Professional Documents
Culture Documents
-
Article / Case
❖Introduction
❖Cyber Crime
❖Cyber Law
❖Information Technology Act, 2000
❖Amendments in Information Technology Act
❖Case Study : Credit Card Fraud
❖Case Study : Phishing
❖Conclusion
Computer Crime
Cyber crime encompasses any criminal act dealing
with computers and networks (called hacking).
Additionally, cyber crime also includes traditional crimes
conducted through the internet. For example; hate crimes,
telemarketing and Internet fraud, identity theft, and credit card
account thefts are considered to be cyber crimes when the
illegal activities are committed through the use of a computer
on Internet.
Cyber Law
Cyber Law is the law governing cyber space. Cyber space is a
wide term and includes computers, networks, software, data
storage devices (such as hard disks, USB disks), the Internet,
websites, emails and even electronic devices such as cell
phones, ATM machines etc.
Law encompasses the rules of conduct:
■ 1. that have been approved by the government, and
■
2. which are in force over a certain territory, and
3.
■
which must be obeyed by all persons on
that territory.
■ 1. Cyber Crimes
■
2. Electronic and Digital Signatures
■
3. Intellectual Property
■ 4. Data Protection and Privacy
Jurisprudence of Indian
Cyber Law
Cyber Law In India
• Primary source is Information Technology Act, 2000 (IT
Act), which came into force on Oct 17th, 2000.
• Purpose: To provide legal recognition to electric commerce and to
facilitate filing of electronic records.
• Provides Strict punishments (imprisonment up to 10yrs
and compensation up to Rs 1 crore ).
The BPO facility had about 350 employees. Their primary function was
to issue the bank's credit cards as well as attend to customer and
merchant queries. Each employee was assigned to a specific task and
was only allowed to access the computer system for that specific task.
The employees were not allowed to make any changes in the credit-card
holder's account unless they received specific approvals.
Investigation
The investigating team visited the premises of the BPO and conducted
detailed examination of various persons to understand the computer
system used. They learnt that in certain situations the system allowed the
user to increase the financial limits placed on a credit card. The system
also allowed the user to change the customer's address, blocking and
unblocking of the address, authorisations for cash transactions etc.
The team analysed the attendance register which showed that the
accused was present at all the times when the fraudulent entries had
been entered in the system. They also analysed the system logs that
showed that the accuser's ID had been used to make the changes in the
system.
The Law
The complainant approached the police stating that she had been
receiving obscene and pornographic material at her e-mail address and
mobile phone. She stated that this person appeared to know a lot about
her and her family and believed that her e-mail account had been hacked.
Investigation
The investigating team using a different e-mail ID tried to chat with the
accused using the complainant’s e-mail ID. Subsequently the
investigating team was able to identify the ISP address of the computer
system being used and it was tracked to an organization in Delhi.
The investigating team visited the company and through its server logs
was able to identify the system from which the obscene material was
sent. Using forensic disk imaging and analysis tools the e-mails were
retrieved from the system. The residence of the accused was located
and the hard disk of his personal computer was seized. On the basis of
the evidence gathered the accused was arrested.
The Law