Skip to main content
Evolution of Cyber Law in India


With an increase in the dependency on the use of technology, the need for cyberlaw was necessary. Much like every coin has two sides, therefore, the dependency on technology has its pros and cons. The rise of the 21st century marked the evolution of cyberlaw in India with the Information Technology Act, 2000 (popularly known as the IT Act). The first-ever cybercrime was recorded in the year 1820.

The objective of the Information Technology Act in India is as follows:


  • To provide legal recognition for all e-transactions.
  • To give legal recognition to digital signatures as a valid signature to accept agreements online.
  • To give legal recognition to keeping accounting books in electronic form by bankers as well as other organizations.
  • Protection of online privacy and stopping cyber crimes



The Indian IT law updated the Reserve Bank of India Act and the Indian Evidence Act. With the evolution of cyberlaw, almost all online activities came under scrutiny. However, one thing about cyber law is that there are certain areas on which cybercrime laws in India do not apply such as:


  • Negotiable Instrument being other than cheque
  • Power of Attorney
  • Will
  • The contract for Sale or Conveyance of Immovable Property
  • Central Government notified documents or transactions



The Need for Cyber Law



In the present world which is more tech-savvy, the words cyber law and cyber crimes have also become more sophisticated. Internet and technology were launched for research purposes and making the lives of humans easy but as the use and number of people on the internet increased, the need for cyber laws in India was felt. As the nature of the internet is anonymous it is easy to commit cybercrimes. Thereby many could misuse this aspect largely.

Advocate Tanuj Aggarwal says, "With the exponential growth in the digital space, the establishment of certain reforms was highly needed for the security of the citizen’s privacy and data protection."

What is the Information Technology Act, 2000?



When the emphasis was on the need for cyber law or cybersecurity laws, then, it was imperative to implement an IT law in India. Thus, the Information Technology Act, 2000[1], or also known as the Indian Cyber Act or the Internet Law came to force in India. Since the enactment, the Indian Internet Laws were drafted to bring in view all the electronic records and online/electronic activities to legal recognition. The IT Act also addresses the important issues of security, which are critical to the success of electronic transactions. The Internet Laws in India not only validates digital signatures but also provides for how authentication of the documents, which has been accepted and generated by using the digital signatures, can be done.
As IT Act is a cybersecurity law introduced to secure cyberspace, the Information Technology Law was amended under;


  • The Indian Penal Code
  • The Indian Evidence Act
  • The Banker’s Book Evidence Act
  • The Reserve Bank of India


The prime focus of cyber law in India is to prevent:


  • computer crime
  • forgery of electronic data & record in e-commerce
  • electronic transaction


IT Act, 2000 went through amendments[2]in the year 2008. These were made in light of the laws on cybercrime - IT Act, 2000 by way of the IT Act, 2008. They were enforced at the beginning of 2009 to strengthen the cybersecurity laws. ​Modifications in the Information Technology Act, 2008 included the change in the definition of some terms such as communication devices. The amendment for the definition of communication device was to include:


  • the current use
  • to validate the digital signature
  • to make the IP address owner accountable
  • impose liability for data breaches

Comments

  1. We need some strict laws against cyber crime.

    ReplyDelete
  2. Thanks for the information about cyber laws ✌️

    ReplyDelete
  3. πŸ‘πŸΌπŸ‘πŸΌ

    ReplyDelete
  4. cyber laws are not strong enough to cater cyber criminals we need some change in government policies and make strong laws against cyber crimes.

    ReplyDelete
  5. IT IS MANDATORY AGAIN TO EVALUATE CYBER LAW, WHILE SEEING DAY TO DAY INCREASING IN CASES OF CYBER CRIME

    ReplyDelete

Post a Comment

Popular posts from this blog

TOP 10 CYBERSECURITY COURSES IN INDIA 1. Master Certificate in Cyber Security (Red Team) – Jigsaw Academy with HackerU Jigsaw_Cyber-Securit Jigsaw Academy is a global award-winning training provider headquartered in Bengaluru, India. Founded by the duo of Gaurav Vohra and Sarita Digumarti, Jigsaw Academy has been instrumental in shaping the careers of over 50,000 learners in 30+ countries by helping them build a successful career in emerging technologies with specialised industry oriented courses. The domain experts and educators at Jigsaw Academy offer meticulously structured courses with industry-relevant curricula. Jigsaw Academy trains professionals in the areas of analytics, data science, big data, machine learning, business analytics, and more recently, cybersecurity and cloud computing. W3Schools Flagship Cybersecurity Program: Jigsaw Academy’s Master Certificate in Cyber Security (Red Team) in association with HackerU Duration Of The Program: 600 Hours (20 Hours of
Ways to secure yourself from cyber crime  1) Education - Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you into revealing personal information by pretending to be a legitimate organization or person. These scams often play off major new stories, so keep informed on the latest news-related scams. 2) Use a firewall - Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. And if you have a home wireless network, enable the firewall that comes with your router. 3) Cli
Who are cyber criminals and why do they do it?  We talk a great length about cyber crime. From trends in phishing to exploits to cyber security threats and so much in between. But we don’t often think about who is committing the cyber crime and what motivates them. The motivations for cyber criminals can be quite simple. The two that make up the huge majority are money and information. According to a Verizon Enterprise report, financial and espionage-driven motivation make up a full 93% of motivation for attacks. Aside from that, the less-frequent but broader set of motives is often categorized as  “FIG” (Fun, Ideology, and Grudges). The core motives can vary depending on what the cyber criminal is after, whether they are executing the attacks of their own initiative or if they’ve been contracted to do so, and who might benefit in what way from a successful cyber crime. This variety can be illustrated as follows: Money This can be the motive for many types of attacks,