JavaScript Free Code */ /* ---( page defaults )--- */ body { margin: 0; padding: 0; font-size: small; text-align: center; color: #333333; background: #e0e0e0; } blockquote { margin-top: 0; margin-right: 0; margin-bottom: 0; margin-left: 30px; padding-top: 10px; padding-right: 0; padding-bottom: 0; padding-left: 20px; font-size: 88%; line-height: 1.5em; color: #666; background: url(http://www.blogblog.com/tictac/quotes.gif) no-repeat top left; } blockquote p { margin-top: 0; } abbr, acronym { cursor: help; font-style: normal; border-bottom: 1px dotted; } code { color: #f63; } hr { display: none; } img { border: none; } /* unordered list style */ ul { list-style: none; margin-left: 10px; padding: 0; } li { list-style: none; padding-left: 14px; margin-bottom: 3px; background: url(http://www.blogblog.com/tictac/tictac_orange.gif) no-repeat left 6px; } /* links */ a:link { color: #6699cc; } a:visited { color: #666699; } a:hover { color: #693; } a:active { color: #cc3333; text-decoration: none; } /* ---( layout structure )---*/ #outer-wrapper { width: 847px; margin: 0px auto 0; text-align: left; font: normal normal 100% Verdana, sans-serif; background: url(http://www.blogblog.com/tictac/tile_left.gif) repeat-y; } #content-wrapper { margin-left: 42px; /* to avoid the border image */ width: 763px; } #main { float: left; width: 460px; margin-top: 20px; margin-right: 0; margin-bottom: 0; margin-left: 0; padding-top: 0; padding-right: 0; padding-bottom: 0; padding-left: 1em; line-height: 1.5em; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } #sidebar { float: right; width: 259px; padding-top: 20px; padding-right: 0px; padding-bottom: 0; padding-left: 0; font-size: 85%; line-height: 1.4em; color: #999999; background: url(http://www.blogblog.com/tictac/sidebar_bg.gif) no-repeat left top; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } /* ---( header and site name )--- */ #header-wrapper { margin: 0; padding: 0; font: normal normal 100% 'Lucida Grande','Trebuchet MS'; background: #e0e0e0 url(http://www.blogblog.com/tictac/top_div_left.gif) no-repeat left top; } #header { margin: 0; padding-top: 25px; padding-right: 60px; padding-bottom: 35px; padding-left: 160px; color: #FFFFFF; background: url(http://www.blogblog.com/tictac/top_h1.gif) no-repeat bottom left; } #header h1 { font-size: 200%; text-shadow: #81A75B 2px 2px 2px; } #header h1 a { text-decoration: none; color: #FFFFFF; } #header h1 a:hover { color: #eee; } /* ---( main column )--- */ h2.date-header { margin-top: 0; padding-left: 14px; font-size: 90%; color: #ff9933; background: url(http://www.blogblog.com/tictac/date_icon.gif) no-repeat left 50%; } .post h3 { margin-top: 0; font: normal bold 130% 'Lucida Grande','Trebuchet MS'; letter-spacing: -1px; color: #ff6633; } .post { margin-top: 0; margin-right: 0; margin-bottom: 1.5em; margin-left: 0; padding-top: 0; padding-right: 0; padding-bottom: 1.5em; padding-left: 14px; border-bottom: 1px solid #ddd; } .post h3 a, .post h3 a:visited { color: #ff6633; text-decoration: none; } .post-footer { margin: 0; padding-top: 0; padding-right: 0; padding-bottom: 0; padding-left: 14px; font-size: 88%; color: #999999; background: url(http://www.blogblog.com/tictac/tictac_grey.gif) no-repeat left 8px; } .post img, table.tr-caption-container { padding: 6px; border-top: 1px solid #ddd; border-left: 1px solid #ddd; border-bottom: 1px solid #c0c0c0; border-right: 1px solid #c0c0c0; } .tr-caption-container img { border: none; padding: 0; } .feed-links { clear: both; line-height: 2.5em; } #blog-pager-newer-link { float: left; } #blog-pager-older-link { float: right; } #blog-pager { text-align: center; } /* comment styles */ #comments { padding: 10px 10px 0px 10px; font-size: 85%; line-height: 1.5em; color: #666; background: #eee url(http://www.blogblog.com/tictac/comments_curve.gif) no-repeat top left; } #comments h4 { margin-top: 20px; margin-right: 0; margin-bottom: 15px; margin-left: 0; padding-top: 8px; padding-right: 0; padding-bottom: 0; padding-left: 40px; font-family: "Lucida Grande", "Trebuchet MS"; font-size: 130%; color: #666; background: url(http://www.blogblog.com/tictac/bubbles.gif) no-repeat 10px 0; height: 29px !important; /* for most browsers */ height /**/:37px; /* for IE5/Win */ } #comments ul { margin-left: 0; } #comments li { background: none; padding-left: 0; } .comment-body { padding-top: 0; padding-right: 10px; padding-bottom: 0; padding-left: 25px; background: url(http://www.blogblog.com/tictac/tictac_orange.gif) no-repeat 10px 5px; } .comment-body p { margin-bottom: 0; } .comment-author { margin-top: 4px; margin-right: 0; margin-bottom: 0; margin-left: 0; padding-top: 0; padding-right: 10px; padding-bottom: 0; padding-left: 60px; color: #999; background: url(http://www.blogblog.com/tictac/comment_arrow.gif) no-repeat 44px 2px; } .comment-footer { border-bottom: 1px solid #ddd; padding-bottom: 1em; } .deleted-comment { font-style:italic; color:gray; } /* ---( sidebar )--- */ .sidebar h2 { margin-top: 0; margin-right: 0; margin-bottom: 0; margin-left: 0; padding-top: 25px; padding-right: 0; padding-bottom: 0; padding-left: 40px; font: normal bold 130% 'Lucida Grande','Trebuchet MS'; color: #666666; height: 32px; background: url(http://www.blogblog.com/tictac/sidebar_icon.gif) no-repeat 10px 15px; height: 32px !important; /* for most browsers */ height /**/:57px; /* for IE5/Win */ } .sidebar .widget { margin: 0; padding-top: 0; padding-right: 0; padding-bottom: 10px; padding-left: 10px; border-bottom: 1px solid #ddd; } .sidebar li { background: url(http://www.blogblog.com/tictac/tictac_green.gif) no-repeat left 5px; } .profile-textblock { clear: both; margin-left: 0; } .profile-img { float: left; margin-top: 0; margin-right: 5px; margin-bottom: 5px; margin-left: 0; border: 1px solid #ddd; padding: 4px; } /* ---( footer )--- */ .clear { /* to fix IE6 padding-top issue */ clear: both; } #footer-wrapper { margin: 0; padding-top: 0; padding-right: 0; padding-bottom: 9px; padding-left: 0; font-size: 85%; color: #ddd; background: url(http://www.blogblog.com/tictac/bottom_sill.gif) no-repeat bottom left; } #footer { margin: 0; padding-top: 20px; padding-right: 320px; padding-bottom: 20px; padding-left: 95px; background: url(http://www.blogblog.com/tictac/bottom_sash_left.gif) no-repeat top left; } /** Page structure tweaks for layout editor wireframe */ body#layout #outer-wrapper, body#layout #main, body#layout #sidebar { padding-top: 0; margin-top: 0; } body#layout #outer-wrapper, body#layout #content-wrapper { width: 740px; } body#layout #sidebar { margin-right: 0; margin-bottom: 1em; } body#layout #header, body#layout #footer, body#layout #main { padding: 0; } body#layout #content-wrapper { margin: 0px; } -->

Tuesday, March 30, 2010

Indian constitution for cybercrimes

Information Technology Act (IT Act) 2000

The government of India introduced the Information Technology Act, on 17th October 2000. Information Technology Act (IT Act) 2000, is the India’s only cyber law. The IT Act is aimed to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”.

India has done a good job by enacting a cyber law. It is the 12th country of the world having a cyber law. It covers areas like e-governance, e-commerce, cyber contraventions and cyber offences.
Information Technology ACT 2000 Effects in Combating Cyber Crime

According to Section 75 of the Act, the Act applies to any offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India. The IT Act prescribes provisions for contraventions in Chapter IX of the Act, particularly Section 43 of the Act, which covers unauthorized access, downloading, introduction of virus, denial of access and internet time theft committed by any person. It prescribes punishment by way of damages not exceeding Rs. 1 crore to the affected party. Chapter XI of the IT Act discusses the cyber crimes and offences interalia, tampering with computer source documents (Sec. 65), Hacking (Sec.66), publishing of obscene information (Sec.67), unauthorized access to protected system (Sec.70), breach of confidentiality (Sec.72), publishing false digital signature certificate (Sec.73).
The implications of IT Act 2000 provisions for the e-businesses would be that email would now be a valid and legal form of communication in India that can be duly produced and approved in a court of law. Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. Digital signatures have been given legal validity and sanction in the Act. The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions.
One of the first cases where the accused was convicted under the IT Act provisions was the case of State of Tamilnadu V. Suhas Kutty. The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. The accused was found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused was convicted and was sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence under Section 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence under Section 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/-.
Eight years have passed since the act was enacted and in these eight year’s technology has changed at a much faster pace. Though law cannot possibly be expected to keep pace with changes in technology, still there are few areas in the current cyber laws which need some attention.
Some Important Shortcomings of the Information Technology Act, 2000

Pornography
The term ‘pornography’ when used in relation to an offence is not defined in any statutes in India. But Section 67 of the IT Act lays down the law that obscenity is an offence when it is published or transmitted or caused to be published in any electronic form. The expressions, ‘publishing’ or ‘transmission’ have not been specifically defined under the IT Act.

Even the punishment for pornography is not sufficient in India and in the proposed amendment in IT Act the imprisonment is being reduced to two years from the present five year imprisonment. Though legislations worldwide contain severe provisions for child pornography there is no mention of child pornography in the Indian Act. It is interesting to note down that the Information Technology Act prohibits publishing of pornography but viewing of pornography is not an offence under the act.

Data Protection in Internet Banking

The Information Technology Act talks about unauthorized access but it does not talk about maintaining integrity of customer transactions. The act does not lay down any duty upon banks to protect the details of customers and clients. U.K has a data protection law which was enacted 10 years back that is in 1998 under which banks or any person holding sensitive information may be held liable for damages if it fails to maintain adequate security protection in respect of data.

Spamming

Recently the Government of India revealed that as much as 76 per cent of e-mails originating from India are spam’s, although the country accounts for only one per cent when compared with top 25 spam-producing nations. The business of spamming is not only lucrative but is also unregulated to a greater extent. The laws for the prevention of spam in India are missing. Even the IT Act, 2000 fails to address this issue.

USA and the European Union have already enacted anti spam legislation.

In the United States spam is legally permissible according to the CAN-SPAM Act of 2003 provided it follows certain criteria. If the spam fails to comply with any of these requirements, then it is illegal.

Article 13 of the European Union Directive on Privacy and Electronic Communications (2002/58/EC) provides that the EU member States shall take appropriate measures to ensure that unsolicited communications for the purposes of direct marketing are not allowed either without the consent of the subscribers concerned or in respect of subscribers who do not wish to receive these communications, the choice between these options to be determined by National Legislation.

Identity Theft

The IT Act, 2000 does not have any specific provision to deal with Identity theft. It is clear that Indian politicians just do not understand the problem associated with personal identity theft that India employees of outsourcing firms commit. In the face of the controversy generated over leakage of personal information of UK customers through an Indian web marketing firm, prime minister of India has asked the Information and Technology department and industry association Nasscom to consult all stakeholders and give suggestions for changes in the existing laws and, if necessary, to ensure that any breach of secrecy, illegal transfer of commercial and other privileged information and any other form of cyber crime is made a punishable offence.

These are some of the important shortcomings of the Information Technology Act, 2000. Though an amendment was proposed in the Act in 2005, the bill has still not been passed and moreover the bill also fails to address these issues and shortcomings. It seems quite evident that by the time the bill is passed, it would have become obsolete and ineffective.
Challenges to Legislative Measures

Cyber law in India is in its infancy and is struggling hard to meet the contemporary Information and Communication Technology (ICT) requirements. ICT Trends in India-2006, ICT Trends in India-2007, Cyber Security Trends-2007, etc have proved that India has not paid enough attention to the legal framework for the information society and legal enablement of ICT systems in India. To worsen the situation we have a weak cyber and ICT security in India. Cyber and ICT security in India is an ‘ignored world’ and the same is not going to improve due to the faulty cyber security strategy of India. This precarious situation has lead to an insufficient critical ICT infrastructure protection in India. The critical ICT infrastructure protection and management in India have still not got the attention of government of India and private industry players. In short, the ICT strategy of India needs rejuvenation so that we may have a sound cyber law and effective ICT and cyber security.

To compound these problems, many victims of cybercrime are unwilling to file their cases with the authorities. The true magnitudes of cybercrime, as well as demographic statistics on perpetrators and victims, are unknown because most incidents of cybercrime go unreported. The reason behind this is that the victim is either scared of police harassment or wrong media publicity. For minority and marginalised groups who already bear the brunt of media bias, reporting online harassment to the police may simply draw further unwanted attention.

The good news is that, despite these limitations, cyber crimes are detected and culprits are being punished. In October 2002, the Delhi High Court restricted a person from selling pirated Microsoft software over an Internet auction site. Some of the big cities in India where cyber crime cells do exist, there is potential for improvement. There is an immense need for training, and more cities need to have such cells.
 Source:-Desitoop.com(http://www.desitoob.com/indian-approach-towards-the-fight-against-cyber-crime/)
wanna read more:-click here

No comments:

Post a Comment