken by Islamic mathematicians regarding the theory of parallels.
This theory consisted of a group of theorems whose proofs depended on Euclidean
postulates.

T h e Islamic mathematicians continued their research for over 500 years on these postulates
in order to obtain proofs and not just the acceptance of them.

However, after these problems were transmitted to Europe in the twelfth century, little
further research was done until the sixteenth century.

*Muslim scholars contributed not only to the use of logic in the development of
mathematical ideas and relationships, but also to a workable system of numeration that
included zero and led to tihe solution of equations.

*Muslims had this begun the work that led on to mathematical modelling and its application
for the purpose -of testing their theories. This knowledge and approach was slowly
transferred to Europe through Spain and Sicily.

History of Information Technology In India


I n 1965, immigration laws in USA were modified and the restrictions on immigrants were
reduced considerably.
*As a result a lot of Indian professionals migrated for research opportunities in USA.
The IT revolution in USA and the much fancied Silicon Valley in the US during the 80s
and 90s could not have been possible without the work of these migrated Indians.
&What this migration did for the Indian IT industry was creating innumerable
opportunities
in the USA in the IT sector.
Due to the fast growing IT sector in USA, there was a need for IT professionals outside
USA.
*India had huge number
a
of educatedpeople and the education in India being in English,
there was a large population of English speaking technically strong people in India.
Hence outsourcing of work started gaining momentum and this led to the huge boom in the
IT sector in India, whose most of the work is exporting software and software services to
the US and other overseas clients.
*Tata Consultancy Services (TCS) started
was by the TATA group for sottware
DELHI
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW

development services in India in 1968.


TCS started the,sottware services by developing punched card facilities for TATA
steel
employees (TSICO).
*The first overseas client for TCS was Burroughs Corporation, United States.
for the surougns machines in
With word 1974.
was to write software code
The job of TCS
of mouth, TCS grabbed a number of projects, small and big during the following years and

today TCS is India's top IT company with a turnover


of more than $10 billion.
the large company WIPRO and the focus of
I n 1966, Azim Premji became the chairmen of
services sector.
WiPRO was concentrated on the IT
software and providing services since the
Patni Computer Systems started developing
that time it was named Data Conversion Inc).
beginning of the company in 1972 (At
and his colleagues. Infosys was
I n 198, Infosys was founded by Narayan Murthy
software services and also developed an
completelycommitted towards providing quality India.
IT business model which was by most of the IT companies in
later followed
and Telecom Revolution of India', Rajiv
Hailed as the 'Father of Information Technology
and politics.
Gandhi left an indelible mark on Indian society
Centre for Development of Telematics (C-DOT)
was
I was under his rule that the
1984 to develop state-of-the-art telecommunication tochnology and
established in August
of the Indian telecommunication network.
meet the needs

He was also the reason behind the PCO (public cgll office) revolution. PCO booths helped
the rural areas to the world outside.
to connect even
Telephone Nigam Limited) was established
Because of his efforts, MTNL (Mahanagar
in 1984.
which helped in the spread of telephone network

The Indian economy during this period was completely controlled by the Indian
Government and there were strict restrictions and regulations for private business entities
India.
*Hence there was no major growth in the IT sector in India till 1991.

Economie reforms in 1991 and development of TT sector in India

*The Indian government had strict control over the private business entities in India betore
liberalisation of economy in 1991.
* Moreover the wide area networks and internet lines were completely controlled by the
central government.
*As a result, the Indian IT sector was totally held back due to these restraints on the
functioning of the software services providers.
*The first major IT reform by the Indian Govemment was the creation of corporation called
MILLIA ISLAMIA, NEW DELHI
FACULTY OF LAW, JAMIA

onwards.
Software Technology Parks of India (STPI) from 1991
T h i s corporation provided satellite links to major IT devclopers enabling hem to transmit

the work done in India directly abroad.


IT companies as well as helped the clients in
*This reduced the costs incurred to the Indian
US trust Indian industries and go for outsourcing
reforms in 1991
Finance minister, Dr. Manmohan Singh,
introduced the major economic
that time.
to solve the debt problem created during
internation integration became possible. The huge
these economic reforms the
*Asper investments were welcomed.
restrictions on overseas business
were lifted and foreign
business of outsourcing would
result, the IT industry in India became free and the
As a

with more and more clieDts and enterprises going for outsourcing
momentum
finally gain
of IT.
services made the PC
other user friendly operating
Also. the inception of Windows and
time consuming.
experience even more simple and less C and others,
level programming languages like Basic,
* Coupled with development of high
the Indian 1T brains had the perfect platform to rise in the global arena.

T h e Indian IT sector boomed and growed at gain of nearly 50% every year.
1991 reforms was the Y2K bug. Fear
Another major event for Indian IT industry post the
the US corporations outsourced all the
of complete breakdown of computer services,
a

Indians.
equipment and upgrading work to
thrown to the Indians and as a result the
*The task of rectifying the Y2K bug was

initially designed till a date of


modification of all the codes and softwares, which were

1999 was tobe edited and huge work was outsourced to the Indian IT industries.

The Indian IT industry helped provide a national GDP of more than 6% since these
has
economic reforms took place 20 years ago and today, India is known as the IT hub of the

World.

National Task Force, NTP and IT Act, 2000 helped IT sector grow in India

The NDA(National Democratic Alliance) government, under the leadership of prime


minister Atal Bihari Vajpayee, included th development of IT as the top priority in their
long tem agenda.
Indian National Task Force was-formed for this purpose which overtook the development
of IT services in large and small IT enterprises in India.
*The National Task Force, within 3 months, provided a detailed report on the Indian IT and
technological industries with more than 100 recommendations which wouldhelp improve
the IT services in India.
*A swift action plan by the
Central Government towards IT services growth was executed
and all the recommendations were acted upon sooner than later.
The result of these efforts from the Indian Government bore fruit with the IT exports
NEW DELHI
JAMIA MILLIA ISLAMIA,
OF LAW,
FACULTY

than S50 billion. Inatan


coo y
was no
longer that of a develonino .

touching more
the world.
developed nationS
in
but at par with
those of the (NTP 1999)
1999 helped frce
The New Telecommunications Folicy the

telecommunications sector
in India. 1his neipCd availability of the infrastructuref

telecommunication.
relaled businesses were no longer the
T h e satellites, towers and other telecom
Central Government.
the telecom sector grow rapidly
in these departments heiped
T h e entry of private sector
boom in IT sector in India eventually.
resulting the innovation and development of telecom
on the
The growth of IT is totally dependent
industry. legal recognition of the electronic
T h e Information Technology Act 2000 provided
offences and contraventions
documents, digital signatures,
in striking deals with US clients as no longer the person to person
This helped long way a

finalisation of business deals.


meeting was required for
needed?
Why are cyber laws on the Internet from
and organizations
Like any law, cyber law is created,lo help protect people
a
maintain drder.
malicious people on the Internet and help

law or rule, it allows another person or organization to take action


If someone breaks a cyber
or have them sentenced to a punishment.
against that person

Internet
Internet is one of the most wonderfiul inventions of the last century.

Now, it has become integral part of our life and it is cont1nuously making human life easier and
simpler in various ways.

From information accessing to money transfer, all kinds of tasks are pertormed using the internet.
Today, more and more people are relying on online banking and online shopping.

There are
many networks that exist in the world, often with different hardware and software.
People connected to one network often, want to communicate with
one. This
people attached to a different
requires connecting together different, and frequently incompatible networks, to make
the connection and provide the necessary translation, both in terms of hardware and software.

Acollection of intertonnected networks is called an internetwork or


is formed when distinct networks are just internet. An internet work
connected together,
"Internet" refers to the global formation system that -
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

() cally linked together


by a giobully unique address space
based on the Internet
Protocol (IP) or its subscquent exIensions/follow-ons;

(i) support comnyunications using tne IransmisSion Control


Protocol (TCP/IP) suits or iis subsequcnt extensions/tollow-ons, andior Protocol/Internet
other P.
compatible protocols; and

(ii) provides. uses or makes accessible, either publicly or privately, high level serviges layered on
the communications and related intrastructure
described herein.

New communication systems and digital technology have made dramatic changes in the way we
live and the means to transact our daily business.

Businessmen are inereasingly using computers to create, transmit and store information in
electronie form instead of traditional paper documents. It is cheaper, easier to store and retrieve
speedier to communicate.
The latest threat to privacy. propertý and peace of individuals all over the world is from abuse of
Iechinology relating to computers, their network or hardware devices, where the computer or device
may be agent of crime, the facilitator ot the crime or the target of crime.
However, the rapid evolution of Internet has also raised numerous legal issues and questions. As
the scenario continues to be still not clear, countries throughout the world are resorting to different
approaches towards controlling, regulating and facilitat1ng clectronic communication and
commerce.

Cyber Space

The New Shorter Oxford Dictionary explains the expressions Cyber Space' as
notional environment within which electronic communication occurs especially when
represented as the inside of a computer system. space perceived as such by an observer
but generated by a computer system and having no real existence, the
space of virtual
reality
Internet is a network of networks, what that means is that it is
is global network that
a
creating by linking smaller networks of computers and servers.
than Cyber-space is nothing
more a
symbolic and figurative space that exists within the
scope of Internet. It can be
said that
anything that is done via the use of
Internet, occurs within the confines of the
space, whether that is cyber-
sending an e-mail, a website, or playing a game, all of these
exist within the things
cyber-space.
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

Definitions of Cyber Crime

Act) does not define the term cyber


The Information Technology Act, 2000 (I.T.
crime.

law in Torce, is known as crime.


under the
An act or omission, which is punishable is no legal definition for
But, there
explanation is also applicable
I he same
to cyber crime. to indrcate that the
c r i m e is only
the word cyber with
cyber crime. The purpose of adding caution the
users tor safeguarding
act and to
commit an illegal
computer has been used be known as
to
in nature: In short,
cyber c r i m e can
the digital evidence, which is of fragile William Gibson in
his 1984
a word coined by
crime. In literal sense, cyber
was
worldwide field of
to the
agital "Neuromancer'. Cyber is
the prefix relating
ictional novel Jeaking or circulating
Crimes involving stealing, fabricating, crime.
e l e c t r o n i e communication.
under the umbrella
term cyber
branched
information is collectively
Torbidden digital
the Information
into two types through
crimes can be_ broken down
Cyber
make such a distinction.
not
Technology Act does
intention of the
which the
crimes are actually pranks in
fir ype of cyber into a website and deface
create a nuisance. Thus, he may hack
is merely to material.
perpetrator mail, or post obscene
account and read private
it, or break into one's email trying to show off
butf who is essentially
This type of offender is generally a computer
which are arcane to most people. They
a kick by doing things
his prowess such people get activities.
oftheir
financiál or sexual benefit out
intend to derive any criminal,
may not really sense that the offender
intends
of cyber crime is real crime in the
The second type in credit card or bank
it. Thus, he may indulge
or sexual benefit by
to pecuniary
derive helps
commercial or security information obtained by hacking or

fraud, selling of secret criminal real


information. Whether he is a prankster
or a
in transmission of criminal of computer,
a great deal of knowledge
the offender is necessarily person who has
that he knows a great
the internet. It can be safely presumed
networks, security system and ride. Cyber
take them for a
deal more than perhaps the best investigators and can easily
conventional crime and there, either the
crime may be said to be those species of the
conduct constituting crime.
computer is an object or subject of the
elements:
Cyber crimes share three

a crime.
1. Tools and techniques to perpetrate

criminal plan known as


2. Approach or methodology for executing the
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI

vector.
Crime itself that is the end of those plans and activities (a cyber crime IS
3.
the criminal's activities).
the ultimate objective of

Cyber crimes are committed o s i y by pasOns Who are said to be learned and

hence, it is called as white collar crime. yber crimes arc very scrious threat in the modern
era and for the times to come and pose one or he most difficult challenges before the

to mvestigare, coOllcct evidence, and to penalize. In


Jaw enforcement machinery. especially
or computers, telecommunications and other
the information age, the rapid development
evolution of new forms or transnational crimes known as "cyber
technologies has led to the
have no boundaries and may atfect any country in the
crimes. Cyber crimes virtually
definition of cyber crime may be "Unlawful acts where in the
world. A generalized
target or both. Most cyber crimes do not involve violence,
computer is either a tool
or

character weakness the victims. Although it


but rather greed, pride or play on some of
is difficult to identify the culprit, as the Net can be a vicious web of deceit and can be
accessed from any part of the globe. The damage caused are almost an unrealizable, expect
for certain financial damage which runs in billions every year and shall create irreplaceable
loss to the individuals and corporate. A cyber crime is generally a domestic issue, which
international consequences in most of thë instances.
may have

What IS Information Technology Law?

Information technology law provides the legal framework for collecting, storing, and

disseminating electronic information in the globalmarketplace. Attorneys practicing in this


area of the law represent individuals and businesses from all different industries. They help
stucture information technology transactions in a way thal maximizes the client's economic
benefit while ensuring regulatory compliance. A great deal of emphasis is also placed on
anticipating potential sources of dispute between the parties to a transaction, and crafting
agreements that address these coneems, thereby reducing the risk of litigation.

When disputes arise in the field of information technology that cannot be resolved outside
of the court system, a lawyer specializing in thes types of cases can prove a powerful

advocate compared to general legal practitioner. Information technology law firms tend to
a

hirce layers with practical experience working in the industry prior to entering the legal
profession. With such a background, a lawyer is more effective at explaining technical
concepts to a judge or jury, and he or she will likely have contacts within the industry that
make
finding consultants and expert witnesses less difficult.
Clearly, information
technology law is a niche practice. Those looking to hire an attorney should bear tnis in
mind.

yber LawS
yields legal recognition to electronic documents and a struCture to
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEw DELHI

Support ejiling ande-commerce transactions and also proviades a legal structure to reduce,

check cyber crimes.

Functions of cyber crime legislation


devices.
the use of computer
Setting clear standards of behaviour for
. Deterring perpetrators and protecting citizens. individual privacy.
Enabling law enforcement investigations while protecting
Providing fair and effective criminal justice procedures.
handling and retention.
such as data
Kequiring minimum protection standards in areas
crime and
criminal matters involving cyber
6. Enabling co-operation between countries in
electronic evidence.

You might also like