Cyber Law Introduction
Cyber Law Introduction
- Satish Venkatasubbu,
LLB - 1st Semester
Cyber Law is the area of law that deals with the Internet's relationship to technological
and electronic elements, including computers, software, hardware and information
systems Cyber Law is the law governing cyber space. Cyber space is a very wide term
and includes computers, networks, software, data storage devices (such as hard disks,
USB disks etc), the Internet, websites, emails and even electronic devices such as cell
phones, ATM machines etc.
Violation of these rules could lead to government action such as imprisonment or fine or
an order to pay compensation.
Cyber crimes are unlawful acts where the computer is used either as a tool or a target
or both. The enormous growth in electronic commerce (e-commerce) and online share
trading has led to a phenomenal spurt in incidents of cyber crime. These crimes are
discussed in detail further in this chapter.
Cyber law & Cyber Crimes – Part 1
Intellectual Property here refers to creations of the human mind e.g. a story, a song, a
painting, a design etc. The facets of intellectual property that relate to cyber space are
covered by cyber law.
These include:
Electronic signatures are used to authenticate electronic records. Digital signatures are
one type of electronic signature. Digital signatures satisfy three major legal requirements
– signer authentication, message authentication and message integrity. The technology
and efficiency of digital signatures makes them more trustworthy than hand written
signatures.
Data protection and privacy laws aim to achieve a fair balance between the privacy
rights of the individual and the interests of data controllers such as banks, hospitals,
email service providers etc. These laws seek to address the challenges to privacy
caused by collecting, storing and transmitting data using new technologies.
There are various reasons why it is extremely difficult for conventional law to cope
with cyberspace. Some of these are discussed below.
2
Cyber law & Cyber Crimes – Part 1
4. Cyberspace handles gigantic traffic volumes every second. Billions of emails are
crisscrossing the globe even as we read this, millions of websites are being accessed
every minute and billions of dollars are electronically transferred around the world by
banks every day.
7. Electronic information has become the main object of cyber crime. It is characterized
by extreme mobility, which exceeds by far the mobility of persons, goods or other
services. International computer networks can transfer huge amounts of data around the
globe in a matter of seconds.
8. A software source code worth crores of rupees or a movie can be pirated across the
globe within hours of their release.
9. Theft of corporeal information (e.g. books, papers, CD ROMs, floppy disks) is easily
covered by traditional penal provisions. However, the problem begins when electronic
records are copied quickly, inconspicuously and often via telecommunication facilities.
Here the “original” information, so to say, remains in the “possession” of the “owner” and
yet information gets stolen.
Bibliography:
3
Cyber law & Cyber Crimes – Part 1
Classification of cybercrimes