SlideShare uma empresa Scribd logo
1 de 32
Identify the relevant legal issues and challenges that arise in the allotted topic and devise
original analysis and/or solutions for the same
Impact Of Cyber Warfare On Privacy,
Identity Theft
What is Cyber Ware Fare
Cyber warfare can be described as - actions by a nation or international organization to
attack countries or institutions' computer network systems with the intention of
disrupting, damaging, or destroying infrastructure by computer viruses or denial-of-service
attacks.
Cyber warfare is also usually defined as a cyber attack or series of attacks that target a
country. It has the potential to wreak havoc on government and civilian infrastructure and
disrupt critical systems, resulting in damage to the state and even loss of life.
Protection of Privacy
Privacy is one of the most important aspects which need to be protected from Cyber
attacks.
There are three international treaties that are widely recognized as the basis for the
protection of Privacy.
1. Article -12 of the Universal Declaration of Human Rights, 1948,
2. Article -17 of the International Covenant on Civil and Political Rights (ICCPR).
3. Article-8 of the European Convention for the Protection of Human Rights and
Fundamental Freedoms, (ECHR). The Organization for Economic Development &
Cooperation (OECD),
Importance of Privacy
Guidelines for the (Protection of privacy and Trans Border of Data) also has equal relevance
as it protects the right to privacy among its members. The Preamble of the Australian
Privacy Charter also provides that
People have the Right to Privacy of their own body, Private Space, Privacy of
Communication, Information Privacy Rights Concerning Information about a Person and
Freedom Surveillance
The holy book of Quran also contains a 'verse'-(24:27)
“Believers Enter not houses other than your own houses, until you have obtained the
permission of the inmates of houses and have the greeted term with peace.
This is better for you, it is expected that you will observe this.
Why is Protection of Privacy needed?
Today we are depended extensively and excessively on our computer / Mobiles electronic
devices, as a tool for gathering information, sharing and retention of data. We also depend
on the use of internet as a medium for data transfer.
There are various invaders who indulge in the act of stealing the information, as shared
through online by the user, either by use of malicious spyware, or by various computer
bugs, or the data as collected from the website which is stored in the cookies folder of the
computer.
The information that the user shares in the social networking profile i.e. Linkedin, Twitter,
Facebook, Instagram, etc. are very prone to be accessed by any intruder and are easily
manipulated and misused causing privacy intrusion issues to the concerned social media
user. Threats also like email attachment containing malware that discloses personal
information of the recipient of the mail to the sender or any intruder.
Children, who use the internet, are also easy prey of the intruders because all the
information fed by a child can be easily tracked by cybercriminals.
Misuse of Private data
Today companies are hiring third parties to collect information about the peoples who are
using the internet and social sites, to pile up their data records, about such peoples and
their vital information, so that they can use the same for advertisement purpose or for
selling it to some other companies. Viz, Zomato, Banks, Automobile companies
The protection of privacy and data of the peoples using the internet is the major issue
nowadays, many countries have passed many laws to protect the privacy of their people.
Statistical analysis of Fear among user
regarding Privacy
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Credit Card Password ID Personal Email Brower History
71%
67%
54%
52%
41%
26%
30%
40%
46%
56%
Chart Title
Afraid Not Afraid
Lack Of Special Law On Privacy In India
Since a long period of time, India did not have any special law dealing with cyber crimes
and cyber privacy issues, jurisdiction issues, and intellectual property rights issues, and a
number of other issues. It was the only around the year 2000, that the The Indian
Legislature enacted the Information Technology Act, 2000 to deal with cyber crimes and
cybercriminals. IT Act lays down penalty and punishment provisions for violation of certain
laws which amounts as an offense.
The act was later on amended again in the year 2008 and now known as the Information
Technology Amendment Act 2008. The Act contains a number of provisions which protects
the privacy of a person from online intrusion and exploitation.
The Act provides both a fine and punishment by imprisonment in case of
1. Hacking (Section 43, 66),
2. Three years imprisonment for violation of privacy(section 66E),
3. Identity theft(Section-66 C) and
4. Cheating by personation (Section 66 D),
5. Offensive email (Section 66A).
Various Legal Provisions relating to the IT ACT
• Section 72A of the IT Act penalizes the unauthorized disclosure of personal
information by any person who has obtained such information under a lawful contract
and without consent of the person from whom such information belonged or taken.
Apart from this the IT Act also provides provision for data safety.
• Section 43A of the Information Technology Amendment Act 2008, lays down that all corporate
bodies and intermediaries who possess, handle or collect any sensitive personal data shall
maintain reasonable security practices and in case of failure they shall be liable to the person
who is aggrieved by such misuse of data.
The government had notified the Information Technology (Reasonable Security Practices
and Procedures and Sensitive Personal Data or Information) Rules, 2011.
The Rules dealt with protection of Sensitive personal data or information of a person,
which includes such personal information which consists of information relating to:
1. Passwords
2. Financial information such as bank account or credit card or debit card or other
payment instrument details.
3. Physical, physiological and mental health condition
4. Sexual orientation
5. Medical records and history
6. Biometric information.
Parliamentary Report on Cyber Security & Right to Privacy Issued by the 2013 -2014
Standing Committee on Information Technology on February 12th 2014.
The Standing Committee stated that a significant increase in cyberspace activities and
access to internet use in India coupled with lack of user end discipline, inadequate
protection of computer systems, and the possibility of anonymous use of ICT allowing
users to impersonate and cover their trends of crime has emboldened more number of
users experimenting with ICT abuse for criminal activities.
The Committee is of the opinion that this aspect has a significant impact in blunting the
deterrence effect created by the legal framework in the form of the Information
Technology Act, 2000, and allied laws.
Personal Data Protection Bill 2019
The Government of India, therefore in 2019, constituted a committee to propose a draft statue
on data protection. The committee proposed draft law and the govt. of India has issued
the Personal Data protection Bill 2019 (PDP) Bill based on the draft proposed by the
committee. This will be India first law on the protection of data and it will repeal section-43A
of the IT Act.
The PDP Bill, proposes a broader reach. It will not only apply to persons in India but also to
persons outside India in relation to business carried out in India. The PDP Bill, proposes to
apply both on manual and electronic records. The PDP bill proposes creating a Data Protection
Authority in India. The Authority will be responsible for protecting the interest of data
principals, preventing misuse of personal data and ensuring compliance within the new law.
The PDP Bill proposes to protect Personal Data relating to the identity, characteristics trait,
attribute of a natural person and Sensitive Personal Data such as financial data, health data,
official identifier, sex life, sexual orientation, biometric data, genetic data, transgender status,
intersex status, caste or tribe, religious or political beliefs.
Pursuant to the PDPB being enacted into an Act, there are several compliances to be
followed by organizations processing personal data in order to ensure the protection of
privacy of individuals relating to their Personal Data. Consent of the individual would be
required for the processing of personal data.
Based on the type of personal data being processed, organizations will have to review and
update data protection policies, codes to ensure these are consistent with the revised
principles such as update their internal breach notification procedures, implement
appropriate technical and organizational measures to prevent misuse of data, Data
Protection Officer to be appointed by the Significant Data Fiduciary, and instituting grievance
redressal mechanisms to address complaints by individuals.
The government decided that they would need to implement new rules which would
"empower the ordinary users of social media" and their enactment had become necessary
due to widespread concerns about issues relating to increased instances of abuse of social
media and digital platforms.
Landmark Judgement
•Justice K.S Puttaswamy (Retd.) Versus Union
of India (Case NO- WP (C) 494/2012 ), the
Hon'ble Supreme Court through its 9 Judge
Bench held that the fundamental right to
privacy is guaranteed under the Constitution
of India.
The need of the hour was to bring forward a special law to deal with the privacy-
related issue, at par with the international standards and as like most of the other
developed nations have already enacted. The recently enacted Information Technology
(Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 ("IT Rules, 2021")
was aimed at doing exactly the same.
The IT Rules, 2021, inter alia, aim to serve a dual-purpose: (1) increasing the
accountability of the social media platforms (such as Facebook, Instagram, Twitter
etc.); and (2) empowering the users of social media by establishing a three-tier
redressal mechanism for efficient grievance resolution.
The New IT Rules 2021 have faced severe restrictions from various digital media
platforms. Compliance with the provisions of the IT Rules, 2021 is being questioned by
digital media platforms as an attempt to restrict the freedom of speech and expression
and various petitions have been filed across India challenging the legal validity of the IT
Rules, 2021.
• Agij Promotion of Nineteenonea Media Pvt. Ltd. & Ors., vs. Union of India [W.P. (L.) No.
14172 of 2021], the IT Rules, 2021 were challenged on the ground that the IT Rules,
2021 are "ex facie draconian, arbitrary and patently ultra vires" the provisions of the
Information Technology Act, 2000 ("IT Act") and the provisions of Articles 14, 19(1)(a)
and 19(1)(g) of the Indian Constitution, which guarantees fundamental rights to the
petitioners.
• The public interest litigation was moved by the Carnatic musician TM Krishna and a
second petition was filed by the Digital News Publishers Association (DNPA), comprising
of thirteen media outlets, as well as journalist Mukund Padmanabhan4 wherein the
petitioners contended that the IT Rules, 2021 are ultra vires, inter alia, to Articles 14
and 19 of the Constitution of India.
Judgement against the 2021 Act
Though the idea pertaining to the protection of data is very old but due to the immerging
trend of technological dependence and use of personal data is manifold, hence this new
trend needs a new law to deal within tracking and controlling the techno-savvy peoples
and organizations by providing guidelines to prevent misuse of personal data.
Peoples using online medium for sharing data or transferring information while doing e-
commerce transaction or any other communication purpose treasure their privacy and link
it to personal freedom and so have a right to control data about them. It is further required
that every e-organization privacy practices should be bench marked against national and
international standards for privacy and fair information practices to meet the emerging
challenges.
Although customer's easily share their personal data while doing online transactions or by
interchanging communications but still it is the state's responsibility to look and protect the
interest of its citizens. As because due to lack of specific statutory law dealing with the
protection of data in India, the courts measurably fails to protect the information as shared to
the companies by punishing them for violation of trust.
Hence, it is highly required and need of the hour, that the Protection of Personal Data Bill 2019
which is pending in the parliament for approval and ascent of the president be immediately
passed and approved so as to protect the personal data of the citizens from being misused.
The Personal Data Protection Bill, first proposed by the government in 2018, has been pending
for close to three years now. It has seen several changes to the original draft drawn by retired
Supreme Court judge Justice B N Srikrishna, who also said that the revised Bill was “a blank
cheque to the state”
Conclusion
Today there is no control or check on who sells the data to whom the Rules only deals with
protection of Sensitive personal data or information of a person, which includes such
personal information which consists of information relating to:
• Passwords;
• Financial information such as bank account or credit card or debit card or other payment
instrument details;
• Physical, physiological and mental health condition;
• Sexual orientation;
• Medical records and history;
• Biometric information.
No technology or standard can eliminate the risk of a cyberattack, but Companies and
individuals must the adoption of modern standards that incorporate MFA (Multi Factor
Authntication) can be an important step that meaningfully reduces cyber risk. By following
these eight principles, governments can create a policy foundation for MFA that not only
enhances our collective cyber security, but also helps to ensure greater privacy and
increased trust online.
Some pointers which can be followed by companies and individuals to avoid cyber attacks on
privacy and to prevent Identity Theft
1.Have a plan that explicitly addresses authentication.
2.Recognize the security limitations of shared secrets.
3.Ensure authentication solutions support mobile.
4.Don’t prescribe any single technology or solution — focus on standards and outcomes.
5.Encourage widespread adoption by choosing authentication solutions that are easy to use.
6.Understand that the old barriers to strong authentication no longer apply.
7.Know that privacy matters.
8.Use biometrics appropriately.
As individuals grow more dependent on and connected to the cyberspace, they will
become more reliant on organizations' effective implementation of cyber security and
sensitivity to privacy. The following are some of the key areas in which an increased
emphasis on privacy protection could help support, advance and augment cyber security
activities.
a) Building privacy values into cyber security policy directions
b) Legislative approaches that incentivize cyber security preparedness
c) Facilitating broader dialogue on cyber security that acknowledges its importance for
privacy, trust, and responsible data stewardship
Cie 2  cyber law

Mais conteúdo relacionado

Mais procurados

CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
6204399 privacy on the internet
6204399 privacy on the internet6204399 privacy on the internet
6204399 privacy on the internetChiran27
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Kristen_T
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 

Mais procurados (19)

Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
 
6204399 privacy on the internet
6204399 privacy on the internet6204399 privacy on the internet
6204399 privacy on the internet
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?
 
Social– isms
Social– ismsSocial– isms
Social– isms
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 

Semelhante a Cie 2 cyber law

An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesGiannisBasa
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.Diganth Raj Sehgal
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...ijtsrd
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protectionijtsrd
 

Semelhante a Cie 2 cyber law (20)

An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
 

Último

Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 

Último (20)

Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 

Cie 2 cyber law

  • 1. Identify the relevant legal issues and challenges that arise in the allotted topic and devise original analysis and/or solutions for the same Impact Of Cyber Warfare On Privacy, Identity Theft
  • 2. What is Cyber Ware Fare Cyber warfare can be described as - actions by a nation or international organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial-of-service attacks. Cyber warfare is also usually defined as a cyber attack or series of attacks that target a country. It has the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the state and even loss of life.
  • 3.
  • 5. Privacy is one of the most important aspects which need to be protected from Cyber attacks. There are three international treaties that are widely recognized as the basis for the protection of Privacy. 1. Article -12 of the Universal Declaration of Human Rights, 1948, 2. Article -17 of the International Covenant on Civil and Political Rights (ICCPR). 3. Article-8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms, (ECHR). The Organization for Economic Development & Cooperation (OECD),
  • 7. Guidelines for the (Protection of privacy and Trans Border of Data) also has equal relevance as it protects the right to privacy among its members. The Preamble of the Australian Privacy Charter also provides that People have the Right to Privacy of their own body, Private Space, Privacy of Communication, Information Privacy Rights Concerning Information about a Person and Freedom Surveillance The holy book of Quran also contains a 'verse'-(24:27) “Believers Enter not houses other than your own houses, until you have obtained the permission of the inmates of houses and have the greeted term with peace. This is better for you, it is expected that you will observe this.
  • 8. Why is Protection of Privacy needed?
  • 9. Today we are depended extensively and excessively on our computer / Mobiles electronic devices, as a tool for gathering information, sharing and retention of data. We also depend on the use of internet as a medium for data transfer. There are various invaders who indulge in the act of stealing the information, as shared through online by the user, either by use of malicious spyware, or by various computer bugs, or the data as collected from the website which is stored in the cookies folder of the computer. The information that the user shares in the social networking profile i.e. Linkedin, Twitter, Facebook, Instagram, etc. are very prone to be accessed by any intruder and are easily manipulated and misused causing privacy intrusion issues to the concerned social media user. Threats also like email attachment containing malware that discloses personal information of the recipient of the mail to the sender or any intruder. Children, who use the internet, are also easy prey of the intruders because all the information fed by a child can be easily tracked by cybercriminals.
  • 11. Today companies are hiring third parties to collect information about the peoples who are using the internet and social sites, to pile up their data records, about such peoples and their vital information, so that they can use the same for advertisement purpose or for selling it to some other companies. Viz, Zomato, Banks, Automobile companies The protection of privacy and data of the peoples using the internet is the major issue nowadays, many countries have passed many laws to protect the privacy of their people.
  • 12. Statistical analysis of Fear among user regarding Privacy
  • 13. 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Credit Card Password ID Personal Email Brower History 71% 67% 54% 52% 41% 26% 30% 40% 46% 56% Chart Title Afraid Not Afraid
  • 14. Lack Of Special Law On Privacy In India
  • 15. Since a long period of time, India did not have any special law dealing with cyber crimes and cyber privacy issues, jurisdiction issues, and intellectual property rights issues, and a number of other issues. It was the only around the year 2000, that the The Indian Legislature enacted the Information Technology Act, 2000 to deal with cyber crimes and cybercriminals. IT Act lays down penalty and punishment provisions for violation of certain laws which amounts as an offense. The act was later on amended again in the year 2008 and now known as the Information Technology Amendment Act 2008. The Act contains a number of provisions which protects the privacy of a person from online intrusion and exploitation. The Act provides both a fine and punishment by imprisonment in case of 1. Hacking (Section 43, 66), 2. Three years imprisonment for violation of privacy(section 66E), 3. Identity theft(Section-66 C) and 4. Cheating by personation (Section 66 D), 5. Offensive email (Section 66A).
  • 16. Various Legal Provisions relating to the IT ACT
  • 17. • Section 72A of the IT Act penalizes the unauthorized disclosure of personal information by any person who has obtained such information under a lawful contract and without consent of the person from whom such information belonged or taken. Apart from this the IT Act also provides provision for data safety. • Section 43A of the Information Technology Amendment Act 2008, lays down that all corporate bodies and intermediaries who possess, handle or collect any sensitive personal data shall maintain reasonable security practices and in case of failure they shall be liable to the person who is aggrieved by such misuse of data.
  • 18. The government had notified the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011. The Rules dealt with protection of Sensitive personal data or information of a person, which includes such personal information which consists of information relating to: 1. Passwords 2. Financial information such as bank account or credit card or debit card or other payment instrument details. 3. Physical, physiological and mental health condition 4. Sexual orientation 5. Medical records and history 6. Biometric information.
  • 19. Parliamentary Report on Cyber Security & Right to Privacy Issued by the 2013 -2014 Standing Committee on Information Technology on February 12th 2014. The Standing Committee stated that a significant increase in cyberspace activities and access to internet use in India coupled with lack of user end discipline, inadequate protection of computer systems, and the possibility of anonymous use of ICT allowing users to impersonate and cover their trends of crime has emboldened more number of users experimenting with ICT abuse for criminal activities. The Committee is of the opinion that this aspect has a significant impact in blunting the deterrence effect created by the legal framework in the form of the Information Technology Act, 2000, and allied laws.
  • 21. The Government of India, therefore in 2019, constituted a committee to propose a draft statue on data protection. The committee proposed draft law and the govt. of India has issued the Personal Data protection Bill 2019 (PDP) Bill based on the draft proposed by the committee. This will be India first law on the protection of data and it will repeal section-43A of the IT Act. The PDP Bill, proposes a broader reach. It will not only apply to persons in India but also to persons outside India in relation to business carried out in India. The PDP Bill, proposes to apply both on manual and electronic records. The PDP bill proposes creating a Data Protection Authority in India. The Authority will be responsible for protecting the interest of data principals, preventing misuse of personal data and ensuring compliance within the new law. The PDP Bill proposes to protect Personal Data relating to the identity, characteristics trait, attribute of a natural person and Sensitive Personal Data such as financial data, health data, official identifier, sex life, sexual orientation, biometric data, genetic data, transgender status, intersex status, caste or tribe, religious or political beliefs.
  • 22. Pursuant to the PDPB being enacted into an Act, there are several compliances to be followed by organizations processing personal data in order to ensure the protection of privacy of individuals relating to their Personal Data. Consent of the individual would be required for the processing of personal data. Based on the type of personal data being processed, organizations will have to review and update data protection policies, codes to ensure these are consistent with the revised principles such as update their internal breach notification procedures, implement appropriate technical and organizational measures to prevent misuse of data, Data Protection Officer to be appointed by the Significant Data Fiduciary, and instituting grievance redressal mechanisms to address complaints by individuals. The government decided that they would need to implement new rules which would "empower the ordinary users of social media" and their enactment had become necessary due to widespread concerns about issues relating to increased instances of abuse of social media and digital platforms.
  • 23. Landmark Judgement •Justice K.S Puttaswamy (Retd.) Versus Union of India (Case NO- WP (C) 494/2012 ), the Hon'ble Supreme Court through its 9 Judge Bench held that the fundamental right to privacy is guaranteed under the Constitution of India.
  • 24. The need of the hour was to bring forward a special law to deal with the privacy- related issue, at par with the international standards and as like most of the other developed nations have already enacted. The recently enacted Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 ("IT Rules, 2021") was aimed at doing exactly the same. The IT Rules, 2021, inter alia, aim to serve a dual-purpose: (1) increasing the accountability of the social media platforms (such as Facebook, Instagram, Twitter etc.); and (2) empowering the users of social media by establishing a three-tier redressal mechanism for efficient grievance resolution. The New IT Rules 2021 have faced severe restrictions from various digital media platforms. Compliance with the provisions of the IT Rules, 2021 is being questioned by digital media platforms as an attempt to restrict the freedom of speech and expression and various petitions have been filed across India challenging the legal validity of the IT Rules, 2021.
  • 25. • Agij Promotion of Nineteenonea Media Pvt. Ltd. & Ors., vs. Union of India [W.P. (L.) No. 14172 of 2021], the IT Rules, 2021 were challenged on the ground that the IT Rules, 2021 are "ex facie draconian, arbitrary and patently ultra vires" the provisions of the Information Technology Act, 2000 ("IT Act") and the provisions of Articles 14, 19(1)(a) and 19(1)(g) of the Indian Constitution, which guarantees fundamental rights to the petitioners. • The public interest litigation was moved by the Carnatic musician TM Krishna and a second petition was filed by the Digital News Publishers Association (DNPA), comprising of thirteen media outlets, as well as journalist Mukund Padmanabhan4 wherein the petitioners contended that the IT Rules, 2021 are ultra vires, inter alia, to Articles 14 and 19 of the Constitution of India. Judgement against the 2021 Act
  • 26. Though the idea pertaining to the protection of data is very old but due to the immerging trend of technological dependence and use of personal data is manifold, hence this new trend needs a new law to deal within tracking and controlling the techno-savvy peoples and organizations by providing guidelines to prevent misuse of personal data. Peoples using online medium for sharing data or transferring information while doing e- commerce transaction or any other communication purpose treasure their privacy and link it to personal freedom and so have a right to control data about them. It is further required that every e-organization privacy practices should be bench marked against national and international standards for privacy and fair information practices to meet the emerging challenges.
  • 27. Although customer's easily share their personal data while doing online transactions or by interchanging communications but still it is the state's responsibility to look and protect the interest of its citizens. As because due to lack of specific statutory law dealing with the protection of data in India, the courts measurably fails to protect the information as shared to the companies by punishing them for violation of trust. Hence, it is highly required and need of the hour, that the Protection of Personal Data Bill 2019 which is pending in the parliament for approval and ascent of the president be immediately passed and approved so as to protect the personal data of the citizens from being misused. The Personal Data Protection Bill, first proposed by the government in 2018, has been pending for close to three years now. It has seen several changes to the original draft drawn by retired Supreme Court judge Justice B N Srikrishna, who also said that the revised Bill was “a blank cheque to the state”
  • 29. Today there is no control or check on who sells the data to whom the Rules only deals with protection of Sensitive personal data or information of a person, which includes such personal information which consists of information relating to: • Passwords; • Financial information such as bank account or credit card or debit card or other payment instrument details; • Physical, physiological and mental health condition; • Sexual orientation; • Medical records and history; • Biometric information. No technology or standard can eliminate the risk of a cyberattack, but Companies and individuals must the adoption of modern standards that incorporate MFA (Multi Factor Authntication) can be an important step that meaningfully reduces cyber risk. By following these eight principles, governments can create a policy foundation for MFA that not only enhances our collective cyber security, but also helps to ensure greater privacy and increased trust online.
  • 30. Some pointers which can be followed by companies and individuals to avoid cyber attacks on privacy and to prevent Identity Theft 1.Have a plan that explicitly addresses authentication. 2.Recognize the security limitations of shared secrets. 3.Ensure authentication solutions support mobile. 4.Don’t prescribe any single technology or solution — focus on standards and outcomes. 5.Encourage widespread adoption by choosing authentication solutions that are easy to use. 6.Understand that the old barriers to strong authentication no longer apply. 7.Know that privacy matters. 8.Use biometrics appropriately.
  • 31. As individuals grow more dependent on and connected to the cyberspace, they will become more reliant on organizations' effective implementation of cyber security and sensitivity to privacy. The following are some of the key areas in which an increased emphasis on privacy protection could help support, advance and augment cyber security activities. a) Building privacy values into cyber security policy directions b) Legislative approaches that incentivize cyber security preparedness c) Facilitating broader dialogue on cyber security that acknowledges its importance for privacy, trust, and responsible data stewardship