Professional Documents
Culture Documents
RESEARCH TOPIC:
CYBER IN DIGITAL SOCIETY: INDIAN PERSPECTIVE
1. ABSTRACT
2. INTRODUCTION
3. RESEARCH
4. ANALYSIS
5. CONCLUSION
1
ABSTRACT:
The integration of cyberspace into human life has brought forth numerous opportunities in
areas like knowledge, employment, social connections, and awareness. However, it also
introduces new challenges. This research delves into the cyber security measures within the
Indian Legal System and on the international stage. Examining the contributions of Indian
judiciary and committee reports, the paper sheds light on the evolving dimension of cyber
security law. The author employs a doctrinal methodology and gathers data from the Ministry
of the government.
INTRODUCTION:
Cyberspace has become an integral part of human life, contributing to development, progress,
and knowledge. Simultaneously, it has given rise to crimes related to computers and
technology. In 2020, cyber security cases surged by 1.16 million, a threefold increase from
2019, according to government data presented in parliament. This global trend, including the
United States, underscores the urgency of addressing cyber security issues. This research
focuses on cyber security law in India, examining legislative responses and societal
implications. While the Ministry of Home Affairs issues guidelines, a lack of awareness
hampers the effectiveness of the cyber security system. The research explores international
strategic plans to combat cybercrime and evaluates the formulation of cyber security laws in
India. Judicial interventions and their impact on creating new cybercrime laws are also
scrutinized.
The paper aims to identify specific laws related to cyber security, analyze constitutional
safeguards, study legislative responses and government policies, and examine case laws
pertaining to cyber security in India. Adopting a Doctrinal Research Methodology, the author
utilizes legal documents and data collected from various sources.
2
In summary, this research seeks to unravel the complexities of cyber security laws in India,
addressing challenges and gaps in the current legal framework while exploring the role of the
judiciary and government in shaping effective cyber security policies.
Ministry of Home Affairs, Case Studies, Legislation, and Journals: Secondary Data.
The concept of security extends to safeguarding individuals, a responsibility the state holds
paramount. Jeremy Bentham's assertion that every legal system ensures equality, liberty, and
protection emphasizes the centrality of security. In the democratic and welfare state, cyber
security emerges as a contemporary task and government liability. The notion of security is
closely tied to cyber security law, given the violation of human rights like privacy, dignity,
faith, and access to accurate information through cybercrime.
Cyber security law is not a novel concept; it has evolved with advancing technology.
Germany, in 1970, passed the Data Protection Act, marking an early legislative response to
computer-related issues. In post-independent India, the Information Technology Act of 2000
addressed cyber security concerns. While the Indian Penal Code and the Constitution dealt
with cybercrime matters, the lack of a dedicated law led to ineffective remedies for victims.
3
The Information Technology Act, however, brings transparency to cyberspace and addresses
security concerns related to cybercrime.
The Ministry of Home Affairs has launched numerous schemes to protect human rights,
foster a healthy cyberspace, and enhance computer-related safety. In 2017, the establishment
of the Cyber and Security Division by the Indian government signifies a dedicated effort to
oversee all aspects of cyber security, including the implementation of schemes and guidelines
related to National Information Security.
4
LITERATURE REVIEW:
The critical issue of cyber security has garnered extensive attention in literature. Justice
Yatindra Singh, in his book, delves into the profound impact of cybercrime on Intellectual
Property, particularly highlighting infringements on copyrights, trademarks, and patents in
cyberspace. Despite the wealth of literature, there is a noticeable gap in focusing on distinct
laws and recent enactments related to cyber security in India. Vivek Stood, in his book,
advocates various strategies to curb cybercrimes, emphasizing cyber security as a
fundamental necessity in the 21st century. The Ministry of Home Affairs' Annual Report
for 2018-19 highlights the escalating crime ratio in cyberspace compared to the previous
year.
5
B) COMMITTEE OF EXPERTS ON DATA PROTECTION:
In 2018, the Indian government formed the Committee of Experts led by Justice B.N.
Shrikrishna to address data protection issues. The committee's main objectives were to
identify and address key data protection concerns in India. It recommended a strategic plan
and conducted an analysis of problems related to cyber security.
In Shamsher Singh Verma v. State of Haryana , the court discussed documents, including
electronic documents, referring to Section 3 of the Indian Evidence Act, which defines a
document to include digital and technological substances.
In Syed Asifuddin v. State Andhra Pradesh, the court explained the scope of Section 65 of the
Information Technology Act, 2001, and Section 63 of the Copyright Act, 1958. The Supreme
Court also discussed Sections 419 and 407 of the Substantive Criminal Law and allowed a
criminal investigation.
In the case of Shankar v. State Rep, related to the Information Technology Act, 2001, the
court examined the challenged sections and emphasized the significance of Section 72 of the
IT Act.
In Avnish Bajaj v. State (NCT) of Delhi , the court held that the petitioner was prima facie
liable for offenses under Section 67 read with Section 85 of the IT Act, noting the Act's role
in providing cyber security to all technology sectors.
6
In the case of State of Tamil Nadu v. Suhas Katti, the court highlighted the importance of
Section 468 of the Indian Penal Code related to forgery to harm reputation and Section 50.
The case involved a discussion on the essence of Section 67 of the Information Technology
Act, 2001
Concerning cyber cafes and their role in combating cybercrime, in the case of CBI v. Arif
Azim, the court delved into section 418, and 421 of the Indian Penal Code. This landmark
judgment marked the first instance where the court prescribed punishment and conviction for
cybercrime.
In the case of SMC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra, the court addressed cyber
defamation, challenging sections 65A and 65B of the Indian Evidence Act, 1871. This was
the inaugural instance where the court heard an online defamation case, asserting that cyber
defamation falls under section 4998 of the Indian Penal Code. Prior to Information
Technology Law, the Supreme Court, in the case of Sukanto Haldar v. State of West Bengal
dealt with the magazine Nara Nari, treating it as an obscene publication under section 2921 of
the Indian Penal Code 18601. The petitioner was convicted and sentenced to two months of
rigorous imprisonment and a fine of Rs. 201.
7
CONCLUSION:
Cyberspace has become a crucial aspect of our lives. The Indian legal system, along with the
judiciary and government ministries, has taken significant steps to provide security and raise
awareness about cyberspace. In the digital era, it is essential for everyone to be aware and
knowledgeable about computers, computer systems, computer networks, and the laws
governing cyberspace. Attending seminars, workshops, and Faculty Development Programs
can contribute to spreading knowledge about computers and operating systems, fostering a
more cyber-aware society.
REFERENCES:
Ahsan, K., Birbal, S., & Kam, B. (2022). Contract cheating in higher education: A systematic
literature review and future research agenda. Assessment & Evaluation in Higher Education,
47(4), 523–539.
https://doi.org/10.1080/02602938.2021.1931660
Barber, M., Bird, L., Fleming, J., Titterington-Giles, E., Edwards, E., & Leyland, C. (2021).
Gravity assist: Propelling higher education towards a brighter future. Office for students.
https://www.officeforstudents.org.uk/publications/gravity-assist-propelling-higher-
education-towards-a-brighter-future/
Bommasani, R., Hudson, D. A., Adeli, E., Altman, R., Arora, S., von Arx, S., Bernstein, M. S.,
Bohg, J., Bosselut, A., Brunskill, E., Brynjolfsson, E., Buch, S., Card, D., Castellon, R., Chatterji,
N., Chen, A., Creel, K., Davis, J. Q., Demszky, D. . . . Liang, P. (2021). On the opportunities and
risks of foundation models. arXiv preprint arXiv:2108.07258.
Krueger, G., Henighan, T., Child, R., Ramesh, A., Ziegler, D. M., Wu, J., Winter, C., and
Amodei, D. (2020). Language models are few-shot learners. Advances in Neural Information
Processing Systems, 33, 1877–1901. https://proceedings.neurips.cc/paper/2020
Dawson, P., & Sutherland-Smith, W. (2018). Can markers detect contract cheating? Results
from a pilot study. Assessment & Evaluation in Higher Education, 43(2), 286–293.
https://doi.org/10. 1080/02602938.2017.1336746
Dawson, P., Sutherland-Smith, W., & Ricksen, M. (2020). Can software improve marker
accuracy at detecting contract cheating?