SlideShare uma empresa Scribd logo
1 de 53
STATUTORY LAWS PERTAINING TO
CYBERCRIMES IN INDIA
Arun Verma
1
Arun Verma (c)
STATUTORY LAWS PERTAINING TO
CYBERCRIMES IN INDIA
• In the era of cyber world as the usage of computers became more
popular, there was expansion in the growth of technology as well,
and the term ‘Cyber’ became more familiar to the people. The
evolution of Information Technology (IT) gave birth to the cyber
space wherein internet provides equal opportunities to all the
people to access any information, data storage, analyse etc. with
the use of high technology. Due to increase in the number of
netizens, misuse of technology in the cyberspace was clutching up
which gave birth to cyber crimes at the domestic and international
level as well.
• Though the word Crime carries its general meaning as “a legal
wrong that can be followed by criminal proceedings which may
result into punishment” whereas Cyber Crime may be “unlawful
acts wherein the computer is either a tool or target or both”.
Arun Verma (c)
2
• The world 1st computer specific law was enacted in the
year 1970 by the German State of Hesse in the form
of ‘Data Protection Act, 1970’ with the advancement
of cyber technology. With the emergence of technology
the misuse of technology has also expanded to its
optimum level and then there arises a need of strict
statutory laws to regulate the criminal activities in the
cyber world and to protect technological advancement
system. It is under these circumstances Indian
parliament passed its “INFORMATION
TECHNOLOGY ACT, 2000” on 17th October to have
its exhaustive law to deal with the technology in the field
of e-commerce, e-governance, e-banking as well as
penalties and punishments in the field of cyber crimes.
Arun Verma (c)
3
• Cyber Crimes Actually Means: It could be hackers vandalizing
your site, viewing confidential information, stealing trade secrets or
intellectual property with the use of internet. It can also include
‘denial of services’ and viruses attacks preventing regular traffic from
reaching your site. Cyber crimes are not limited to outsiders except in
case of viruses and with respect to security related cyber crimes that
usually done by the employees of particular company who can easily
access the password and data storage of the company for their
benefits. Cyber crimes also includes criminal activities done with the
use of computers which further perpetuates crimes i.e. financial
crimes, sale of illegal articles, pornography, online gambling,
intellectual property crime, e-mail, spoofing, forgery, cyber
defamation, cyber stalking, unauthorized access to Computer system,
theft of information contained in the electronic form, e-mail bombing,
physically damaging the computer system etc.
• Classifications Of Cyber Crimes: Cyber Crimes which are
growing day by day, it is very difficult to find out what is actually a
cyber crime and what is the conventional crime so to come out of this
confusion, cyber crimes can be classified under different categories
which are as follows:
Arun Verma (c)
4
The most comprehensive classification of computer crimes has been
given by David L. Carter who classifies computer related crimes
into three broad categories:
• (A) Where computer is the target of the crime.
• (B) Where computer facilitates the commission of crime.
• (C) Where computer is incidental to the crime.
(A)Computer as target of the crime
This category of computer crimes aims at damaging computer
system or stealing valuable information stored on the system and
include:
1. Sabotage of computer system or computer network.
2. Theft of data/information.
3. Theft of Intellectual Property such as computer software.
4. Theft of marketable information.
5. Blackmail based on information gained from computerized files
preferences, such as medical information, medical history, sexual
preferences, financial data, etc.
6. Unlawful access to criminal justice and the governmental records.
Arun Verma (c)
5
(B) Computer as an instrument of crime
The Computer crimes falling under this category
use computer as a medium for commission of
offences. The computer programmes are
manipulated to defraud others.
1. Fraudulent use of automated teller machine
(ATM) cards and accounts.
2. Credit card frauds.
3. Frauds involving stock transfers.
4. Frauds involving stock to e-commerce.
5. Telecommunication frauds.
Arun Verma (c)
6
(c) Computer as incidental to the crime
• The Diverse application of Internet made it incidental to
crimes that may be classified into two broad categories..
• (A) Internet Crimes
• (B) Web Based Crimes
(A)Internet Crimes: The Internet crimes include that
group of crimes that make criminal use of the Internet
infrastructure. These includes…
(i) Hacking –
(a) Theft of information.
(b) Theft of password.
(c) Theft of credit card numbers.
(ii) Launch of malicious programmes.
(iii) Espionage.
(iv) Spamming.
Arun Verma (c)
7
(B) Web Based Crimes
Web based crimes have been categorized separately
and have been further classified into four
subcategories.
(a) Website related crimes
(i) Cheating and Frauds.
(ii) Insurance Frauds.
(iii)Gambling.
(iv) Distribution of pornography.
(v) Sale of Pirated Software.
(b) Crimes through e-mail.
(i) Threats.
(ii) Extortion.
(iii)E-Mail Bombing.
(iv) Defamation.
(v) Launching of Malicious Progammes.
Arun Verma (c)
8
(c) Usenet related crimes-
(i) Distribution/Sale of pornography material.
(ii) Distribution/Sale of pirated software.
(iii)Discussion on methods of hacking.
(iv) Sale of stolen credit card numbers.
(v) Sale of Stolen Data.
(d) Internet relay chat crimes-
(i) Cyber stalking.
(ii) Fraudulent use chat rooms for developing
relations with unsuspecting victims.
(iii)Criminals use it for meeting conspirators.
(iv) Hackers use it for discussing their expertise of
showing use techniques.
(v) Pedophiles use chat rooms to allure small children.
Arun Verma (c)
9
Target of Computer Crime
• The Degree of risk of Internet abuse depends on the method of Internet
connectivity, the type of computer hardware used, the number and type
of security devices in use, and the nature of the user e.g. educational
institution, government entity, business or home.
• In general, the risk factors is less for computers that access the internet
via an Internet Service Provider (ISP) than for computers that have
direct access to the Internet.
• The Common targets of computer crimes are:
- Computer used by military and intelligence agencies.
- Computers of business houses targeted by competitors.
- Computers of banks and other financial institutions targeted by white
collar criminals.
- Government or service industries targeted by terrorists or hackers.
- Commercial, industrial or trading companies targeted by disgruntled
employees.
- Universities, Scientific organizations, research institutions targeted by
students, industrial or business houses.
Arun Verma (c)
10
1. Cyber Crimes against Persons:
• There are certain offences which affects the personality of individuals can be
defined as:
• Harassment via E-Mails: It is very common type of harassment through
sending letters, attachments of files & folders i.e. via e-mails. At present
harassment is common as usage of social sites i.e. Facebook, Twitter etc.
increasing day by day.
• Cyber-Stalking: It means expressed or implied a physical threat that creates
fear through the use to computer technology such as internet, e-mail, phones,
text messages, webcam, websites or videos.
• Dissemination of Obscene Material: It includes Indecent exposure/
Pornography (basically child pornography), hosting of web site containing
these prohibited materials. These obscene matters may cause harm to the
mind of the adolescent and tend to deprave or corrupt their mind.
• Defamation: It is an act of imputing any person with intent to lower down
the dignity of the person by hacking his mail account and sending some mails
with using vulgar language to unknown persons mail account.
• Hacking: It means unauthorized control/access over computer system and
act of hacking completely destroys the whole data as well as computer
programmes. Hackers usually hacks telecommunication and mobile network.
Arun Verma (c)
11
• Cracking: It is amongst the gravest cyber crimes known till date. It is a dreadful feeling
to know that a stranger has broken into your computer systems without your knowledge
and consent and has tampered with precious confidential data and information.
• E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its
origin. It shows it’s origin to be different from which actually it originates.
• SMS Spoofing: Spoofing is a blocking through spam which means the unwanted
uninvited messages. Here a offender steals identity of another in the form of mobile
phone number and sending SMS via internet and receiver gets the SMS from the mobile
phone number of the victim. It is very serious cyber crime against any individual.
• Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals for
their monetary benefits through withdrawing money from the victim’s bank account
mala-fidely. There is always unauthorized use of ATM cards in this type of cyber crimes.
• Cheating & Fraud: It means the person who is doing the act of cyber crime i.e. stealing
password and data storage has done it with having guilty mind which leads to fraud and
cheating.
• Child Pornography: It involves the use of computer networks to create, distribute, or
access materials that sexually exploit underage children.
• Assault by Threat: refers to threatening a person with fear for their lives or lives of
their families through the use of a computer network i.e. E-mail, videos or phones.
Arun Verma (c)
12
2. Crimes Against Persons Property:
• As there is rapid growth in the international trade where businesses and
consumers are increasingly using computers to create, transmit and to store
information in the electronic form instead of traditional paper documents.
There are certain offences which affects persons property which are as
follows:
• Intellectual Property Crimes: Intellectual property consists of a bundle
of rights. Any unlawful act by which the owner is deprived completely or
partially of his rights is an offence. The common form of IPR violation may
be said to be software piracy, infringement of copyright, trademark, patents,
designs and service mark violation, theft of computer source code, etc.
• Cyber Squatting: It means where two persons claim for the same Domain
Name either by claiming that they had registered the name first on by right of
using it before the other or using something similar to that previously. For
example two similar names i.e.
www.yahoo.com and www.yaahoo.com.
• Cyber Vandalism: Vandalism means deliberately destroying or damaging
property of another. Thus cyber vandalism means destroying or damaging
the data when a network service is stopped or disrupted. It may include
within its purview any kind of physical harm done to the computer of any
person. These acts may take the form of the theft of a computer, some part of
a computer or a peripheral attached to the computer.
Arun Verma (c)
13
• Hacking Computer System: Hacktivism attacks those included Famous
Twitter, blogging platform by unauthorized access/control over the computer.
Due to the hacking activity there will be loss of data as well as computer. Also
research especially indicates that those attacks were not mainly intended for
financial gain too and to diminish the reputation of particular person or
company.
• Transmitting Virus: Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to other files and to other
computers on a network. They usually affect the data on a computer, either by
altering or deleting it. Worm attacks plays major role in affecting the
computerize system of the individuals.
• Cyber Trespass: It means to access someone’s computer without the right
authorization of the owner and does not disturb, alter, misuse, or damage
data or system by using wireless internet connection.
• Internet Time Thefts: Basically, Internet time theft comes under hacking.
It is the use by an unauthorised person, of the Internet hours paid for by
another person. The person who gets access to someone else’s ISP user ID and
password, either by hacking or by gaining access to it by illegal means, uses it
to access the Internet without the other person’s knowledge. You can identify
time theft if your Internet time has to be recharged often, despite infrequent
usage.
Arun Verma (c)
14
3. Cybercrimes Against Government:
• There are certain offences done by group of persons intending to
threaten the international governments by using internet facilities.
It includes:
• Cyber Terrorism: Cyber terrorism is a major burning issue in the
domestic as well as global concern. The common form of these
terrorist attacks on the Internet is by distributed denial of service
attacks, hate websites and hate e-mails, attacks on sensitive
computer networks etc. Cyber terrorism activities endanger the
sovereignty and integrity of the nation.
• Cyber Warfare: It refers to politically motivated hacking to
conduct sabotage and espionage. It is a form of information warfare
sometimes seen as analogous to conventional warfare although this
analogy is controversial for both its accuracy and its political
motivation.
• Distribution of pirated software: It means distributing pirated
software from one computer to another intending to destroy the
data and official records of the government.
• Possession of Unauthorized Information: It is very easy to
access any information by the terrorists with the aid of internet and
to possess that information for political, religious, social, ideological
objectives.
Arun Verma (c)
15
4. Cybercrimes Against Society at large:
• An unlawful act done with the intention of causing harm to the cyberspace will
affect large number of persons. These offences includes:
• Child Pornography: It involves the use of computer networks to create,
distribute, or access materials that sexually exploit underage children. It also
includes activities concerning indecent exposure and obscenity.
• Cyber Trafficking: It may be trafficking in drugs, human beings, arms
weapons etc. which affects large number of persons. Trafficking in the
cyberspace is also a gravest crime.
• Online Gambling: Online fraud and cheating is one of the most lucrative
businesses that are growing today in the cyber space. There are many cases
that have come to light are those pertaining to credit card crimes, contractual
crimes, offering jobs, etc.
• Financial Crimes: This type of offence is common as there is rapid growth in
the users of networking sites and phone networking where culprit will try to
attack by sending bogus mails or messages through internet. Ex: Using credit
cards by obtaining password illegally.
• Forgery: It means to deceive large number of persons by sending threatening
mails as online business transactions are becoming the habitual need of
today’s life style.
Arun Verma (c)
16
• Affects To Whom: Cyber Crimes always affects the
companies of any size because almost all the companies gain an
online presence and take advantage of the rapid gains in the
technology but greater attention to be given to its security risks.
In the modern cyber world cyber crimes is the major issue
which is affecting individual as well as society at large too.
• Need of Cyber Law: information technology has spread
throughout the world. The computer is used in each and every
sector wherein cyberspace provides equal opportunities to all
for economic growth and human development. As the user of
cyberspace grows increasingly diverse and the range of online
interaction expands, there is expansion in the cyber crimes i.e.
breach of online contracts, perpetration of online torts and
crimes etc. Due to these consequences there was need to adopt a
strict law by the cyber space authority to regulate criminal
activities relating to cyber and to provide better administration
of justice to the victim of cyber crime. In the modern cyber
technology world it is very much necessary to regulate cyber
crimes and most importantly cyber law should be made stricter
in the case of cyber terrorism and hackers.
Arun Verma (c)
17
• Penalty For Damage To Computer System:
According to the Section: 43 of ‘Information Technology
Act, 2000’ whoever does any act of destroys, deletes,
alters and disrupts or causes disruption of any computer
with the intention of damaging of the whole data of the
computer system without the permission of the owner of
the computer, shall be liable to pay fine upto 1crore to the
person so affected by way of remedy. According to the
Section:43A which is inserted by ‘Information
Technology(Amendment) Act, 2008’ where a body
corporate is maintaining and protecting the data of the
persons as provided by the central government, if there is
any negligent act or failure in protecting the data/
information then a body corporate shall be liable to pay
compensation to person so affected. And Section 66 deals
with ‘hacking with computer system’ and provides for
imprisonment up to 3 years or fine, which may extend up
to 2 years or both.
Arun Verma (c)
18
Case Study-Attacks on Cyberspace:
• Worm Attack: The Robert Tappan Morris well Known as First Hacker, Son of former
National Security Agency Scientist Robert Morris, was the first person to be prosecuted
under the ‘Computer and Fraud Act, 1986’. He has created worm while at Cornell as
student claiming that he intended to use the worm to check how large the internet was
that time. The worm was uncontrollable due to which around 6000 computer machines
were destroyed and many computers were shut down until they had completely
malfunctioned. He was ultimately sentenced to three years probation, 400 hours of
community service and assessed a fine of $10500. So there must be strict laws to punish
the criminals who are involved in cyber crime activities.
• Hacker Attack: Fred Cohen, a Ph.D. student at the University of Southern California
wrote a short program in the year 1983, as an experiment, that could “infect”
computers, make copies of itself, and spread from one machine to another. It was
beginning & it was hidden inside a larger, legitimate program, which was loaded into a
computer on a floppy disk and many computers were sold which can be accommodate
at present too. Other computer scientists had warned that computer viruses were
possible, but Cohen’s was the first to be documented. A professor of his suggested the
name “virus”. Cohen now runs a computer security firm.
• Internet Hacker: Wang Qun, who was known by the nickname of “playgirl”, was
arrested by chinese police in the Hubei province first ever arrest of an internet hacker in
China. He was a 19 year old computing student, arrested in connection with the alleged
posting of pornographic material on the homepages of several government-run web
sites. Wang had openly boasted in internet chat rooms that he had also hacked over 30
other web sites too.
Arun Verma (c)
19
IT ACT AND IPC
• CRIME: In ordinary language, the term crime denotes an unlawful act
punishable by a state. The term "crime" does not, in modern criminal law, have
any simple and universally accepted definition, though statutory definitions
have been provided for certain purposes. The most popular view is that crime
is a category created by law; in other words, something is a crime if declared as
such by the relevant and applicable law. One proposed definition is that a
crime or offence (or criminal offence) is an act harmful not only to some
individual or individuals but also to a community, society or the state ("a
public wrong"). Such acts are forbidden and punishable by law.
• The notion that acts such as murder, rape and theft are to be prohibited exists
worldwide. What precisely is a criminal offence is defined by criminal law of
each country. While many have a catalogue of crimes called the criminal code,
in some common law countries no such comprehensive statute exists.
• The state (government) has the power to severely restrict one's liberty for
committing a crime. In modern societies, there are procedures to which
investigations and trials must adhere. If found guilty, an offender may
be sentenced to a form of reparation such as a community sentence, or,
depending on the nature of their offence, to undergo imprisonment, life
imprisonment or, in some jurisdictions, execution.
Arun Verma (c)
20
• Blackstone defined crime as an act committed
or omitted in violation of a public law either
forbidding or commanding it.
• Stephen observed a crime is a violation of a
right considered in reference to the evil tendency
of such violation as regards the community at
large.
• Oxford Dictionary defines crime as an act
punishable by law as forbidden by statute or
injurious to the public welfare.
Arun Verma (c)
21
Essential elements of crime
the following elements are to be satisfied to constitute an act as a crime.
 Human Being
 Mens rea
 Actus reus
 Injury
1. Human Being
The first essential element of a Crime is that it must be committed by a human
being. In case, the crime is committed by an animal, its owner is subject to
Civil/Tortious liability. (Section 11 – IPC, The word ‘person’ includes
artificial or juridical persons)
2. mens rea
A crime is done with a criminal intent.
3. actus reus
There should be an external (physical) act. The Act and the mens rea should be
concurrent and related.
4. Injury
There should be some injury or the act should be prohibited under the existing
law. The act should carry some kind of punishment.
Arun Verma (c)
22
Preparation When Punishable-
• Generally, preparation to commit any offence is not punishable
but in some exceptional cases preparation is punishable;
following are some examples of such exceptional circumstances-
• Preparation to wage war against the Government - Section 122,
IPC 1860;
• Preparation to commit depredation on territories of a power at
peace with Government of India- Section 126, IPC 1860;
• Preparation to commit dacoity- Section 399, IPC 1860;
• Preparation for counterfeiting of coins or Government stamps-
Sections 233-235, S. 255 and S. 257;
• Possessing counterfeit coins, false weight or measurement and
forged documents. Mere possession of these is a crime and no
possessor can plead that he is still at the stage of preparation-
Sections 242, 243, 259, 266 and 474.
Arun Verma (c)
23
Section 29 A of IPC= Section 2 (1)(t) IT Act 2000
Section 29 A (IPC) shall have the same meaning assign to Section 2
(1)(t) of Information Technology Act, 2000.
“electronic record” means data, record or data generated, image or
sound stored, received or sent in an electronic form or micro film or
computer generated micro fiche…
Section 167. Public servant framing an incorrect document
with intent to cause injury — Whoever, being a public servant, and
being, as such public servant, charged with the preparation or
translation of any document, or electronic record, frames or
translates that document or electronic record in a manner which he
knows or believes to be incorrect, intending thereby to cause or
knowing it to be likely that he may thereby cause injury to any person,
shall be punished with imprisonment of either description for a term
which may extend to three years, or with fine, or with both.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 3 years, or fine, or both—Cognizable—
Bailable—Triable by Magistrate of the first class—Non-compoundable.
Arun Verma (c)
24
Section 172. Absconding to avoid service of
summons or other proceeding —
Whoever absconds in order to avoid being served with a summons, notice or
order, proceeding from any public servant legally competent, as such public
servant, to issue such summons, notice or order, shall be punished with simple
imprisonment for a term which may extend to one month, or with fine which
may extend to five hundred rupees, or with both;
or, if the summons or notice or order is to attend in person or by agent, or to
produce a document (or an electronic record) in a Court of Justice, with
simple imprisonment for a term which may extend to six months, or with fine
which may extend to one thousand rupees, or with both.
CLASSIFICATION OF OFFENCE
Para I: Punishment—Simple imprisonment for 1 month, or fine of
500 rupees, or both—Non-cognizable—Bailable—Triable by any
Magistrate—Noncompoundable.
Para II: Punishment—Simple imprisonment for 6 months, or fine
of 1,000 rupees, or both—Non-cognizable—Bailable—Triable by any
Magistrate—Noncompoundable.
Arun Verma (c)
25
Section 173. Preventing service of summons or other
proceeding, or preventing publication thereof —
Whoever in any manner intentionally prevents the serving on himself, or on any other
person, of any summons, notice or order, proceeding from any public servant legally
competent, as such public servant, to issue such summons, notice or order, or intentionally
prevents the lawful affixing to any place or any such summons, notice or order, or
intentionally removes any such summons, notice or order from any place to which it is
lawfully affixed, or intentionally prevents the lawful making of any proclamation, under the
authority of any public servant legally competent, as such public servant, to direct such
proclamation to be made, shall be punished with simple imprisonment for a term which
may extend to one month, or with fine which may extend to five hundred rupees, or with
both; or, if the summons, notice, order or proclamation is to attend in person or by agent, or
to produce a document (or electronic record) in a Court of Justice, with simple
imprisonment for a term which may extend to six months, or with fine which may extend to
one thousand rupees, or with both.
CLASSIFICATION OF OFFENCE
Para I: Punishment—Simple imprisonment for 1 month, or fine of 500 rupees,
or both—Non-cognizable—Bailable—Triable by any Magistrate—Noncompoundable.
Para II: Punishment—Simple imprisonment for 6 months, or fine of 1,000
rupees, or both—Non-cognizable—Bailable—Triable by any Magistrate—
Noncompoundable.
Arun Verma (c)
26
Section 175. Omission to produce document to public
servant by person legally bound to produce it —
Whoever, being legally bound to produce or deliver up any document (or electronic
record) of any public servant, as such, intentionally omits so to produce or deliver up the
same, shall be punished with simple imprisonment for a term which may extend to one
month, or with fine which may extend to five hundred rupees, or with both,
or, if the document (or electronic record) is to be produced or delivered up to a Court of
Justice, with simple imprisonment for a term which may extend to six months, or with fine
which may extend to one thousand rupees, or with both.
Illustration
A, being legally bound to produce a document before a District Court, intentionally omits
to produce the same. A has committed the offence defined in this section.
CLASSIFICATION OF OFFENCE
Para I: Punishment—Simple imprisonment for 1 month, or fine of 500 rupees,
or both—Non-cognizable—Bailable—Triable by the Court in which the offence is
committed, subject to the provisions of Chapter XXVI or, if not committed in a Court, any
Magistrate—Non-compoundable.
Para II: Punishment—Simple imprisonment for 6 months, or fine of 1,000
rupees, or both—Non-cognizable—Bailable—Triable by the Court in which the offence is
committed, subject to the provisions of Chapter XXVI; or, if not committed in a Court, any
Magistrate—Non-compoundable.
Arun Verma (c)
27
Section 192. Fabricating false evidence —
Whoever causes any circumstance to exist or makes any false entry in any
book or record, or makes any document (or electronic record) containing
a false statement, intending that such circumstance, false entry or false
statement may appear in evidence in a judicial proceeding, or in a proceeding
taken by law before a public servant as such, or before an arbitrator, and that
such circumstance, false entry or false statement, so appearing in evidence,
may cause any person who in such proceeding is to form an opinion upon the
evidence, to entertain an erroneous opinion touching any point material to
the result of such proceeding, is said "to fabricate false evidence".
Illustrations
(a) A, puts jewels into a box belonging to Z, with the intention that they may
be found in that box, and that this circumstance may cause Z to be convicted
of theft. A has fabricated false evidence.
(b) A makes a false entry in his shop-book for the purpose of using it as
corroborative evidence in a Court of Justice. A has fabricated false evidence.
(c) A, with the intention of causing Z to be convicted of a criminal
conspiracy, writes a letter in imitation of Z’s handwriting, purporting to be
addressed to an accomplice in such criminal conspiracy, and puts the letter
in a place which he knows that the officers of the Police are likely to search. A
has fabricated false evidence.
Arun Verma (c)
28
Section 204. Destruction of document to prevent its
production as evidence -
Whoever secretes or destroys any document (or electronic record) which he
may be lawfully compelled to produce as evidence in a Court of Justice, or in any
proceeding lawfully held before a public servant, as such, or obligates or renders
illegible the whole or any part of such document (or electronic record) with
the intention of prevention the same from being produced or used as evidence
before such Court or public servant as aforesaid, or after he shall have been
lawfully summoned or required to produce the same for that purpose, shall be
punished with imprisonment of either description for a term which may extend
to two years, or with fine, or with both.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 2 years, or fine, or both—Non-cognizable—
Bailable—Triable by Magistrate of the first class—Non-compoundable.
Section 463. Forgery- Whoever makes any false documents or false
electronic record part of a document or electronic record with intent to
cause damage or injury, to the public or to any person, or to support any claim
or title, or to cause any person to part with property, or to enter into any express
or implied contract, or with intent to commit fraud or that fraud may be
committed, commits forgery.
Arun Verma (c)
29
Section 464. Making a false document —
A person is said to make a false document or false electronic
record—
First — Who dishonestly or fraudulently makes,
(a)Makes, signs, seals or execute a document or part of a document;
(b)Makes or transmits any electronic record or part of any electronic
record;
(c)Affixes any digital signature on any electronic record;
(d)Makes any work denoting the execution of a document of a document
or the authenticity of the digital signature,
(e)With the intention of causing it be believed that such document or a
part of document, electronic record or digital signature was made,
signed, sealed, executed, transmitted or affixed by or by the authority
of a person by whom or by whose authority he knows that it was not
made, signed, sealed, executed or affixed; or
Arun Verma (c)
30
Secondly – Who, without lawful authority, dishonestly or
fraudulently, by cancellation or otherwise, alters a document
or an electronic record in any material part thereof, after it
has been made, executed or affixed with digital signature
either by himself or by any other person, whether such person
be living or dead at the time of such alteration;
Thirdly — Who dishonestly or fraudulently causes any
person to sign, seal, execute or alter a document, or an
electronic record or to affix his digital signature on any
electronic record knowing that such person by reason of
unsoundness of mind or intoxication cannot, or that by reason
of deception practised upon him, he does not know the
contents of the document or the nature of the alteration.
Illustrations
(a) A has a letter of credit upon B for rupees 10,000 written
by Z. A, in order to defraud B, adds a cipher to the 10,000,
and makes the sum 1,00,000 intending that it may be
delivered by B that Z so wrote the letter. A has committed
forgery.
Arun Verma (c)
31
(b) A, without Z’s authority, affixes Z’s seal to a document purporting to be a
conveyance of an estate from Z to A, with the intention to selling the estate to
B, and thereby of obtaining from B the purchase-money. A has committed
forgery.
(c) A picks up a cheque on a banker-signed by B, payable to bearer, but
without any sum having been inserted in the cheque. A fraudulently fills up
the cheque by inserting the sum of ten thousand rupees. A commits forgery.
(d) A leaves with B, his agent, a cheque on a banker, signed by A, without
inserting the sum payable and authorizes B to fill up the cheque by inserting a
sum not exceeding ten thousand rupees for the purpose of making certain
payment. B fraudulently fills up the cheque by inserting the sum of twenty
thousand rupees. B commits forgery.
(e) A draws a bill of exchange on himself in the name of B without B’s
authority, intending to discount it as a genuine bill with a banker and
intending to take up the bill on its maturity. Here, as A draws the bill with
intent to deceive the banker by leading him to suppose that he had the security
of B, and thereby to discount the bill, A is guilty of forgery.
(f) Z’s will contains the these words—"I direct that all my remaining property
be equally divided between A, B and C." A dishonestly scratches out B’s name,
intending that it may be believed that the whole was left to himself and C. A
has committed forgery.
Arun Verma (c)
32
(g) A endorses a Government promissory note and makes it payable to Z or
his order by writing on the bill the words "Pay to Z or his order" and signing
the endorsement. B dishonestly erases the words "Pay to Z or his order",
and thereby converts the special endorsement into a blank endorsement. B
commits forgery.
(h) A sells and conveys an estate to Z. A afterwards, in order to defraud Z
of his estate, executes a conveyance of the same estate to B, dated six months
earlier than the date of the conveyance to Z, intending it to be believed that
he had conveyed the estate to B before he conveyed it to Z. A has committed
forgery.
(i) Z dictates his will to A. A intentionally writes down a different legatee
from the legatee named by Z, and by representing to Z that he has prepared
the will according to his instructions, induces Z to sign the will. A has
committed forgery.
(j) A writes a letter and signs it with B’s name without B’s authority,
certifying that A is a man of good character and in distressed circumstances
from unforeseen misfortune, intending by means of such letter to obtain
alms from Z and other persons. Here, as A made a false document in order
to induce Z to part with property. A has committed forgery.
Arun Verma (c)
33
(k) A without B’s authority writes a letter and signs it in B’s name
certifying to A’s character, intending thereby to obtain employment
under Z. A has committed forgery in as much as he intended to
deceive Z by the forged certificate, and thereby to induce Z to enter
into an express or implied contract for service.
Explanation 1 —A man’s signature of his own name may
amount to forgery.
Illustrations
(a) A signs his own name to a bill of exchange, intending that it may
be believed that the bill was drawn by another person of the same
name. A has committed forgery.
(b) A writes the word "accepted" on a piece of paper and signs it
with Z’s name, in order that B may afterwards write on the paper a
bill of exchange drawn by B upon Z, and negotiate the bill as though
it had been accepted by Z. A is guilty of forgery; and if B, knowing
the fact, draws the bill upon the paper pursuant to A’s intention, B is
also guilty of forgery.
(c) A picks up a bill of exchange payable to the order of a different
person of the same name. A endorses the bill in his own name,
intending to cause it to be believed that it was endorsed by the person
whose order it was payable; here A has committed forgery.
Arun Verma (c)
34
(d) A purchases an estate sold under execution of a decree against B. B, after
the seizure of the estate, in collusion with Z, executes a lease of the estate of Z at
a nominal rent and for a long period and dates the lease six months prior to the
seizure, with intent to defraud A, and to cause it to be believed that the lease
was granted before the seizure. B, though he executes the lease in his own
name, commits forgery by antedating it.
(e) A, a trader, in anticipation of insolvency, lodges effects with B for A’s
benefit, and with intent to defraud his creditors; and in order to give a
colour to the transaction, writes a promissory note binding himself
to pay to B a sum for value received, and antedates the note,
intending that it may be believed to have been made before. A was on
the point of insolvency. A has committed forgery under the first head of the
definition.
Explanation 2— The making of a false document in the name of a fictitious
person, intending it to be believed that the document was made by a real person,
or in the name of a deceased person, intending it to be believed that the
document was made by the person in his lifetime, may amount to forgery.
Illustration
A draws a bill of exchange upon a fictitious person, and fraudulently accepts
the bill in the name of such fictitious person with intent to negotiate it. A
commits forgery.
Arun Verma (c)
35
Section 466. Forgery of record of court or of public register,
etc.— Whoever forges a document, (or an electronic record), purporting
to be a record or proceeding of or in a Court of Justice, or a register of
birth, baptism, marriage or burial, or a register kept by a public servant
as such, or a certificate or document purporting to be made by a public
servant in his official capacity, or an authority to institute or defend a
suit, or to take any proceedings therein, or to confess judgment, or a
power of attorney, shall be punished with imprisonment of either
description for a term which may extend to seven years, and shall also
be liable to fine.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 7 years and fine—Non-cognizable—
Nonbailable—Triable by Magistrate of the first class—Non-
compoundable.
Section 468. Forgery for purpose of cheating — Whoever
commits forgery, intending that the document (or an electronic record),
forged shall be used for the purpose of cheating, shall be punished with
imprisonment of either description for a term which may extend to
seven years, and shall also be liable to fine.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 7 years and fine—Cognizable—Non-
bailable-Triable by Magistrate of the first class—Non-compoundable.
Arun Verma (c)
36
Section 469. Forgery for purpose of harming reputation —
Whoever commits forgery, intending that the document (or an electronic
record), forged shall harm the reputation of any party, or knowing that it is
likely to be used for that purpose, shall be punished with imprisonment of
either description for a term which may extend to three years, and shall also
be liable to fine.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 3 years and fine—Cognizable—Bailable—
Triable by Magistrate of the first class—Non-compoundable.
Section 470. Forged document (or an electronic record), —A false
document made wholly or in part by forgery is designated "a forged
document".
Section 471. Using as genuine a forged document (or an electronic
record), —Whoever fraudulently or dishonestly uses as genuine any
document which he knows or has reason to believe to be a forged document
(or an electronic record), shall be punished in the same manner as if he had
forged such document.
CLASSIFICATION OF OFFENCE
Punishment—Punishment for forgery of such document—Cognizable—
Bailable—Triable by Magistrate of the first class—Non-compoundable.
Arun Verma (c)
37
Section 474. Having possession of document described in
section 466 or 467, knowing it to be forged and intending to use
it as genuine — Whoever has in his possession any document (or an
electronic record), knowing the same to be forged, and intending that
the same shall fraudulently or dishonestly be used as genuine, shall, if the
document (or an electronic record), is one of the description
mentioned in section 466 of this Code, be punished with imprisonment of
either description for a term which may extend to seven years, and shall
also be liable to fine; and if the document is one of the description
mentioned in section 467, shall be punished with imprisonment for life, or
with imprisonment of either description, for a term which may extend to
seven years, and shall also be liable to fine.
CLASSIFICATION OF OFFENCE
Para I: Punishment—Imprisonment for 7 years and fine—
Cognizable—Bailable—Triable by Magistrate of the first class—Non-
compoundable.
Para II: Punishment—Imprisonment for life, or imprisonment
for 7 years and fine—Non-cognizable—Bailable—Triable by Magistrate
of the first class—Noncompoundable.
Arun Verma (c)
38
Section 476. Counterfeiting device or mark used for
authenticating documents other than those described
in section 467, or possessing counterfeit marked
material — Whoever counterfeits upon, or in the substance of,
any material, any device or mark used for the purpose of
authenticating any document (or an electronic record),
other than the documents described in section 467 of this Code,
intending that such device or mark shall be used for the purpose
of giving the appearance of authenticity to any document then
forged or thereafter to be forged on such material, or who, with
such intent, has in his possession any material upon or in the
substance of which any such device or mark has been
counterfeited, shall be punished with imprisonment of either
description for a term which may extend to seven years, and
shall also be liable to fine.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 7 years and fine—Non-
cognizable—Nonbailable—Triable by Magistrate of the first
class—Non-compoundable.
Arun Verma (c)
39
Section 477A. Falsification of accounts —Whoever, being a
clerk, officer or servant, or employed or acting in the capacity of a
clerk, officer or servant, wilfully, and with intent to defraud,
destroys, alters, mutilates or falsifies any book, (or an electronic
record), paper, writing, valuable security or account which belongs
to or is in the possession of his employer, or has been received by
him for or on behalf of his employer, or wilfully, and with intent to
defraud, makes or abets the making of any false entry in, or omits or
alters or abets the omission or alteration of any material particular
from or in, any such book, (or an electronic record), paper, writing,
valuable security or account, shall be punished with imprisonment
of either description for a term which may extend to seven years, or
with fine, or with both.
Explanation—It shall be sufficient in any charge under
this section to allege a general intent to defraud without naming
any particular person intended to be defrauded or specifying any
particular sum of money intended to be the subject of the fraud, or
any particular day on which the offence was committed.
CLASSIFICATION OF OFFENCE
Punishment—Imprisonment for 7 years, or fine, or both—Non-
cognizable—Bailable—Triable by Magistrate of the first class—Non-
compoundable.
Arun Verma (c)
40
CYBERCRIME AND INDIAN EVIDENCE ACT
Section 3. Interpretation clause —In this Act following words and
expressions are used in the following senses, unless a contrary intention appears
from the context:—
“Evidence”—”Evidence” means and includes—
(1) all statements which the Court permits or requires to made before it by
witnesses, in relation to matters of fact under inquiry; such statements are
called oral evidence;
(2) [1][all documents including electronic records produced for the inspection of
the Court]; such documents are called documentary evidence;
“Proved”—A fact is said to be proved when, after considering the matters before
it, the Court either believes its to exist, or considers its existence so probable
that a prudent man ought, under the circumstances of the particular case, to act
upon the supposition that it exists.
“Disproved”—A fact is said to be disproved when, after considering the matters
before it, the Court either believes that it does not exist, or considers its non-
existence so probable that a prudent man ought, under the circumstances of the
particular case, to act upon the supposition that it does not exist.
“Not proved”—A fact is said not to be proved when it is neither proved nor
disproved.
Arun Verma (c)
41
• [2][The expression “Certifying Authority”, “digital
signature”, “Digital Signature Certificate”, “electronic
form”, “electronic records”, “information”, “secure
electronic record”, “secure digital signature” and
“subscriber” shall have the meanings respectively assigned to
them in the Information Technology Act, 2000].
• 2(g) “Certifying Authority” (I T Act 2000)— means a
person who has been granted a license to issue a Digital
Signature Certificate under section 24;
• 2(p) “digital signature” (I T Act 2000)— means
authentication of any electronic record by a subscriber by
means of an electronic method or procedure in accordance with
the provisions of section 3;
• 2(q) “Digital Signature Certificate” (I T Act 2000)—
means a digital Signature Certificate issued under subsection
(4) of section 35;
• 2(r) “electronic form”, (I T Act 2000)— with reference to
information, means any information generated, sent, received
or stored in media, magnetic, optical, computer memory,
microfilm, computer generated micro fiche or similar device;
Arun Verma (c)
42
• 2(t) “electronic record” (I T Act 2000)— means data, record or data
generated, image or sound stored, received or sent in an electronic form or micro
film or computer generated micro fiche;
• 2(v) “information” (I T Act 2000)— includes data, text, images, sound, voice,
codes, computer programmes software and databases or microfilm or computer
generated micro fiche;
• 2(zg) “subscriber” (I T Act 2000)— means a person in whose name the Digital
Signature Certificate is issued;
• Section 14. Secure electronic record. (I T Act 2000)— Where any security
procedure has been applied to an electronic record at a specific point of time, then
such record shall be deemed to be a secure electronic record from such point of time
to the time of verification.
• Section 15. Secure digital signature. (I T Act 2000)— If, by application of
a security procedure agreed to by the parties concerned, it can be verified that
a digital signature, at the time it was affixed, was—
(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the exclusive control of the
subscriber and is linked to the electronic record to which it relates in such a manner
that if the electronic record was altered the digital signature would invalidated, then
such digital signature shall be deemed to be a secure digital signature.
Arun Verma (c)
43
• Section 17. Admission defined —An admission is a statement, [3][oral or
documentary or contained in electronic form], which suggests any inference as
to any fact in issue or relevant fact, and which is made by any of the persons,
and under the circumstances, hereinafter mentioned.
• Section 22A. When oral admission as to contents of electronic
records are relevant. —Oral admissions as to the contents of electronic
records are not relevant, unless the genuineness of the electronic record
produced is in question]
• Section 34. [Entries in books of account including those maintained
in an electronic form] when relevant —1[Entries in books of account
including those maintained in an electronic form], regularly kept in the course
of business, are relevant whenever they refer to a matter into which the Court
has to inquire but such statements shall not alone be sufficient evidence to
charge any person with liability.
• Illustration
• A sues B for Rs. 1,000 and shows entries in his account-books showing B to be
indebted to him to this amount. The entries are relevant, but are not sufficient,
without other evidence, to prove the debt.
Arun Verma (c)
44
• Section 35. Relevancy of entry in public record made in
performance of duty —An entry in any public or other official
book, register, 1[record or an electronic record], stating a fact in issue or
relevant fact, and made by a public servant in the discharge of his official
duty, or by any other person in performance of a duty specially enjoined
by the law of the country in which such book register, or 1[record or an
electronic record] is kept, is itself a relevant fact.
• Section 39. What evidence to be given when statement forms
part of a conversation, document, electronic record], book or
series of letters or papers —When any statement of which
evidence is given forms part of a longer statement, or of a
conversation or part of an isolated document, or is contained in a
document which forms part of a book, or is contained in part of electronic
record or of a connected series of letters or papers, evidence shall be given
of so much and no more of the statement, conversation, document, book,
electronic record, or series of letters or papers as the Court considers
necessary in that particular case to the full understanding of the nature
and effect of the statement, and of the circumstances under which it was
made].
Arun Verma (c)
45
• Section 47A . Opinion as to digital signature when relevant —When
the court has to form an opinion as to the digital signature of any
person, the opinion of the Certifying Authority which has issued the Digital
Signature Certificate is a relevant fact.]
• Section 59. Proof of facts by oral evidence —All facts, except the
[contents of documents or electronic records], may be proved by oral
evidence.
• Section 65A. Special provisions as to evidence relating to electronic
record.— The contents of electronic records may be proved in accordance
with the provisions of Section 65B.
• Section 65B. Admissibility of electronic records .—
(1) Notwithstanding anything contained in this Act, any information contained
in an electronic record which is printed on a paper, stored, recorded or copied
in optical or magnetic media produced by a computer (hereinafter referred to
as the computer output) shall be deemed to be also a document, if the
conditions mentioned in this section are satisfied in relation to the
information and computer in question and shall be admissible in any
proceedings, without further proof or production of the original, as evidence
of any contents of the original or of any fact stated therein of which direct
evidence would be admissible.
Arun Verma (c)
46
• (2) The conditions referred to in sub-section (1) in respect of a
computer output shall be the following, namely:—
• (a) the computer output containing the information was produced by
the computer during the period over which the computer was used
regularly to store or process information for the purposes of any
activities regularly carried on over that period by the person having
lawful control over the use of the computer;
• (b) during the said period, information of the kind contained in the
electronic record or of the kind from which the information so
contained is derived was regularly fed into the computer in the
ordinary course of the said activities;
• (c) throughout the material part of the said period, the computer was
operating properly or, if not, then in respect of any period in which it
was not operating properly or was out of operation during that part of
the period, was not such as to affect the electronic record or the
accuracy of its contents; and
• (d) the information contained in the electronic record reproduces or
is derived from such information fed into the computer in the
ordinary course of the said activities.
Arun Verma (c)
47
(3) Where over any period, the function of storing or processing information for the
purposes of any activities regularly carried on over that period as mentioned in clause (a)
of sub-section (2) was regularly performed by computers, whether—
• (a) by a combination of computers operating over that period; or
• (b) by different computers operating in succession over that period; or
• (c) by different combinations of computers operating in succession over that period; or
• (d) in any other manner involving the successive operation over that period, in whatever
order, of one or more computers and one or more combinations of computers, all the
computers used for that purpose during that period shall be treated for the purposes of
this section as constituting a single computer; and references in this section to a computer
shall be construed accordingly.
(4) In any proceedings where it is desired to give a statement in evidence by virtue of this
section, a certificate doing any of the following things, that is to say—
• (a) identifying the electronic record containing the statement and describing the manner
in which it was produced;
• (b) giving such particulars of any device involved in the production of that electronic
record as may be appropriate for the purpose of showing that the electronic record was
produced by a computer;
• (c) dealing with any of the matters to which the conditions mentioned in sub-section (2)
relate, and purporting to be signed by a person occupying a responsible official position in
relation to the operation of the relevant device or the management of the relevant
activities (whichever is appropriate) shall be evidence of any matter stated in the
certificate; and for the purposes of this sub-section it shall be sufficient for a matter to be
stated to the best of the knowledge and belief of the person stating it.
Arun Verma (c)
48
(5) For the purposes of this section,—
• (a) information shall be taken to be supplied to a computer if
it is supplied thereto in any appropriate form and whether it is
so supplied directly or (with or without human intervention)
by means of any appropriate equipment;
• (b) whether in the course of activities carried on by any
official, information is supplied with a view to its being stored
or processed for the purposes of those activities by a computer
operated otherwise than in the course of those activities, that
information, if duly supplied to that computer, shall be taken
to be supplied to it in the course of those activities;
• (c) a computer output shall be taken to have been produced by
a computer whether it was produced by it directly or (with or
without human intervention) by means of any appropriate
equipment.
Explanation—For the purposes of this section any reference
to information being derived from other information shall be
a reference to its being derived there from by calculation,
comparison or any other process.]
Arun Verma (c)
49
Section 67A. Proof as to digital signature.— Except in the case of a secure digital
signature, if the digital signature of any subscriber is alleged to have been affixed to an
electronic record the fact that such digital signature is the digital signature of the
subscriber must be proved.
Section 73A. Proof as to verification of digital signature.—In order to ascertain
whether a digital signature is that of the person by whom it purports to have been
affixed, the Court may direct—
(a) that person or the Controller or the Certifying Authority to produce the Digital
Signature Certificate;
(b) any other person to apply the public key listed in the Digital Signature Certificate and
verify the digital signature purported to have been affixed by that person.”.
Explanation—For the purposes of this section, “Controller” means the Controller
appointed under subsection (1) of Section 17 of the Information Technology Act, 2000.]
Section 81A. Presumption as to Gazettes in electronic forms —The Court shall
presume the genuineness of every electronic record purporting to be the Official
Gazette, or purporting to be electronic record directed by any law to be kept by any
person, if such electronic record is kept substantially in the form required by law and is
produced from proper custody.
Explanation.—Electronic records are said to be in proper custody if they are in the
place in which, and under the care of the person with whom, they naturally be; but no
custody is improper if it is proved to have had a legitimate origin, or the circumstances
of the particular case are such as to render such an origin probable.]
Arun Verma (c)
50
• Section 85A. Presumption as to electronic agreements —The
Court shall presume that every electronic record purporting to be an
agreement containing the digital signatures of the parties was so
concluded by affixing the digital signature of the parties.
• Section 85B. Presumption as to electronic records and digital
signatures —(1) In any proceedings involving a secure electronic record,
the Court shall presume unless contrary is proved, that the secure
electronic record has not been altered since the specific point of time to
which the secure status relates.
• (2) In any proceedings, involving secure digital signature, the Court shall
presume unless the contrary is proved that—
• (a) the secure digital signature is affixed by subscriber with the intention
of singing or approving the electronic record;
• (b) except in the case of a secure electronic record or a secure digital
signature, nothing in this section shall create any presumption relating to
authenticity and integrity of the electronic record or any digital signature.
• Section 85C. Presumption as to Digital Signature Certificates.—
The Court shall presume, unless contrary is proved, that the information
listed in a Digital Signature Certificate is correct, except for information
specified as subscriber information which has not been verified, if the
certificate was accepted by the subscriber.]
Arun Verma (c)
51
• Section 88A. Presumption as to electronic messages— The Court may
presume that an electronic message forwarded by the originator through an
electronic mail server to the addressee to whom the message purports to be
addressed corresponds with the message as fed into his computer for
transmission; but the Court shall not make any presumption as to the person by
whom such message was sent.
• Explanation—For the purposes of this section, the expressions “addressee”
and “originator” shall have the same meanings respectively assigned to them in
clauses (b) and (za) of sub-section (1) of section 2 of the Information Technology
Act, 2000.
• Section 90A. Presumption as to electronic records five years old—
Where any electronic record, purporting or proved to be five years old, is
produced from any custody which the Court in the particular case considers
proper, the Court may presume that the digital signature which purports to be
the digital signature of any particular person was so affixed by him or any
person authorised by him in this behalf.
• Explanation.—Electronic records are said to be in proper custody if they are
in the place in which, and under the care of the person with whom, they
naturally be; but no custody is improper if it is proved to have had a legitimate
origin, or the circumstances of the particular case are such as to render such an
origin probable.]
Arun Verma (c)
52
• Section 131. Production of documents or electronic records
which another person, having possession, could refuse to
produce— No one shall be compelled to produce documents in his
possession or electronic records under his control, which any other
person would be entitled to refuse to produce if they were in his
possession or control, unless such last-mentioned person consents to
their production.]
Arun Verma (c)
53

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 

Semelhante a Statutory laws pertaining to cybercrimes in india

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 

Semelhante a Statutory laws pertaining to cybercrimes in india (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
English in written
English in writtenEnglish in written
English in written
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 

Mais de Dr. Arun Verma

Law of torts Introduction
Law of torts IntroductionLaw of torts Introduction
Law of torts IntroductionDr. Arun Verma
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docxDr. Arun Verma
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Incorporation of companies and management
Incorporation of companies and managementIncorporation of companies and management
Incorporation of companies and managementDr. Arun Verma
 
Time place and manner of performance [46–50]
Time place and manner of performance [46–50]Time place and manner of performance [46–50]
Time place and manner of performance [46–50]Dr. Arun Verma
 
Production sharing contract
Production sharing contractProduction sharing contract
Production sharing contractDr. Arun Verma
 
Contract law lecture 6 - object forbidden by law
Contract law   lecture 6 - object forbidden by lawContract law   lecture 6 - object forbidden by law
Contract law lecture 6 - object forbidden by lawDr. Arun Verma
 
Contract law lecture - 3 - acceptance
Contract law   lecture - 3 - acceptanceContract law   lecture - 3 - acceptance
Contract law lecture - 3 - acceptanceDr. Arun Verma
 
Contract law lecture - 2 - offer
Contract law   lecture - 2 - offerContract law   lecture - 2 - offer
Contract law lecture - 2 - offerDr. Arun Verma
 
Contract law lecture - 1 - definition and meaning(terminology)
Contract law   lecture - 1 - definition and meaning(terminology)Contract law   lecture - 1 - definition and meaning(terminology)
Contract law lecture - 1 - definition and meaning(terminology)Dr. Arun Verma
 
Registration of companies
Registration of companiesRegistration of companies
Registration of companiesDr. Arun Verma
 
Promoters and preincorporation contracts
Promoters and preincorporation contractsPromoters and preincorporation contracts
Promoters and preincorporation contractsDr. Arun Verma
 
Memorandum of association and articles of association
Memorandum of association and articles of associationMemorandum of association and articles of association
Memorandum of association and articles of associationDr. Arun Verma
 
Lifting the veil of corporate personality
Lifting the veil of corporate personalityLifting the veil of corporate personality
Lifting the veil of corporate personalityDr. Arun Verma
 

Mais de Dr. Arun Verma (20)

Law of torts Introduction
Law of torts IntroductionLaw of torts Introduction
Law of torts Introduction
 
Environment law intro
Environment law introEnvironment law intro
Environment law intro
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
E governance
E governanceE governance
E governance
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Incorporation of companies and management
Incorporation of companies and managementIncorporation of companies and management
Incorporation of companies and management
 
Time place and manner of performance [46–50]
Time place and manner of performance [46–50]Time place and manner of performance [46–50]
Time place and manner of performance [46–50]
 
Production sharing contract
Production sharing contractProduction sharing contract
Production sharing contract
 
Performance
PerformancePerformance
Performance
 
Contract law lecture 6 - object forbidden by law
Contract law   lecture 6 - object forbidden by lawContract law   lecture 6 - object forbidden by law
Contract law lecture 6 - object forbidden by law
 
Contract law lecture - 3 - acceptance
Contract law   lecture - 3 - acceptanceContract law   lecture - 3 - acceptance
Contract law lecture - 3 - acceptance
 
Contract law lecture - 2 - offer
Contract law   lecture - 2 - offerContract law   lecture - 2 - offer
Contract law lecture - 2 - offer
 
Contract law lecture - 1 - definition and meaning(terminology)
Contract law   lecture - 1 - definition and meaning(terminology)Contract law   lecture - 1 - definition and meaning(terminology)
Contract law lecture - 1 - definition and meaning(terminology)
 
Registration of companies
Registration of companiesRegistration of companies
Registration of companies
 
Prospectus
ProspectusProspectus
Prospectus
 
Promoters and preincorporation contracts
Promoters and preincorporation contractsPromoters and preincorporation contracts
Promoters and preincorporation contracts
 
Memorandum of association and articles of association
Memorandum of association and articles of associationMemorandum of association and articles of association
Memorandum of association and articles of association
 
Lifting the veil of corporate personality
Lifting the veil of corporate personalityLifting the veil of corporate personality
Lifting the veil of corporate personality
 
Kinds of companies
Kinds of companiesKinds of companies
Kinds of companies
 

Último

Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理F La
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理ss
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 

Último (20)

Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 

Statutory laws pertaining to cybercrimes in india

  • 1. STATUTORY LAWS PERTAINING TO CYBERCRIMES IN INDIA Arun Verma 1 Arun Verma (c)
  • 2. STATUTORY LAWS PERTAINING TO CYBERCRIMES IN INDIA • In the era of cyber world as the usage of computers became more popular, there was expansion in the growth of technology as well, and the term ‘Cyber’ became more familiar to the people. The evolution of Information Technology (IT) gave birth to the cyber space wherein internet provides equal opportunities to all the people to access any information, data storage, analyse etc. with the use of high technology. Due to increase in the number of netizens, misuse of technology in the cyberspace was clutching up which gave birth to cyber crimes at the domestic and international level as well. • Though the word Crime carries its general meaning as “a legal wrong that can be followed by criminal proceedings which may result into punishment” whereas Cyber Crime may be “unlawful acts wherein the computer is either a tool or target or both”. Arun Verma (c) 2
  • 3. • The world 1st computer specific law was enacted in the year 1970 by the German State of Hesse in the form of ‘Data Protection Act, 1970’ with the advancement of cyber technology. With the emergence of technology the misuse of technology has also expanded to its optimum level and then there arises a need of strict statutory laws to regulate the criminal activities in the cyber world and to protect technological advancement system. It is under these circumstances Indian parliament passed its “INFORMATION TECHNOLOGY ACT, 2000” on 17th October to have its exhaustive law to deal with the technology in the field of e-commerce, e-governance, e-banking as well as penalties and punishments in the field of cyber crimes. Arun Verma (c) 3
  • 4. • Cyber Crimes Actually Means: It could be hackers vandalizing your site, viewing confidential information, stealing trade secrets or intellectual property with the use of internet. It can also include ‘denial of services’ and viruses attacks preventing regular traffic from reaching your site. Cyber crimes are not limited to outsiders except in case of viruses and with respect to security related cyber crimes that usually done by the employees of particular company who can easily access the password and data storage of the company for their benefits. Cyber crimes also includes criminal activities done with the use of computers which further perpetuates crimes i.e. financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail, spoofing, forgery, cyber defamation, cyber stalking, unauthorized access to Computer system, theft of information contained in the electronic form, e-mail bombing, physically damaging the computer system etc. • Classifications Of Cyber Crimes: Cyber Crimes which are growing day by day, it is very difficult to find out what is actually a cyber crime and what is the conventional crime so to come out of this confusion, cyber crimes can be classified under different categories which are as follows: Arun Verma (c) 4
  • 5. The most comprehensive classification of computer crimes has been given by David L. Carter who classifies computer related crimes into three broad categories: • (A) Where computer is the target of the crime. • (B) Where computer facilitates the commission of crime. • (C) Where computer is incidental to the crime. (A)Computer as target of the crime This category of computer crimes aims at damaging computer system or stealing valuable information stored on the system and include: 1. Sabotage of computer system or computer network. 2. Theft of data/information. 3. Theft of Intellectual Property such as computer software. 4. Theft of marketable information. 5. Blackmail based on information gained from computerized files preferences, such as medical information, medical history, sexual preferences, financial data, etc. 6. Unlawful access to criminal justice and the governmental records. Arun Verma (c) 5
  • 6. (B) Computer as an instrument of crime The Computer crimes falling under this category use computer as a medium for commission of offences. The computer programmes are manipulated to defraud others. 1. Fraudulent use of automated teller machine (ATM) cards and accounts. 2. Credit card frauds. 3. Frauds involving stock transfers. 4. Frauds involving stock to e-commerce. 5. Telecommunication frauds. Arun Verma (c) 6
  • 7. (c) Computer as incidental to the crime • The Diverse application of Internet made it incidental to crimes that may be classified into two broad categories.. • (A) Internet Crimes • (B) Web Based Crimes (A)Internet Crimes: The Internet crimes include that group of crimes that make criminal use of the Internet infrastructure. These includes… (i) Hacking – (a) Theft of information. (b) Theft of password. (c) Theft of credit card numbers. (ii) Launch of malicious programmes. (iii) Espionage. (iv) Spamming. Arun Verma (c) 7
  • 8. (B) Web Based Crimes Web based crimes have been categorized separately and have been further classified into four subcategories. (a) Website related crimes (i) Cheating and Frauds. (ii) Insurance Frauds. (iii)Gambling. (iv) Distribution of pornography. (v) Sale of Pirated Software. (b) Crimes through e-mail. (i) Threats. (ii) Extortion. (iii)E-Mail Bombing. (iv) Defamation. (v) Launching of Malicious Progammes. Arun Verma (c) 8
  • 9. (c) Usenet related crimes- (i) Distribution/Sale of pornography material. (ii) Distribution/Sale of pirated software. (iii)Discussion on methods of hacking. (iv) Sale of stolen credit card numbers. (v) Sale of Stolen Data. (d) Internet relay chat crimes- (i) Cyber stalking. (ii) Fraudulent use chat rooms for developing relations with unsuspecting victims. (iii)Criminals use it for meeting conspirators. (iv) Hackers use it for discussing their expertise of showing use techniques. (v) Pedophiles use chat rooms to allure small children. Arun Verma (c) 9
  • 10. Target of Computer Crime • The Degree of risk of Internet abuse depends on the method of Internet connectivity, the type of computer hardware used, the number and type of security devices in use, and the nature of the user e.g. educational institution, government entity, business or home. • In general, the risk factors is less for computers that access the internet via an Internet Service Provider (ISP) than for computers that have direct access to the Internet. • The Common targets of computer crimes are: - Computer used by military and intelligence agencies. - Computers of business houses targeted by competitors. - Computers of banks and other financial institutions targeted by white collar criminals. - Government or service industries targeted by terrorists or hackers. - Commercial, industrial or trading companies targeted by disgruntled employees. - Universities, Scientific organizations, research institutions targeted by students, industrial or business houses. Arun Verma (c) 10
  • 11. 1. Cyber Crimes against Persons: • There are certain offences which affects the personality of individuals can be defined as: • Harassment via E-Mails: It is very common type of harassment through sending letters, attachments of files & folders i.e. via e-mails. At present harassment is common as usage of social sites i.e. Facebook, Twitter etc. increasing day by day. • Cyber-Stalking: It means expressed or implied a physical threat that creates fear through the use to computer technology such as internet, e-mail, phones, text messages, webcam, websites or videos. • Dissemination of Obscene Material: It includes Indecent exposure/ Pornography (basically child pornography), hosting of web site containing these prohibited materials. These obscene matters may cause harm to the mind of the adolescent and tend to deprave or corrupt their mind. • Defamation: It is an act of imputing any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar language to unknown persons mail account. • Hacking: It means unauthorized control/access over computer system and act of hacking completely destroys the whole data as well as computer programmes. Hackers usually hacks telecommunication and mobile network. Arun Verma (c) 11
  • 12. • Cracking: It is amongst the gravest cyber crimes known till date. It is a dreadful feeling to know that a stranger has broken into your computer systems without your knowledge and consent and has tampered with precious confidential data and information. • E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it’s origin to be different from which actually it originates. • SMS Spoofing: Spoofing is a blocking through spam which means the unwanted uninvited messages. Here a offender steals identity of another in the form of mobile phone number and sending SMS via internet and receiver gets the SMS from the mobile phone number of the victim. It is very serious cyber crime against any individual. • Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals for their monetary benefits through withdrawing money from the victim’s bank account mala-fidely. There is always unauthorized use of ATM cards in this type of cyber crimes. • Cheating & Fraud: It means the person who is doing the act of cyber crime i.e. stealing password and data storage has done it with having guilty mind which leads to fraud and cheating. • Child Pornography: It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children. • Assault by Threat: refers to threatening a person with fear for their lives or lives of their families through the use of a computer network i.e. E-mail, videos or phones. Arun Verma (c) 12
  • 13. 2. Crimes Against Persons Property: • As there is rapid growth in the international trade where businesses and consumers are increasingly using computers to create, transmit and to store information in the electronic form instead of traditional paper documents. There are certain offences which affects persons property which are as follows: • Intellectual Property Crimes: Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived completely or partially of his rights is an offence. The common form of IPR violation may be said to be software piracy, infringement of copyright, trademark, patents, designs and service mark violation, theft of computer source code, etc. • Cyber Squatting: It means where two persons claim for the same Domain Name either by claiming that they had registered the name first on by right of using it before the other or using something similar to that previously. For example two similar names i.e. www.yahoo.com and www.yaahoo.com. • Cyber Vandalism: Vandalism means deliberately destroying or damaging property of another. Thus cyber vandalism means destroying or damaging the data when a network service is stopped or disrupted. It may include within its purview any kind of physical harm done to the computer of any person. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer. Arun Verma (c) 13
  • 14. • Hacking Computer System: Hacktivism attacks those included Famous Twitter, blogging platform by unauthorized access/control over the computer. Due to the hacking activity there will be loss of data as well as computer. Also research especially indicates that those attacks were not mainly intended for financial gain too and to diminish the reputation of particular person or company. • Transmitting Virus: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computerize system of the individuals. • Cyber Trespass: It means to access someone’s computer without the right authorization of the owner and does not disturb, alter, misuse, or damage data or system by using wireless internet connection. • Internet Time Thefts: Basically, Internet time theft comes under hacking. It is the use by an unauthorised person, of the Internet hours paid for by another person. The person who gets access to someone else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person’s knowledge. You can identify time theft if your Internet time has to be recharged often, despite infrequent usage. Arun Verma (c) 14
  • 15. 3. Cybercrimes Against Government: • There are certain offences done by group of persons intending to threaten the international governments by using internet facilities. It includes: • Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic as well as global concern. The common form of these terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism activities endanger the sovereignty and integrity of the nation. • Cyber Warfare: It refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. • Distribution of pirated software: It means distributing pirated software from one computer to another intending to destroy the data and official records of the government. • Possession of Unauthorized Information: It is very easy to access any information by the terrorists with the aid of internet and to possess that information for political, religious, social, ideological objectives. Arun Verma (c) 15
  • 16. 4. Cybercrimes Against Society at large: • An unlawful act done with the intention of causing harm to the cyberspace will affect large number of persons. These offences includes: • Child Pornography: It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children. It also includes activities concerning indecent exposure and obscenity. • Cyber Trafficking: It may be trafficking in drugs, human beings, arms weapons etc. which affects large number of persons. Trafficking in the cyberspace is also a gravest crime. • Online Gambling: Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. There are many cases that have come to light are those pertaining to credit card crimes, contractual crimes, offering jobs, etc. • Financial Crimes: This type of offence is common as there is rapid growth in the users of networking sites and phone networking where culprit will try to attack by sending bogus mails or messages through internet. Ex: Using credit cards by obtaining password illegally. • Forgery: It means to deceive large number of persons by sending threatening mails as online business transactions are becoming the habitual need of today’s life style. Arun Verma (c) 16
  • 17. • Affects To Whom: Cyber Crimes always affects the companies of any size because almost all the companies gain an online presence and take advantage of the rapid gains in the technology but greater attention to be given to its security risks. In the modern cyber world cyber crimes is the major issue which is affecting individual as well as society at large too. • Need of Cyber Law: information technology has spread throughout the world. The computer is used in each and every sector wherein cyberspace provides equal opportunities to all for economic growth and human development. As the user of cyberspace grows increasingly diverse and the range of online interaction expands, there is expansion in the cyber crimes i.e. breach of online contracts, perpetration of online torts and crimes etc. Due to these consequences there was need to adopt a strict law by the cyber space authority to regulate criminal activities relating to cyber and to provide better administration of justice to the victim of cyber crime. In the modern cyber technology world it is very much necessary to regulate cyber crimes and most importantly cyber law should be made stricter in the case of cyber terrorism and hackers. Arun Verma (c) 17
  • 18. • Penalty For Damage To Computer System: According to the Section: 43 of ‘Information Technology Act, 2000’ whoever does any act of destroys, deletes, alters and disrupts or causes disruption of any computer with the intention of damaging of the whole data of the computer system without the permission of the owner of the computer, shall be liable to pay fine upto 1crore to the person so affected by way of remedy. According to the Section:43A which is inserted by ‘Information Technology(Amendment) Act, 2008’ where a body corporate is maintaining and protecting the data of the persons as provided by the central government, if there is any negligent act or failure in protecting the data/ information then a body corporate shall be liable to pay compensation to person so affected. And Section 66 deals with ‘hacking with computer system’ and provides for imprisonment up to 3 years or fine, which may extend up to 2 years or both. Arun Verma (c) 18
  • 19. Case Study-Attacks on Cyberspace: • Worm Attack: The Robert Tappan Morris well Known as First Hacker, Son of former National Security Agency Scientist Robert Morris, was the first person to be prosecuted under the ‘Computer and Fraud Act, 1986’. He has created worm while at Cornell as student claiming that he intended to use the worm to check how large the internet was that time. The worm was uncontrollable due to which around 6000 computer machines were destroyed and many computers were shut down until they had completely malfunctioned. He was ultimately sentenced to three years probation, 400 hours of community service and assessed a fine of $10500. So there must be strict laws to punish the criminals who are involved in cyber crime activities. • Hacker Attack: Fred Cohen, a Ph.D. student at the University of Southern California wrote a short program in the year 1983, as an experiment, that could “infect” computers, make copies of itself, and spread from one machine to another. It was beginning & it was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk and many computers were sold which can be accommodate at present too. Other computer scientists had warned that computer viruses were possible, but Cohen’s was the first to be documented. A professor of his suggested the name “virus”. Cohen now runs a computer security firm. • Internet Hacker: Wang Qun, who was known by the nickname of “playgirl”, was arrested by chinese police in the Hubei province first ever arrest of an internet hacker in China. He was a 19 year old computing student, arrested in connection with the alleged posting of pornographic material on the homepages of several government-run web sites. Wang had openly boasted in internet chat rooms that he had also hacked over 30 other web sites too. Arun Verma (c) 19
  • 20. IT ACT AND IPC • CRIME: In ordinary language, the term crime denotes an unlawful act punishable by a state. The term "crime" does not, in modern criminal law, have any simple and universally accepted definition, though statutory definitions have been provided for certain purposes. The most popular view is that crime is a category created by law; in other words, something is a crime if declared as such by the relevant and applicable law. One proposed definition is that a crime or offence (or criminal offence) is an act harmful not only to some individual or individuals but also to a community, society or the state ("a public wrong"). Such acts are forbidden and punishable by law. • The notion that acts such as murder, rape and theft are to be prohibited exists worldwide. What precisely is a criminal offence is defined by criminal law of each country. While many have a catalogue of crimes called the criminal code, in some common law countries no such comprehensive statute exists. • The state (government) has the power to severely restrict one's liberty for committing a crime. In modern societies, there are procedures to which investigations and trials must adhere. If found guilty, an offender may be sentenced to a form of reparation such as a community sentence, or, depending on the nature of their offence, to undergo imprisonment, life imprisonment or, in some jurisdictions, execution. Arun Verma (c) 20
  • 21. • Blackstone defined crime as an act committed or omitted in violation of a public law either forbidding or commanding it. • Stephen observed a crime is a violation of a right considered in reference to the evil tendency of such violation as regards the community at large. • Oxford Dictionary defines crime as an act punishable by law as forbidden by statute or injurious to the public welfare. Arun Verma (c) 21
  • 22. Essential elements of crime the following elements are to be satisfied to constitute an act as a crime.  Human Being  Mens rea  Actus reus  Injury 1. Human Being The first essential element of a Crime is that it must be committed by a human being. In case, the crime is committed by an animal, its owner is subject to Civil/Tortious liability. (Section 11 – IPC, The word ‘person’ includes artificial or juridical persons) 2. mens rea A crime is done with a criminal intent. 3. actus reus There should be an external (physical) act. The Act and the mens rea should be concurrent and related. 4. Injury There should be some injury or the act should be prohibited under the existing law. The act should carry some kind of punishment. Arun Verma (c) 22
  • 23. Preparation When Punishable- • Generally, preparation to commit any offence is not punishable but in some exceptional cases preparation is punishable; following are some examples of such exceptional circumstances- • Preparation to wage war against the Government - Section 122, IPC 1860; • Preparation to commit depredation on territories of a power at peace with Government of India- Section 126, IPC 1860; • Preparation to commit dacoity- Section 399, IPC 1860; • Preparation for counterfeiting of coins or Government stamps- Sections 233-235, S. 255 and S. 257; • Possessing counterfeit coins, false weight or measurement and forged documents. Mere possession of these is a crime and no possessor can plead that he is still at the stage of preparation- Sections 242, 243, 259, 266 and 474. Arun Verma (c) 23
  • 24. Section 29 A of IPC= Section 2 (1)(t) IT Act 2000 Section 29 A (IPC) shall have the same meaning assign to Section 2 (1)(t) of Information Technology Act, 2000. “electronic record” means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche… Section 167. Public servant framing an incorrect document with intent to cause injury — Whoever, being a public servant, and being, as such public servant, charged with the preparation or translation of any document, or electronic record, frames or translates that document or electronic record in a manner which he knows or believes to be incorrect, intending thereby to cause or knowing it to be likely that he may thereby cause injury to any person, shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 3 years, or fine, or both—Cognizable— Bailable—Triable by Magistrate of the first class—Non-compoundable. Arun Verma (c) 24
  • 25. Section 172. Absconding to avoid service of summons or other proceeding — Whoever absconds in order to avoid being served with a summons, notice or order, proceeding from any public servant legally competent, as such public servant, to issue such summons, notice or order, shall be punished with simple imprisonment for a term which may extend to one month, or with fine which may extend to five hundred rupees, or with both; or, if the summons or notice or order is to attend in person or by agent, or to produce a document (or an electronic record) in a Court of Justice, with simple imprisonment for a term which may extend to six months, or with fine which may extend to one thousand rupees, or with both. CLASSIFICATION OF OFFENCE Para I: Punishment—Simple imprisonment for 1 month, or fine of 500 rupees, or both—Non-cognizable—Bailable—Triable by any Magistrate—Noncompoundable. Para II: Punishment—Simple imprisonment for 6 months, or fine of 1,000 rupees, or both—Non-cognizable—Bailable—Triable by any Magistrate—Noncompoundable. Arun Verma (c) 25
  • 26. Section 173. Preventing service of summons or other proceeding, or preventing publication thereof — Whoever in any manner intentionally prevents the serving on himself, or on any other person, of any summons, notice or order, proceeding from any public servant legally competent, as such public servant, to issue such summons, notice or order, or intentionally prevents the lawful affixing to any place or any such summons, notice or order, or intentionally removes any such summons, notice or order from any place to which it is lawfully affixed, or intentionally prevents the lawful making of any proclamation, under the authority of any public servant legally competent, as such public servant, to direct such proclamation to be made, shall be punished with simple imprisonment for a term which may extend to one month, or with fine which may extend to five hundred rupees, or with both; or, if the summons, notice, order or proclamation is to attend in person or by agent, or to produce a document (or electronic record) in a Court of Justice, with simple imprisonment for a term which may extend to six months, or with fine which may extend to one thousand rupees, or with both. CLASSIFICATION OF OFFENCE Para I: Punishment—Simple imprisonment for 1 month, or fine of 500 rupees, or both—Non-cognizable—Bailable—Triable by any Magistrate—Noncompoundable. Para II: Punishment—Simple imprisonment for 6 months, or fine of 1,000 rupees, or both—Non-cognizable—Bailable—Triable by any Magistrate— Noncompoundable. Arun Verma (c) 26
  • 27. Section 175. Omission to produce document to public servant by person legally bound to produce it — Whoever, being legally bound to produce or deliver up any document (or electronic record) of any public servant, as such, intentionally omits so to produce or deliver up the same, shall be punished with simple imprisonment for a term which may extend to one month, or with fine which may extend to five hundred rupees, or with both, or, if the document (or electronic record) is to be produced or delivered up to a Court of Justice, with simple imprisonment for a term which may extend to six months, or with fine which may extend to one thousand rupees, or with both. Illustration A, being legally bound to produce a document before a District Court, intentionally omits to produce the same. A has committed the offence defined in this section. CLASSIFICATION OF OFFENCE Para I: Punishment—Simple imprisonment for 1 month, or fine of 500 rupees, or both—Non-cognizable—Bailable—Triable by the Court in which the offence is committed, subject to the provisions of Chapter XXVI or, if not committed in a Court, any Magistrate—Non-compoundable. Para II: Punishment—Simple imprisonment for 6 months, or fine of 1,000 rupees, or both—Non-cognizable—Bailable—Triable by the Court in which the offence is committed, subject to the provisions of Chapter XXVI; or, if not committed in a Court, any Magistrate—Non-compoundable. Arun Verma (c) 27
  • 28. Section 192. Fabricating false evidence — Whoever causes any circumstance to exist or makes any false entry in any book or record, or makes any document (or electronic record) containing a false statement, intending that such circumstance, false entry or false statement may appear in evidence in a judicial proceeding, or in a proceeding taken by law before a public servant as such, or before an arbitrator, and that such circumstance, false entry or false statement, so appearing in evidence, may cause any person who in such proceeding is to form an opinion upon the evidence, to entertain an erroneous opinion touching any point material to the result of such proceeding, is said "to fabricate false evidence". Illustrations (a) A, puts jewels into a box belonging to Z, with the intention that they may be found in that box, and that this circumstance may cause Z to be convicted of theft. A has fabricated false evidence. (b) A makes a false entry in his shop-book for the purpose of using it as corroborative evidence in a Court of Justice. A has fabricated false evidence. (c) A, with the intention of causing Z to be convicted of a criminal conspiracy, writes a letter in imitation of Z’s handwriting, purporting to be addressed to an accomplice in such criminal conspiracy, and puts the letter in a place which he knows that the officers of the Police are likely to search. A has fabricated false evidence. Arun Verma (c) 28
  • 29. Section 204. Destruction of document to prevent its production as evidence - Whoever secretes or destroys any document (or electronic record) which he may be lawfully compelled to produce as evidence in a Court of Justice, or in any proceeding lawfully held before a public servant, as such, or obligates or renders illegible the whole or any part of such document (or electronic record) with the intention of prevention the same from being produced or used as evidence before such Court or public servant as aforesaid, or after he shall have been lawfully summoned or required to produce the same for that purpose, shall be punished with imprisonment of either description for a term which may extend to two years, or with fine, or with both. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 2 years, or fine, or both—Non-cognizable— Bailable—Triable by Magistrate of the first class—Non-compoundable. Section 463. Forgery- Whoever makes any false documents or false electronic record part of a document or electronic record with intent to cause damage or injury, to the public or to any person, or to support any claim or title, or to cause any person to part with property, or to enter into any express or implied contract, or with intent to commit fraud or that fraud may be committed, commits forgery. Arun Verma (c) 29
  • 30. Section 464. Making a false document — A person is said to make a false document or false electronic record— First — Who dishonestly or fraudulently makes, (a)Makes, signs, seals or execute a document or part of a document; (b)Makes or transmits any electronic record or part of any electronic record; (c)Affixes any digital signature on any electronic record; (d)Makes any work denoting the execution of a document of a document or the authenticity of the digital signature, (e)With the intention of causing it be believed that such document or a part of document, electronic record or digital signature was made, signed, sealed, executed, transmitted or affixed by or by the authority of a person by whom or by whose authority he knows that it was not made, signed, sealed, executed or affixed; or Arun Verma (c) 30
  • 31. Secondly – Who, without lawful authority, dishonestly or fraudulently, by cancellation or otherwise, alters a document or an electronic record in any material part thereof, after it has been made, executed or affixed with digital signature either by himself or by any other person, whether such person be living or dead at the time of such alteration; Thirdly — Who dishonestly or fraudulently causes any person to sign, seal, execute or alter a document, or an electronic record or to affix his digital signature on any electronic record knowing that such person by reason of unsoundness of mind or intoxication cannot, or that by reason of deception practised upon him, he does not know the contents of the document or the nature of the alteration. Illustrations (a) A has a letter of credit upon B for rupees 10,000 written by Z. A, in order to defraud B, adds a cipher to the 10,000, and makes the sum 1,00,000 intending that it may be delivered by B that Z so wrote the letter. A has committed forgery. Arun Verma (c) 31
  • 32. (b) A, without Z’s authority, affixes Z’s seal to a document purporting to be a conveyance of an estate from Z to A, with the intention to selling the estate to B, and thereby of obtaining from B the purchase-money. A has committed forgery. (c) A picks up a cheque on a banker-signed by B, payable to bearer, but without any sum having been inserted in the cheque. A fraudulently fills up the cheque by inserting the sum of ten thousand rupees. A commits forgery. (d) A leaves with B, his agent, a cheque on a banker, signed by A, without inserting the sum payable and authorizes B to fill up the cheque by inserting a sum not exceeding ten thousand rupees for the purpose of making certain payment. B fraudulently fills up the cheque by inserting the sum of twenty thousand rupees. B commits forgery. (e) A draws a bill of exchange on himself in the name of B without B’s authority, intending to discount it as a genuine bill with a banker and intending to take up the bill on its maturity. Here, as A draws the bill with intent to deceive the banker by leading him to suppose that he had the security of B, and thereby to discount the bill, A is guilty of forgery. (f) Z’s will contains the these words—"I direct that all my remaining property be equally divided between A, B and C." A dishonestly scratches out B’s name, intending that it may be believed that the whole was left to himself and C. A has committed forgery. Arun Verma (c) 32
  • 33. (g) A endorses a Government promissory note and makes it payable to Z or his order by writing on the bill the words "Pay to Z or his order" and signing the endorsement. B dishonestly erases the words "Pay to Z or his order", and thereby converts the special endorsement into a blank endorsement. B commits forgery. (h) A sells and conveys an estate to Z. A afterwards, in order to defraud Z of his estate, executes a conveyance of the same estate to B, dated six months earlier than the date of the conveyance to Z, intending it to be believed that he had conveyed the estate to B before he conveyed it to Z. A has committed forgery. (i) Z dictates his will to A. A intentionally writes down a different legatee from the legatee named by Z, and by representing to Z that he has prepared the will according to his instructions, induces Z to sign the will. A has committed forgery. (j) A writes a letter and signs it with B’s name without B’s authority, certifying that A is a man of good character and in distressed circumstances from unforeseen misfortune, intending by means of such letter to obtain alms from Z and other persons. Here, as A made a false document in order to induce Z to part with property. A has committed forgery. Arun Verma (c) 33
  • 34. (k) A without B’s authority writes a letter and signs it in B’s name certifying to A’s character, intending thereby to obtain employment under Z. A has committed forgery in as much as he intended to deceive Z by the forged certificate, and thereby to induce Z to enter into an express or implied contract for service. Explanation 1 —A man’s signature of his own name may amount to forgery. Illustrations (a) A signs his own name to a bill of exchange, intending that it may be believed that the bill was drawn by another person of the same name. A has committed forgery. (b) A writes the word "accepted" on a piece of paper and signs it with Z’s name, in order that B may afterwards write on the paper a bill of exchange drawn by B upon Z, and negotiate the bill as though it had been accepted by Z. A is guilty of forgery; and if B, knowing the fact, draws the bill upon the paper pursuant to A’s intention, B is also guilty of forgery. (c) A picks up a bill of exchange payable to the order of a different person of the same name. A endorses the bill in his own name, intending to cause it to be believed that it was endorsed by the person whose order it was payable; here A has committed forgery. Arun Verma (c) 34
  • 35. (d) A purchases an estate sold under execution of a decree against B. B, after the seizure of the estate, in collusion with Z, executes a lease of the estate of Z at a nominal rent and for a long period and dates the lease six months prior to the seizure, with intent to defraud A, and to cause it to be believed that the lease was granted before the seizure. B, though he executes the lease in his own name, commits forgery by antedating it. (e) A, a trader, in anticipation of insolvency, lodges effects with B for A’s benefit, and with intent to defraud his creditors; and in order to give a colour to the transaction, writes a promissory note binding himself to pay to B a sum for value received, and antedates the note, intending that it may be believed to have been made before. A was on the point of insolvency. A has committed forgery under the first head of the definition. Explanation 2— The making of a false document in the name of a fictitious person, intending it to be believed that the document was made by a real person, or in the name of a deceased person, intending it to be believed that the document was made by the person in his lifetime, may amount to forgery. Illustration A draws a bill of exchange upon a fictitious person, and fraudulently accepts the bill in the name of such fictitious person with intent to negotiate it. A commits forgery. Arun Verma (c) 35
  • 36. Section 466. Forgery of record of court or of public register, etc.— Whoever forges a document, (or an electronic record), purporting to be a record or proceeding of or in a Court of Justice, or a register of birth, baptism, marriage or burial, or a register kept by a public servant as such, or a certificate or document purporting to be made by a public servant in his official capacity, or an authority to institute or defend a suit, or to take any proceedings therein, or to confess judgment, or a power of attorney, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 7 years and fine—Non-cognizable— Nonbailable—Triable by Magistrate of the first class—Non- compoundable. Section 468. Forgery for purpose of cheating — Whoever commits forgery, intending that the document (or an electronic record), forged shall be used for the purpose of cheating, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 7 years and fine—Cognizable—Non- bailable-Triable by Magistrate of the first class—Non-compoundable. Arun Verma (c) 36
  • 37. Section 469. Forgery for purpose of harming reputation — Whoever commits forgery, intending that the document (or an electronic record), forged shall harm the reputation of any party, or knowing that it is likely to be used for that purpose, shall be punished with imprisonment of either description for a term which may extend to three years, and shall also be liable to fine. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 3 years and fine—Cognizable—Bailable— Triable by Magistrate of the first class—Non-compoundable. Section 470. Forged document (or an electronic record), —A false document made wholly or in part by forgery is designated "a forged document". Section 471. Using as genuine a forged document (or an electronic record), —Whoever fraudulently or dishonestly uses as genuine any document which he knows or has reason to believe to be a forged document (or an electronic record), shall be punished in the same manner as if he had forged such document. CLASSIFICATION OF OFFENCE Punishment—Punishment for forgery of such document—Cognizable— Bailable—Triable by Magistrate of the first class—Non-compoundable. Arun Verma (c) 37
  • 38. Section 474. Having possession of document described in section 466 or 467, knowing it to be forged and intending to use it as genuine — Whoever has in his possession any document (or an electronic record), knowing the same to be forged, and intending that the same shall fraudulently or dishonestly be used as genuine, shall, if the document (or an electronic record), is one of the description mentioned in section 466 of this Code, be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine; and if the document is one of the description mentioned in section 467, shall be punished with imprisonment for life, or with imprisonment of either description, for a term which may extend to seven years, and shall also be liable to fine. CLASSIFICATION OF OFFENCE Para I: Punishment—Imprisonment for 7 years and fine— Cognizable—Bailable—Triable by Magistrate of the first class—Non- compoundable. Para II: Punishment—Imprisonment for life, or imprisonment for 7 years and fine—Non-cognizable—Bailable—Triable by Magistrate of the first class—Noncompoundable. Arun Verma (c) 38
  • 39. Section 476. Counterfeiting device or mark used for authenticating documents other than those described in section 467, or possessing counterfeit marked material — Whoever counterfeits upon, or in the substance of, any material, any device or mark used for the purpose of authenticating any document (or an electronic record), other than the documents described in section 467 of this Code, intending that such device or mark shall be used for the purpose of giving the appearance of authenticity to any document then forged or thereafter to be forged on such material, or who, with such intent, has in his possession any material upon or in the substance of which any such device or mark has been counterfeited, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 7 years and fine—Non- cognizable—Nonbailable—Triable by Magistrate of the first class—Non-compoundable. Arun Verma (c) 39
  • 40. Section 477A. Falsification of accounts —Whoever, being a clerk, officer or servant, or employed or acting in the capacity of a clerk, officer or servant, wilfully, and with intent to defraud, destroys, alters, mutilates or falsifies any book, (or an electronic record), paper, writing, valuable security or account which belongs to or is in the possession of his employer, or has been received by him for or on behalf of his employer, or wilfully, and with intent to defraud, makes or abets the making of any false entry in, or omits or alters or abets the omission or alteration of any material particular from or in, any such book, (or an electronic record), paper, writing, valuable security or account, shall be punished with imprisonment of either description for a term which may extend to seven years, or with fine, or with both. Explanation—It shall be sufficient in any charge under this section to allege a general intent to defraud without naming any particular person intended to be defrauded or specifying any particular sum of money intended to be the subject of the fraud, or any particular day on which the offence was committed. CLASSIFICATION OF OFFENCE Punishment—Imprisonment for 7 years, or fine, or both—Non- cognizable—Bailable—Triable by Magistrate of the first class—Non- compoundable. Arun Verma (c) 40
  • 41. CYBERCRIME AND INDIAN EVIDENCE ACT Section 3. Interpretation clause —In this Act following words and expressions are used in the following senses, unless a contrary intention appears from the context:— “Evidence”—”Evidence” means and includes— (1) all statements which the Court permits or requires to made before it by witnesses, in relation to matters of fact under inquiry; such statements are called oral evidence; (2) [1][all documents including electronic records produced for the inspection of the Court]; such documents are called documentary evidence; “Proved”—A fact is said to be proved when, after considering the matters before it, the Court either believes its to exist, or considers its existence so probable that a prudent man ought, under the circumstances of the particular case, to act upon the supposition that it exists. “Disproved”—A fact is said to be disproved when, after considering the matters before it, the Court either believes that it does not exist, or considers its non- existence so probable that a prudent man ought, under the circumstances of the particular case, to act upon the supposition that it does not exist. “Not proved”—A fact is said not to be proved when it is neither proved nor disproved. Arun Verma (c) 41
  • 42. • [2][The expression “Certifying Authority”, “digital signature”, “Digital Signature Certificate”, “electronic form”, “electronic records”, “information”, “secure electronic record”, “secure digital signature” and “subscriber” shall have the meanings respectively assigned to them in the Information Technology Act, 2000]. • 2(g) “Certifying Authority” (I T Act 2000)— means a person who has been granted a license to issue a Digital Signature Certificate under section 24; • 2(p) “digital signature” (I T Act 2000)— means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3; • 2(q) “Digital Signature Certificate” (I T Act 2000)— means a digital Signature Certificate issued under subsection (4) of section 35; • 2(r) “electronic form”, (I T Act 2000)— with reference to information, means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device; Arun Verma (c) 42
  • 43. • 2(t) “electronic record” (I T Act 2000)— means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche; • 2(v) “information” (I T Act 2000)— includes data, text, images, sound, voice, codes, computer programmes software and databases or microfilm or computer generated micro fiche; • 2(zg) “subscriber” (I T Act 2000)— means a person in whose name the Digital Signature Certificate is issued; • Section 14. Secure electronic record. (I T Act 2000)— Where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification. • Section 15. Secure digital signature. (I T Act 2000)— If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was— (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would invalidated, then such digital signature shall be deemed to be a secure digital signature. Arun Verma (c) 43
  • 44. • Section 17. Admission defined —An admission is a statement, [3][oral or documentary or contained in electronic form], which suggests any inference as to any fact in issue or relevant fact, and which is made by any of the persons, and under the circumstances, hereinafter mentioned. • Section 22A. When oral admission as to contents of electronic records are relevant. —Oral admissions as to the contents of electronic records are not relevant, unless the genuineness of the electronic record produced is in question] • Section 34. [Entries in books of account including those maintained in an electronic form] when relevant —1[Entries in books of account including those maintained in an electronic form], regularly kept in the course of business, are relevant whenever they refer to a matter into which the Court has to inquire but such statements shall not alone be sufficient evidence to charge any person with liability. • Illustration • A sues B for Rs. 1,000 and shows entries in his account-books showing B to be indebted to him to this amount. The entries are relevant, but are not sufficient, without other evidence, to prove the debt. Arun Verma (c) 44
  • 45. • Section 35. Relevancy of entry in public record made in performance of duty —An entry in any public or other official book, register, 1[record or an electronic record], stating a fact in issue or relevant fact, and made by a public servant in the discharge of his official duty, or by any other person in performance of a duty specially enjoined by the law of the country in which such book register, or 1[record or an electronic record] is kept, is itself a relevant fact. • Section 39. What evidence to be given when statement forms part of a conversation, document, electronic record], book or series of letters or papers —When any statement of which evidence is given forms part of a longer statement, or of a conversation or part of an isolated document, or is contained in a document which forms part of a book, or is contained in part of electronic record or of a connected series of letters or papers, evidence shall be given of so much and no more of the statement, conversation, document, book, electronic record, or series of letters or papers as the Court considers necessary in that particular case to the full understanding of the nature and effect of the statement, and of the circumstances under which it was made]. Arun Verma (c) 45
  • 46. • Section 47A . Opinion as to digital signature when relevant —When the court has to form an opinion as to the digital signature of any person, the opinion of the Certifying Authority which has issued the Digital Signature Certificate is a relevant fact.] • Section 59. Proof of facts by oral evidence —All facts, except the [contents of documents or electronic records], may be proved by oral evidence. • Section 65A. Special provisions as to evidence relating to electronic record.— The contents of electronic records may be proved in accordance with the provisions of Section 65B. • Section 65B. Admissibility of electronic records .— (1) Notwithstanding anything contained in this Act, any information contained in an electronic record which is printed on a paper, stored, recorded or copied in optical or magnetic media produced by a computer (hereinafter referred to as the computer output) shall be deemed to be also a document, if the conditions mentioned in this section are satisfied in relation to the information and computer in question and shall be admissible in any proceedings, without further proof or production of the original, as evidence of any contents of the original or of any fact stated therein of which direct evidence would be admissible. Arun Verma (c) 46
  • 47. • (2) The conditions referred to in sub-section (1) in respect of a computer output shall be the following, namely:— • (a) the computer output containing the information was produced by the computer during the period over which the computer was used regularly to store or process information for the purposes of any activities regularly carried on over that period by the person having lawful control over the use of the computer; • (b) during the said period, information of the kind contained in the electronic record or of the kind from which the information so contained is derived was regularly fed into the computer in the ordinary course of the said activities; • (c) throughout the material part of the said period, the computer was operating properly or, if not, then in respect of any period in which it was not operating properly or was out of operation during that part of the period, was not such as to affect the electronic record or the accuracy of its contents; and • (d) the information contained in the electronic record reproduces or is derived from such information fed into the computer in the ordinary course of the said activities. Arun Verma (c) 47
  • 48. (3) Where over any period, the function of storing or processing information for the purposes of any activities regularly carried on over that period as mentioned in clause (a) of sub-section (2) was regularly performed by computers, whether— • (a) by a combination of computers operating over that period; or • (b) by different computers operating in succession over that period; or • (c) by different combinations of computers operating in succession over that period; or • (d) in any other manner involving the successive operation over that period, in whatever order, of one or more computers and one or more combinations of computers, all the computers used for that purpose during that period shall be treated for the purposes of this section as constituting a single computer; and references in this section to a computer shall be construed accordingly. (4) In any proceedings where it is desired to give a statement in evidence by virtue of this section, a certificate doing any of the following things, that is to say— • (a) identifying the electronic record containing the statement and describing the manner in which it was produced; • (b) giving such particulars of any device involved in the production of that electronic record as may be appropriate for the purpose of showing that the electronic record was produced by a computer; • (c) dealing with any of the matters to which the conditions mentioned in sub-section (2) relate, and purporting to be signed by a person occupying a responsible official position in relation to the operation of the relevant device or the management of the relevant activities (whichever is appropriate) shall be evidence of any matter stated in the certificate; and for the purposes of this sub-section it shall be sufficient for a matter to be stated to the best of the knowledge and belief of the person stating it. Arun Verma (c) 48
  • 49. (5) For the purposes of this section,— • (a) information shall be taken to be supplied to a computer if it is supplied thereto in any appropriate form and whether it is so supplied directly or (with or without human intervention) by means of any appropriate equipment; • (b) whether in the course of activities carried on by any official, information is supplied with a view to its being stored or processed for the purposes of those activities by a computer operated otherwise than in the course of those activities, that information, if duly supplied to that computer, shall be taken to be supplied to it in the course of those activities; • (c) a computer output shall be taken to have been produced by a computer whether it was produced by it directly or (with or without human intervention) by means of any appropriate equipment. Explanation—For the purposes of this section any reference to information being derived from other information shall be a reference to its being derived there from by calculation, comparison or any other process.] Arun Verma (c) 49
  • 50. Section 67A. Proof as to digital signature.— Except in the case of a secure digital signature, if the digital signature of any subscriber is alleged to have been affixed to an electronic record the fact that such digital signature is the digital signature of the subscriber must be proved. Section 73A. Proof as to verification of digital signature.—In order to ascertain whether a digital signature is that of the person by whom it purports to have been affixed, the Court may direct— (a) that person or the Controller or the Certifying Authority to produce the Digital Signature Certificate; (b) any other person to apply the public key listed in the Digital Signature Certificate and verify the digital signature purported to have been affixed by that person.”. Explanation—For the purposes of this section, “Controller” means the Controller appointed under subsection (1) of Section 17 of the Information Technology Act, 2000.] Section 81A. Presumption as to Gazettes in electronic forms —The Court shall presume the genuineness of every electronic record purporting to be the Official Gazette, or purporting to be electronic record directed by any law to be kept by any person, if such electronic record is kept substantially in the form required by law and is produced from proper custody. Explanation.—Electronic records are said to be in proper custody if they are in the place in which, and under the care of the person with whom, they naturally be; but no custody is improper if it is proved to have had a legitimate origin, or the circumstances of the particular case are such as to render such an origin probable.] Arun Verma (c) 50
  • 51. • Section 85A. Presumption as to electronic agreements —The Court shall presume that every electronic record purporting to be an agreement containing the digital signatures of the parties was so concluded by affixing the digital signature of the parties. • Section 85B. Presumption as to electronic records and digital signatures —(1) In any proceedings involving a secure electronic record, the Court shall presume unless contrary is proved, that the secure electronic record has not been altered since the specific point of time to which the secure status relates. • (2) In any proceedings, involving secure digital signature, the Court shall presume unless the contrary is proved that— • (a) the secure digital signature is affixed by subscriber with the intention of singing or approving the electronic record; • (b) except in the case of a secure electronic record or a secure digital signature, nothing in this section shall create any presumption relating to authenticity and integrity of the electronic record or any digital signature. • Section 85C. Presumption as to Digital Signature Certificates.— The Court shall presume, unless contrary is proved, that the information listed in a Digital Signature Certificate is correct, except for information specified as subscriber information which has not been verified, if the certificate was accepted by the subscriber.] Arun Verma (c) 51
  • 52. • Section 88A. Presumption as to electronic messages— The Court may presume that an electronic message forwarded by the originator through an electronic mail server to the addressee to whom the message purports to be addressed corresponds with the message as fed into his computer for transmission; but the Court shall not make any presumption as to the person by whom such message was sent. • Explanation—For the purposes of this section, the expressions “addressee” and “originator” shall have the same meanings respectively assigned to them in clauses (b) and (za) of sub-section (1) of section 2 of the Information Technology Act, 2000. • Section 90A. Presumption as to electronic records five years old— Where any electronic record, purporting or proved to be five years old, is produced from any custody which the Court in the particular case considers proper, the Court may presume that the digital signature which purports to be the digital signature of any particular person was so affixed by him or any person authorised by him in this behalf. • Explanation.—Electronic records are said to be in proper custody if they are in the place in which, and under the care of the person with whom, they naturally be; but no custody is improper if it is proved to have had a legitimate origin, or the circumstances of the particular case are such as to render such an origin probable.] Arun Verma (c) 52
  • 53. • Section 131. Production of documents or electronic records which another person, having possession, could refuse to produce— No one shall be compelled to produce documents in his possession or electronic records under his control, which any other person would be entitled to refuse to produce if they were in his possession or control, unless such last-mentioned person consents to their production.] Arun Verma (c) 53