Professional Documents
Culture Documents
WRONGS
Structure
6.1 Introduction
6.2 Objectives
6.3 Computer Wrongs
6.4 Classification of Computer Crimes
6.5 Commission of Multiple Computer Wrongs
6.6 Challenges to Laws
6.6.1 Technology-neutral and Technology-based Laws
6.6.2 Regulation Versus Freedom on the Internet
6.6.3 Internet Crime Different from other Technology Crimes
6.7 Information Technology Act, 2000
6.8 Offences Under the IT Act
6.9 Investigation Under the IT Act
6.10 Convention on Cyber Crime – Council of Europe
6.11 Summary
6.12 Terminal Questions
6.13 Answers and Hints
6.14 References and Suggested Readings
6.1 INTRODUCTION
In this unit which is the first unit of this block, attempt has been made to give
an overview of the computer wrongs. In the subsequent units we shall discuss
various classes of computer wrongs.
5
Cyber Crimes and Torts
6.2 OBJECTIVES
After studying this unit, you should be able to:
• discuss the concepts of computer wrong and how the civil wrongs can
be distinguished from the computer crimes, how the computer crimes are
classified;
• distinguish between the concept of technology based and technology
neutral laws;
• examine the issues involved in the regulation of cyberspace; and
• discuss how the matter has been dealt by the I.T. Act, 2000.
WRONGS
Another concern in computer crimes is the possibility of and ease with which
an offender can commit multiple crimes at one goes. It is very possible and
in fact, quite likely that an offender in the process of committing one computer
crime commits other crimes as well. We can take a few instances to illustrate
the point:
A) In case of data theft, one has to hack (unauthorized access) the computer
or any other electronic storage medium and only then can be commit
theft. Thus data theft includes hacking and theft.
B) To initiate a Distributed Denial-of-service, installation of virus, and Trojan
horses on the ‘slave’/compromised systems would be needed. The date
of ‘target’ computer may also be altered or destroyed in the process.
Thus, DDoS includes hacking, introduction of virus and data alteration.
C) Web defacing can be achieved by first hacking into the computer system.
The Indian statutory regulation, specifically Section 66 of the Indian Information
Technology Act, 2000, in the area of computer crimes is quite comprehensive
and concise. It is noticeable that most of the computer crimes culminate into
section 66. Subsequent units on specific computer crimes would make the
point clear.
Please answer the following Self Assessment Question.
7
Cyber Crimes and Torts
6.6 CHALLENGES TO LAWS
India is today re-discovering itself – technologically. Being a developing country,
it realises that the Internet and the use of computers are powerful tools for its
economic development. Economic development presupposes existence of an
appropriate regulatory regime. The biggest challenge to the law is to keep
pace with technology.
Clearly, with the development of new technology and with the realisation that
such technology affects human life and relations and the peace, order and
proprietary rights in society, laws must be framed to regulate conduct
accordingly. Let’s take for instance theft of passwords. Passwords are a
combination of alphabets and numbers and are central to the operation of
computers. These are nothing but keys to gain entry into computer systems.
Stealing a password or unauthorized access using someone else’s password
must be recognised as merely the first step to committing a crime. Similarly,
networks need to be recognised as highways for movement of information and
communication and not for cranks to dig holes or put up impediments. One
can enter into a private computer network only when one is authorized to
enter much the same way as to enter into a private physical space. Web pages
as private property can be considered as displays in shops. One can watch but
cannot break the glass of the shop. Similarly, one can browse, but not tamper
with or destroy.
8
Please answer the following Self Assessment Question. Introduction to Computer
Wrongs
Self Assessment Question 2 Spend 3 Min.
What is technology based law and technology neutral law?
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
In the following units, common computer crimes have been discussed. Wherever
possible, not only the meaning and scope of the crime but also its coverage
under the Indian Information Technology Act, 2000, the Indian Penal code and
other minor criminal Acts have been discussed. The computer crimes can be
classified into the following categories:
33(2) Failure of any Certifying Authority to surrender Person in whose favour the licence is
a licence under Section 33(1) after such licence issued shall be punished with
has been suspended or revoked [Section 25(1)]. imprisonment which may extend upto
six months or a fine which may extend
upto Rs.10,000 or both.
68(2) Failure to comply with the order of Controller Punishable with imprisonment for a
under section 68(1) which empowers the term not exceeding three years or to a
Controller to direct, by order, a Certifying fine not exceeding Rs. 2,00,000/- or
Authority or any employee of such Authority to both.
to take such measures or cease carrying on
such activities as specified in the order if those
are necessary to ensure compliance with the
provisions of this Act, rule or any regulations
made thereunder.
69(3) Failure to assist an agency [referred in section Punishable with imprisonment for a
69(2)] which is required to intercept any term which may extend to seven years.
information as required by an order of the
Controller [under section 69(1)]
11
Cyber Crimes and Torts
appropriate Government vide a notification may extend to ten years and shall also be
under section 70(1)] in contravention of the liable to fine.
provisions of this section [that is such person
is not authorized by the appropriate
Government under section 70(2) to access
the protected system].
72 Securing access to any electronic record, Punishable with imprisonment for a term
book, register, correspondence, information, which may extend to two years, or with
document or other material by any person in fine which may extend to one Rs.
pursuance of any of the powers conferred 1,00,000/- or with both.
under this Act, rules or regulations made
thereunder without the consent of the person
concerned and thereafter, disclosing such
electronic record, etc. to any other person.
6.11 SUMMARY
Computer wrongs include both civil wrongs and crimes. The Information
Technology Act, 2000 covers both– civil wrongs and crimes. For the purposes
of committing a crime, a computer can be used both as a tool as well as a
target. Sometimes, it is used to make the offender more efficient in the
commission of the crime. It is very possible and in fact, quite likely that an
offender in the process of committing one computer crime commits other
crimes as well. One of the challenges of making technology-based laws is that
there is a chance of such laws being outdated soon. The debate in the world
between regulation and freedom on the Net has now more or less been settled
in favour of the need for regulation. Governments have begun taking steps to
regulate the Net.
2) Technology based laws are those in which computer is the means or the
target of the crime such as hacking etc. While technology neutral laws
are ordinary laws and it is immaterial whether computer is used or not
such as defamation etc.
1. See, for example, David R. Johnson & David Post. “Law and Borders—
<http://www.lessig.org/content/standard/0,1902,3006,00.html>.
1199-1250.
coe.int/Treaty/en/Treaties/html/185.htm>.
16